메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Mobile device profiling and intrusion detection using smart batteries

Author keywords

[No Author keywords available]

Indexed keywords

CELLULAR TELEPHONE SYSTEMS; COMPUTER CRIME; COMPUTER NETWORKS; ELECTRIC BREAKDOWN; MOBILE COMPUTING; PORTABLE EQUIPMENT; TELECOMMUNICATION EQUIPMENT; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 51449120796     PISSN: 15301605     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/HICSS.2008.319     Document Type: Conference Paper
Times cited : (71)

References (18)
  • 1
    • 39749120747 scopus 로고    scopus 로고
    • Battery-sensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection
    • IEEE Computer Soc, Waikoloa, Hawaii
    • T. Buennemeyer, F. Munshi, et al., "Battery-sensing intrusion protection for wireless handheld computers using a dynamic threshold calculation algorithm for attack detection," in 40th Annual Hawaii Int'l Conf on System Sciences (HICSS-40), IEEE Computer Soc., Waikoloa, Hawaii, 2007.
    • (2007) 40th Annual Hawaii Int'l Conf on System Sciences (HICSS-40)
    • Buennemeyer, T.1    Munshi, F.2
  • 2
    • 51449101551 scopus 로고    scopus 로고
    • Microsoft, Advanced power management v1.2, http://microsoft.com/whdc/archive/amp_12.mspx, 2001.
    • Microsoft, "Advanced power management v1.2," http://microsoft.com/whdc/archive/amp_12.mspx, 2001.
  • 3
    • 51449093144 scopus 로고    scopus 로고
    • "Advanced configuration and power interface," http://www.acpi.info, 2005.
    • (2005)
  • 7
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad-hoc wireless networks
    • Cambridge, UK
    • F. Stajano and R. Anderson, "The resurrecting duckling: security issues for ad-hoc wireless networks," in 7th Int'l Workshop on Security Protocols, Cambridge, UK, 1999.
    • (1999) 7th Int'l Workshop on Security Protocols
    • Stajano, F.1    Anderson, R.2
  • 9
    • 51449085415 scopus 로고    scopus 로고
    • Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
    • Vancouver, BC
    • R. Racic, D. Ma, et al., "Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery," in 15th USENIX Security Symposium, Vancouver, BC, 2006.
    • (2006) 15th USENIX Security Symposium
    • Racic, R.1    Ma, D.2
  • 12
    • 48749093353 scopus 로고    scopus 로고
    • Using battery constraints within mobile hosts to improve network security
    • G. Jacoby, R. Marchany, et al., "Using battery constraints within mobile hosts to improve network security," Security & Privacy Magazine, IEEE, vol. 4, pp. 40-49, 2006.
    • (2006) Security & Privacy Magazine, IEEE , vol.4 , pp. 40-49
    • Jacoby, G.1    Marchany, R.2
  • 15
    • 51449092070 scopus 로고    scopus 로고
    • Dallas Semiconductor, Lithium-ion cell fuel gauging with Dallas Semiconductor battery monitor ICs, 2001.
    • Dallas Semiconductor, "Lithium-ion cell fuel gauging with Dallas Semiconductor battery monitor ICs," 2001.
  • 16
    • 34547655599 scopus 로고    scopus 로고
    • Polling the smart battery for efficiency: Lifetime optimization in battery-sensing intrusion protection systems
    • Richmond, VA
    • T. Buennemeyer, T. Nelson, et al., "Polling the smart battery for efficiency: lifetime optimization in battery-sensing intrusion protection systems," in IEEE Southeast Conf, Richmond, VA, 2007.
    • (2007) IEEE Southeast Conf
    • Buennemeyer, T.1    Nelson, T.2
  • 17
    • 48749122337 scopus 로고    scopus 로고
    • Battery polling and trace determination for bluetooth attack detection in mobile devices
    • West Point, NY
    • T. Buennemeyer, T. Nelson, et al., "Battery polling and trace determination for bluetooth attack detection in mobile devices," in 8th Annual IEEE SMC Information Assurance Workshop, West Point, NY, 2007.
    • (2007) 8th Annual IEEE SMC Information Assurance Workshop
    • Buennemeyer, T.1    Nelson, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.