-
1
-
-
84947612862
-
-
3rd Generation Partenership Project. Quality of Service (QoS) concept and architecture. Technical Report 3GPP TS 23.107 v6.4.0.
-
3rd Generation Partenership Project. Quality of Service (QoS) concept and architecture. Technical Report 3GPP TS 23.107 v6.4.0.
-
-
-
-
2
-
-
84947611727
-
-
3rd Generation Partnership Project. Physical layer on the radio path; General description. Technical Report 3GPP TS 04.18 v8.26.0.
-
3rd Generation Partnership Project. Physical layer on the radio path; General description. Technical Report 3GPP TS 04.18 v8.26.0.
-
-
-
-
3
-
-
84947618116
-
-
3rd Generation Partnership Project. Physical layer on the radio path; General description. Technical Report 3GPP TS 05.01 v8.9.0.
-
3rd Generation Partnership Project. Physical layer on the radio path; General description. Technical Report 3GPP TS 05.01 v8.9.0.
-
-
-
-
4
-
-
79955807658
-
-
Computer security technology planning study. Technical Report ESD-TR-73-51, The Mitre Corporation, Air Force Electronic Systems Division, Hanscom AFB, Badford, MA
-
Anderson JP. Computer security technology planning study. Technical Report ESD-TR-73-51, The Mitre Corporation, Air Force Electronic Systems Division, Hanscom AFB, Badford, MA, 1972.
-
(1972)
-
-
Anderson, J.P.1
-
5
-
-
79955845505
-
-
Canalys. Smart mobile device market growth remains steady at 55%.
-
Canalys. Smart mobile device market growth remains steady at 55%., 2006.
-
(2006)
-
-
-
6
-
-
0036969616
-
-
Practical Experience with TCP over GPRS. In Proceedings of IEEE GLOBECOM
-
Chakravorty R, Cartwright J, Pratt I. Practical Experience with TCP over GPRS. In Proceedings of IEEE GLOBECOM, 2002.
-
(2002)
-
-
Chakravorty, R.1
Cartwright, J.2
Pratt, I.3
-
7
-
-
79955798185
-
-
F-Secure Corporation. F-Secure Computer Virus Descriptions: Cabir., December
-
F-Secure Corporation. F-Secure Computer Virus Descriptions: Cabir., December 2004.
-
(2004)
-
-
-
8
-
-
79955843330
-
-
F-Secure Corporation. F-Secure Computer Virus Descriptions: Mabir.A., April
-
F-Secure Corporation. F-Secure Computer Virus Descriptions: Mabir.A., April 2005.
-
(2005)
-
-
-
9
-
-
79955859751
-
-
F-Secure Corporation. F-Secure Computer Virus Descriptions: Skulls.A., January
-
F-Secure Corporation. F-Secure Computer Virus Descriptions: Skulls.A., January 2005.
-
(2005)
-
-
-
10
-
-
79955811199
-
-
F-Secure Corporation. F-Secure Malware Information Pages: Worm:SymbOS/Commwarrior.
-
F-Secure Corporation. F-Secure Malware Information Pages: Worm:SymbOS/Commwarrior., 2008.
-
(2008)
-
-
-
11
-
-
79955842338
-
-
Malware Sneaks into Android Market.
-
Ganapati P. Malware Sneaks into Android Market., 2010.
-
(2010)
-
-
Ganapati, P.1
-
12
-
-
79955796448
-
-
Smart Phone Attacks and Defenses. In Proceedings of Third ACM Workshop on Hot Topics in Networks (HotNets-III)
-
Guo C, Wang HJ, Zhu W. Smart Phone Attacks and Defenses. In Proceedings of Third ACM Workshop on Hot Topics in Networks (HotNets-III), 2004.
-
(2004)
-
-
Guo, C.1
Wang, H.J.2
Zhu, W.3
-
13
-
-
84947615676
-
-
Math::Random::MT::Auto-Auto-seeded Mersenne Twister PRNGs. Version 5.01.
-
Hedden J. Math::Random::MT::Auto-Auto-seeded Mersenne Twister PRNGs. Version 5.01.
-
-
-
Hedden, J.1
-
14
-
-
79955854056
-
-
Virus onslaught sickens smartphones.
-
Hickey AR. Virus onslaught sickens smartphones., 2006.
-
(2006)
-
-
Hickey, A.R.1
-
15
-
-
79955829224
-
-
iphone-elite. How to Downgrade screwed up baseband 4.0 (after anySIM and 1.1.1 firmware upgrade).
-
iphone-elite. How to Downgrade screwed up baseband 4.0 (after anySIM and 1.1.1 firmware upgrade)., 2007.
