Intrusion Detection in Ubiquitous Computing Technologies