J. K. Petersen, The telecommunications illustrated dictionary, 2002.

P. P. Lee, T. Bu, and T. Woo, On the Detection of Signaling DoS Attacks on 3G Wireless Networks, IEEE INFOCOM 2007, 26th IEEE International Conference on Computer Communications, pp.1289-1297, 2007.
DOI : 10.1109/INFCOM.2007.153

P. P. Lee, T. Bu, and T. Woo, On the detection of signaling DoS attacks on 3G/WiMax wireless networks, Computer Networks, vol.53, issue.15, pp.2601-2616, 2009.
DOI : 10.1016/j.comnet.2009.05.008

A. D. 'alconzo, A. Coluccia, F. Ricciato, and P. Romirer-maierhofer, A distribution-based approach to anomaly detection and application to 3G mobile traffic, Global Telecommunications Conference, pp.1-8, 2009.

A. Coluccia, A. Dalconzo, and F. Ricciato, Distribution-Based Anomaly Detection in Network Traffic, Data Traffic Monitoring and Analysis, pp.202-216, 2013.
DOI : 10.1007/978-3-642-36784-7_9

G. Yan, S. Eidenbenz, and E. Galli, SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection, Recent Advances in Intrusion Detection, pp.202-223, 2009.
DOI : 10.1007/978-3-642-04342-0_11

E. K. Kim, P. Mcdaniel, and T. L. Porta, A Detection Mechanism for SMS Flooding Attacks in Cellular Networks, Security and Privacy in Communication Networks, pp.76-93, 2013.
DOI : 10.1145/1541880.1541882

I. Murynets and R. P. Jover, Anomaly detection in cellular Machine-to-Machine communications, 2013 IEEE International Conference on Communications (ICC), pp.2138-2143, 2013.
DOI : 10.1109/ICC.2013.6654843

N. Eagle and A. Pentland, Reality mining: sensing complex social systems, Personal and ubiquitous computing, pp.255-268, 2006.
DOI : 10.1007/s00779-005-0046-3

Q. Ye, T. Zhu, D. Hu, B. Wu, N. Du et al., Cell phone mini challenge award: Social network accuracyexploring temporal communication in mobile call graphs, Visual Analytics Science and Technology VAST'08. IEEE Symposium on, 2008.

Z. Shen and K. Ma, MobiVis: A Visualization System for Exploring Mobile Data, 2008 IEEE Pacific Visualization Symposium, pp.175-182, 2008.
DOI : 10.1109/PACIFICVIS.2008.4475474

M. M. Breunig, H. Kriegel, R. T. Ng, and J. Sander, LOF: identifying densitybased local outliers, ACM Sigmod Record, pp.93-104, 2000.

S. Papadopoulos, V. Mavroudis, A. Drosou, and D. Tzovaras, Visual Analytics for Enhancing Supervised Attack Attribution in Mobile Networks, Information Sciences and Systems 2014, pp.193-203, 2014.
DOI : 10.1007/978-3-319-09465-6_21

I. Kalamaras, A. Drosou, and D. Tzovaras, Multi-Objective Optimization for Multimodal Visualization, IEEE Transactions on Multimedia, vol.16, issue.5, pp.1460-1472, 2014.
DOI : 10.1109/TMM.2014.2316473

L. Breiman, Random forests, Machine Learning, vol.45, issue.1, pp.5-32, 2001.
DOI : 10.1023/A:1010933404324

B. Ding, D. Lo, J. Han, and S. Khoo, Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database, 2009 IEEE 25th International Conference on Data Engineering, pp.1024-1035, 2009.
DOI : 10.1109/ICDE.2009.104

. Genielog, GEDIS Studio online, 2014.