-
1
-
-
39749120747
-
Battery-sensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection
-
IEEE Computer Soc, Waikoloa, HI
-
T. Buennemeyer, F. Munshi, et al., "Battery-sensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection," in 40th Annual Hawaii Int'l Conf on System Sciences (HICSS-40), IEEE Computer Soc., Waikoloa, HI, 2007.
-
(2007)
40th Annual Hawaii Int'l Conf on System Sciences (HICSS-40)
-
-
Buennemeyer, T.1
Munshi, F.2
-
2
-
-
48749085619
-
-
Microsoft, Advanced power management v1.2, http://www.microsoft.com/whdc/archive/amp_12.mspx, 2001.
-
Microsoft, "Advanced power management v1.2," http://www.microsoft.com/whdc/archive/amp_12.mspx, 2001.
-
-
-
-
3
-
-
48749110578
-
-
"Advanced configuration and power interface," http://acpi.info, 2005.
-
(2005)
-
-
-
7
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Cambridge, UK
-
F. Stajano and R. Anderson, "The resurrecting duckling: security issues for ad-hoc wireless networks," in 7th Int'l Workshop on Security Protocols, Cambridge, UK, 1999.
-
(1999)
7th Int'l Workshop on Security Protocols
-
-
Stajano, F.1
Anderson, R.2
-
8
-
-
2642584004
-
Denial-of-service attacks on battery-powered mobile computers
-
Orlando, FL
-
T. Martin, M. Hsiao, et al., "Denial-of-service attacks on battery-powered mobile computers," in 2nd Annual IEEE Conference on Pervasive Computing and Communications, Orlando, FL, 2004.
-
(2004)
2nd Annual IEEE Conference on Pervasive Computing and Communications
-
-
Martin, T.1
Hsiao, M.2
-
9
-
-
51449085415
-
Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
-
Vancouver, BC
-
R. Racic, D. Ma, et al., "Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery," in 15th Annual USENIX Security Symposium, Vancouver, BC, 2006.
-
(2006)
15th Annual USENIX Security Symposium
-
-
Racic, R.1
Ma, D.2
-
10
-
-
84934300624
-
Battery exhaustion attack detection with small handheld mobile computers
-
Orlando, FL
-
T. Buennemeyer, M. Gora, et al., "Battery exhaustion attack detection with small handheld mobile computers," in IEEE Int'l Conf on Portable Information Devices (Portable '07), Orlando, FL, 2007.
-
(2007)
IEEE Int'l Conf on Portable Information Devices (Portable '07)
-
-
Buennemeyer, T.1
Gora, M.2
-
11
-
-
33644854066
-
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
-
Kauai Island, HI
-
D. Nash, T. Martin, et al., "Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices," in 3rd IEEE Int'l Conf on Pervasive Computing and Communications Workshops (PerCom '05), Kauai Island, HI, 2005.
-
(2005)
3rd IEEE Int'l Conf on Pervasive Computing and Communications Workshops (PerCom '05)
-
-
Nash, D.1
Martin, T.2
-
12
-
-
48749093353
-
Using battery constraints within mobile hosts to improve network security
-
G. Jacoby, R. Marchany, et al., "Using battery constraints within mobile hosts to improve network security," Security & Privacy Magazine, IEEE, vol. 4, pp. 40-49, 2006.
-
(2006)
Security & Privacy Magazine, IEEE
, vol.4
, pp. 40-49
-
-
Jacoby, G.1
Marchany, R.2
-
14
-
-
48749087530
-
Analysis: What is a smart phone?
-
J. Best, "Analysis: what is a smart phone?," in Mobile and Wireless, http://networks.silicon.com, 2006.
-
(2006)
Mobile and Wireless
-
-
Best, J.1
-
15
-
-
33845933985
-
Battery-sensing intrusion protection system
-
West Point, NY
-
T. Buennemeyer, G. Jacoby, et al., "Battery-sensing intrusion protection system," in the 7th Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop, West Point, NY, 2006.
-
(2006)
the 7th Annual IEEE Systems, Man and Cybernetics (SMC) Information Assurance Workshop
-
-
Buennemeyer, T.1
Jacoby, G.2
-
17
-
-
34547655599
-
Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems
-
Richmond, VA
-
T. Buennemeyer, T. Nelson, et al., "Polling the smart battery for efficiency: lifetime optimization in battery-sensing intrusion protection systems," in IEEE Southeast Conf, Richmond, VA, 2007.
-
(2007)
IEEE Southeast Conf
-
-
Buennemeyer, T.1
Nelson, T.2
-
19
-
-
0036104772
-
Comparing similar spectra: From similarity index to spectral contrast angle
-
K. Wan, I. Vidavsky, et al., "Comparing similar spectra: from similarity index to spectral contrast angle," Journal of the American Society for Mass Spectrometry, vol. 13, pp. 85-88, 2002.
-
(2002)
Journal of the American Society for Mass Spectrometry
, vol.13
, pp. 85-88
-
-
Wan, K.1
Vidavsky, I.2
-
20
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
J. McHugh, A. Christie, et al., "Defending yourself: the role of intrusion detection systems," IEEE Software, vol. 17, pp. 42-51, 2000.
-
(2000)
IEEE Software
, vol.17
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
|