-
(2007)
-
-
-
16
-
-
79955798655
-
-
New iPhone worm steals online banking codes, builds botnet.
-
Keizer G. New iPhone worm steals online banking codes, builds botnet., 2009.
-
(2009)
-
-
Keizer, G.1
-
17
-
-
79955849532
-
-
Securing the X Window system with SELinux. Technical Report 03-006, NAI Labs, March
-
Kilpatrick D, Salamon W, Vance C. Securing the X Window system with SELinux. Technical Report 03-006, NAI Labs, March 2003.
-
(2003)
-
-
Kilpatrick, D.1
Salamon, W.2
Vance, C.3
-
18
-
-
85084160839
-
-
Kingpin and Mudge. Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats. In Proceedings of the 10th USENIX Security Symposium
-
Kingpin and Mudge. Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats. In Proceedings of the 10th USENIX Security Symposium, 2001.
-
(2001)
-
-
-
19
-
-
84947616321
-
-
Motorola..
-
Motorola..
-
-
-
-
20
-
-
84947613378
-
-
National Security Agency. Security Enhanced Linux.
-
National Security Agency. Security Enhanced Linux.
-
-
-
-
21
-
-
84947617574
-
-
OpenEZX. Rokr e2-openezx.
-
OpenEZX. Rokr e2-openezx.
-
-
-
-
22
-
-
79955865717
-
-
Just because its signed doesnt mean it isnt spying on you.
-
Portal SN. Just because its signed doesnt mean it isnt spying on you., 2007.
-
(2007)
-
-
Portal, S.N.1
-
23
-
-
79955836841
-
-
Reuters. Cingular plans mobile banking service for 2007x.
-
Reuters. Cingular plans mobile banking service for 2007x., 2006.
-
(2006)
-
-
-
24
-
-
79955831376
-
-
The Protection of Information in Computer Systems. In Proceedings of the ACM Symposium on Operating System Principles (SOSP)
-
Saltzer J, Schroeder M. The Protection of Information in Computer Systems. In Proceedings of the ACM Symposium on Operating System Principles (SOSP), 1973.
-
(1973)
-
-
Saltzer, J.1
Schroeder, M.2
-
25
-
-
79955854524
-
-
Symbian Limited. Symbian OS-the mobile operating system.
-
Symbian Limited. Symbian OS-the mobile operating system., 2006.
-
(2006)
-
-
-
26
-
-
79955848569
-
-
Symbian Limited. Symbian Signed.
-
Symbian Limited. Symbian Signed., 2006.
-
(2006)
-
-
-
27
-
-
79955794123
-
-
Characterizing the Limitations of Third-Party EAS Over Cellular Text Messaging Services. Technical report, 3G Americas Whitepaper
-
Traynor P. Characterizing the Limitations of Third-Party EAS Over Cellular Text Messaging Services. Technical report, 3G Americas Whitepaper, 2008.
-
(2008)
-
-
Traynor, P.1
-
28
-
-
70349309702
-
Securing Cellular Infrastructure: Challenges and Opportunities
-
Traynor P. Securing Cellular Infrastructure: Challenges and Opportunities. IEEE Security & Privacy Magazine 2009; 7(4).
-
(2009)
IEEE Security & Privacy Magazine
, vol.7
, Issue.4
-
-
Traynor, P.1
-
29
-
-
55849122324
-
Exploiting Open Functionality in SMS-Capable Cellular Networks
-
Traynor P, Enck W, McDaniel P, La Porta T. Exploiting Open Functionality in SMS-Capable Cellular Networks. Journal of Computer Security (JCS) 2008; 16(6): 713-742.
-
(2008)
Journal of Computer Security (JCS)
, vol.16
, Issue.6
, pp. 713-742
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
La Porta, T.4
-
31
-
-
74049108559
-
-
On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core. In Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
Traynor P, Lin M, Ongtang M, et al. On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2009.
-
(2009)
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
-
32
-
-
84871061297
-
-
On Attack Causality in Internet-Connected Cellular Networks. In Proceedings of the USENIX Security Symposium (SECURITY)
-
Traynor P, McDaniel P, La Porta T. On Attack Causality in Internet-Connected Cellular Networks. In Proceedings of the USENIX Security Symposium (SECURITY), 2007.
-
(2007)
-
-
Traynor, P.1
McDaniel, P.2
La Porta, T.3
-
33
-
-
84947613257
-
-
Security enhanced linux policy management framework. url.
-
Security enhanced linux policy management framework. url.
-
-
-
-
34
-
-
79955840100
-
-
Trifinite. BlueBug.
-
Trifinite. BlueBug., 2004.
-
(2004)
-
-
|