메뉴 건너뛰기




Volumn , Issue , 2007, Pages 135-142

Battery polling and trace determination for bluetooth attack detection in mobile devices

Author keywords

Battery; Intrusion detection; Wireless security

Indexed keywords

ANALYTICAL MODELLING; ATTACK DETECTION; BATTERY-SENSING INTRUSION PROTECTION SYSTEM (B-SIPS); DETECTION LIMIT (DL); INFORMATION ASSURANCE (IA); MOBILE COMPUTERS; NETWORK ACTIVITIES; SMALL WIRELESS DEVICES; STATIC POLLING RATES; TRACE DETERMINATION;

EID: 48749122337     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IAW.2007.381925     Document Type: Conference Paper
Times cited : (7)

References (20)
  • 1
    • 39749120747 scopus 로고    scopus 로고
    • Battery-sensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection
    • IEEE Computer Soc, Waikoloa, HI
    • T. Buennemeyer, F. Munshi, et al., "Battery-sensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection," in 40th Annual Hawaii Int'l Conf on System Sciences (HICSS-40), IEEE Computer Soc., Waikoloa, HI, 2007.
    • (2007) 40th Annual Hawaii Int'l Conf on System Sciences (HICSS-40)
    • Buennemeyer, T.1    Munshi, F.2
  • 2
    • 48749085619 scopus 로고    scopus 로고
    • Microsoft, Advanced power management v1.2, http://www.microsoft.com/whdc/archive/amp_12.mspx, 2001.
    • Microsoft, "Advanced power management v1.2," http://www.microsoft.com/whdc/archive/amp_12.mspx, 2001.
  • 3
    • 48749110578 scopus 로고    scopus 로고
    • "Advanced configuration and power interface," http://acpi.info, 2005.
    • (2005)
  • 7
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Cambridge, UK
    • F. Stajano and R. Anderson, "The resurrecting duckling: security issues for ad-hoc wireless networks," in 7th Int'l Workshop on Security Protocols, Cambridge, UK, 1999.
    • (1999) 7th Int'l Workshop on Security Protocols
    • Stajano, F.1    Anderson, R.2
  • 9
    • 51449085415 scopus 로고    scopus 로고
    • Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
    • Vancouver, BC
    • R. Racic, D. Ma, et al., "Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery," in 15th Annual USENIX Security Symposium, Vancouver, BC, 2006.
    • (2006) 15th Annual USENIX Security Symposium
    • Racic, R.1    Ma, D.2
  • 12
    • 48749093353 scopus 로고    scopus 로고
    • Using battery constraints within mobile hosts to improve network security
    • G. Jacoby, R. Marchany, et al., "Using battery constraints within mobile hosts to improve network security," Security & Privacy Magazine, IEEE, vol. 4, pp. 40-49, 2006.
    • (2006) Security & Privacy Magazine, IEEE , vol.4 , pp. 40-49
    • Jacoby, G.1    Marchany, R.2
  • 14
    • 48749087530 scopus 로고    scopus 로고
    • Analysis: What is a smart phone?
    • J. Best, "Analysis: what is a smart phone?," in Mobile and Wireless, http://networks.silicon.com, 2006.
    • (2006) Mobile and Wireless
    • Best, J.1
  • 17
    • 34547655599 scopus 로고    scopus 로고
    • Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems
    • Richmond, VA
    • T. Buennemeyer, T. Nelson, et al., "Polling the smart battery for efficiency: lifetime optimization in battery-sensing intrusion protection systems," in IEEE Southeast Conf, Richmond, VA, 2007.
    • (2007) IEEE Southeast Conf
    • Buennemeyer, T.1    Nelson, T.2
  • 19
    • 0036104772 scopus 로고    scopus 로고
    • Comparing similar spectra: From similarity index to spectral contrast angle
    • K. Wan, I. Vidavsky, et al., "Comparing similar spectra: from similarity index to spectral contrast angle," Journal of the American Society for Mass Spectrometry, vol. 13, pp. 85-88, 2002.
    • (2002) Journal of the American Society for Mass Spectrometry , vol.13 , pp. 85-88
    • Wan, K.1    Vidavsky, I.2
  • 20
    • 0034270431 scopus 로고    scopus 로고
    • Defending yourself: The role of intrusion detection systems
    • J. McHugh, A. Christie, et al., "Defending yourself: the role of intrusion detection systems," IEEE Software, vol. 17, pp. 42-51, 2000.
    • (2000) IEEE Software , vol.17 , pp. 42-51
    • McHugh, J.1    Christie, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.