-
2
-
-
77951731359
-
-
v1.2
-
Microsoft, "Advanced Power Management v1.2," http://www.microsoft.com/whdc/archive/amp-12.mspx, 2008.
-
(2008)
Advanced Power Management
-
-
-
4
-
-
0036999904
-
The Resurrecting Duckling: Security Issues for Ubiquitous Computing
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues For Ubiquitous Computing," Computer, vol. 35, pp. 22-26, 2002.
-
(2002)
Computer
, vol.35
, pp. 22-26
-
-
Stajano, F.1
Anderson, R.2
-
5
-
-
2642584004
-
Denial-of-service attacks on battery-powered mobile computers
-
T. Martin, M. Hsiao, Ha Dong, and J. Krishnaswami, "Denial-of- service attacks on battery-powered mobile computers," in Pervasive Computing and Communications (PerCom '04), pp. 309-318, 2004.
-
(2004)
Pervasive Computing and Communications (PerCom '04)
, pp. 309-318
-
-
Martin, T.1
Hsiao, M.2
Dong, H.3
Krishnaswami, J.4
-
6
-
-
33644854066
-
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
-
D. C. Nash, T. L. Martin, D. S. Ha, and M. S. Hsiao, "Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices," in Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on, pp. 141-145, 2005.
-
(2005)
Pervasive Computing and Communications Workshops, 2005. PerCom 2005 Workshops. Third IEEE International Conference on
, pp. 141-145
-
-
Nash, D.C.1
Martin, T.L.2
Ha, D.S.3
Hsiao, M.S.4
-
7
-
-
18144404261
-
Battery-based intrusion detection
-
G. A. Jacoby and N. J. Davis, "Battery-based intrusion detection," in Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE, pp. 2250-2255 Vol.4, 2004.
-
(2004)
Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE
, vol.4
, pp. 2250-2255
-
-
Jacoby, G.A.1
Davis, N.J.2
-
8
-
-
15944386956
-
Battery-Based Intrusion Detection: A First Line of Defense
-
G. A. Jacoby, R. Marchany, and N. J. Iv Davis, "Battery-Based Intrusion Detection: A First Line of Defense," in Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, pp. 272-279, 2004.
-
(2004)
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
, pp. 272-279
-
-
Jacoby, G.A.1
Marchany, R.2
Iv Davis, N.J.3
-
9
-
-
36348943408
-
How Mobile Host Batteries Can Improve Network Security
-
G. A. Jacoby, R. Marchany, and N. Davis, "How Mobile Host Batteries Can Improve Network Security," Security & Privacy, IEEE, vol. 4, pp. 40-49, 2006.
-
(2006)
Security & Privacy, IEEE
, vol.4
, pp. 40-49
-
-
Jacoby, G.A.1
Marchany, R.2
Davis, N.3
-
10
-
-
77951470832
-
-
Doctoral Dissertation, Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg,VA
-
T.K. Buennemeyer, "Battery-Sensing Intrusion Protection System (B-SIPS)," Doctoral Dissertation, Bradley Department of Electrical and Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg,VA, 2008.
-
(2008)
Battery-Sensing Intrusion Protection System (B-SIPS)
-
-
Buennemeyer, T.K.1
-
11
-
-
77951741064
-
-
LeCroy, "Merlin II Analyzers," http://www.lecroy.com/tm/ products/ProtocolAnalyzers/MerlinII.asp?menuid=60, 2008.
-
(2008)
Merlin II Analyzers
-
-
-
12
-
-
77951755723
-
-
Remote-Exploit, "Backtrack 3," http://www.remoteexploit.org/ backtrack-download.html, 2008.
-
(2008)
Backtrack 3
-
-
|