REFERENCES
Alvares, L. O., Bogorny, V., Kuijpers, B., de Macedo,
J. A. F., Bart, B., and Vaisman, A. (2007). A model for
enriching trajectories with semantic geographical in-
formation. In GIS ’07: Proceedings of the 15th Inter-
national Symposium on Advances in Geographic In-
formation Systems. ACM.
Chen, L. D. (2008). A model of consumer acceptance
of mobile payment. International Journal of Mobile
Communications, 6(1):32–52.
Dodge, S., Weibel, R., and Forootan, E. (2009). Revealing
the physics of movement: Comparing the similarity of
movement characteristics of different types of moving
objects. Computers, Environment and Urban Systems,
33(6):419–434.
Eagle, N., Pentland, A., and Lazer, D. (2007). Infer-
ring social network structure using mobile phone data.
Proceedings of the National Academy of Sciences
(PNAS), 106(36):15274–15278.
GadgetTrak (2010). GadgetTrak System. http://www.
gadgettrak.com/.
G
´
omez, L. I., Kuijpers, B., and Vaisman, A. (2008). Query-
ing and mining trajectory databases using places of
interest. In Annals of Information Systems, volume 3.
Gonz
´
alez, M. C., Hidalgo, C. A., and Barab
´
asi, A. L.
(2008). Understanding individual human mobility
patterns. Nature, 453:479.
G
¨
uting, R. H. and Schneider, M. (2005). Moving Objects
Databases. Morgan Kaufmann.
Hadjieleftheriou, M., Kollios, G., Bakalov, P., and Tsotras,
V. J. (2005). Complex spatio-temporal pattern queries.
In VLDB 05: Proceedings of the 31st International
Conference on Very Large Databases. ACM.
Hall, J., Barbeau, M., and Kranakis, E. (2005). Anomaly-
based intrusion detection using mobility profiles of
public transportation users. In WiMob’05: Proceed-
ings of the Wireless and Mobile Computing, Network-
ing and Communications. IEEE.
Hung, C., Chang, C., and Peng, W. (2009). Mining tra-
jectory profiles for discovering user communities. In
LBSN ’09: Proceedings of the 2009 International
Workshop on Location Based Social Networks. ACM.
Jeung, H., Liu, Q., Shen, H. T., and Zhou, X. (2008). A
hybrid prediction model for moving objects. In ICDE
’08: Proceedings of the 2008 IEEE 24th International
Conference on Data Engineering. IEEE.
LaptopCop (2010). Laptop Cop Software.
http://www.laptopcopsoftware.com/index.html.
Monitoring, M. S. (2010). Windows mobile security moni-
toring software. http://www.recoverycop.com/index.
html.
Mouza, C. D. and Rigaux, P. (2005). Mobility patterns.
GeoInformatica, 9(4):297–319.
OSM (2010). Open street map. http://www.OpenStreetMap
.org.
Rhee, I., Shin, M., Hong, S., Lee, K., and Chong, S. (2008).
On the Levy-Walk nature of human mobility. In IN-
FOCOM ’08: Proceeding of the IEEE Conference on
Computer Communications. IEEE.
Sun, B., Yu, F., Wu, K., Xiao, Y., and Leung, V. (2007).
Enhancing security using mobility-based anomaly de-
tection in cellular mobile networks. In IEEE Transac-
tions on Vehicular Technology, volume 55, pages 1385
–1396.
Thornton, P. and Houser, C. (2004). Using mobile phones
in education. In WMTE ’04: Proceedings of the 2nd
IEEE International Workshop on Wireless and Mobile
Technologies in Education. IEEE.
Trestian, I., Ranjan, S., Kuzmanovic, A., and Nucci, A.
(2009). Measuring serendipity: Connecting people,
locations and interests in a mobile 3g network. In IMC
’09: Proceedings of the 9th ACM SIGCOMM Confer-
ence on Internet Measurement. ACM.
Xie, K., Deng, K., and Zhou, X. (2009). From trajectories to
activities: a spatio–temporal join approach. In LBSN
’09: Proceedings of the 2009 International Workshop
on Location Based Social Networks, Seattle, Washing-
ton. ACM.
Yan, G., Eidenbenz, S., and Sun, B. (2009). Mobi–
watchdog: You can steal, but you can’t run! In WiSec
’09: Proceedings of the Second ACM Conference on
Wireless Network Security. ACM.
Yazji, S., Chen, X., Dick, R. P., and Scheuermann, P.
(2009). Implicit user re-authentication for mobile de-
vices. In UIC ’09: Proceedings of the 6th Inter-
national Conference on Ubiquitous Intelligence and
Computing, pages 325–339. Springer-Verlag.
PROTECTING PRIVATE DATA ON MOBILE SYSTEMS BASED ON SPATIO-TEMPORAL ANALYSIS
123