-
3
-
-
84875654471
-
-
Available at
-
Mobile Threat Report. Available at http://bit.ly/ImefoN/.
-
Mobile Threat Report
-
-
-
4
-
-
84877940401
-
-
Available at
-
PPLive. Available at http://www.synacast.com/en/.
-
PPLive
-
-
-
9
-
-
0344878694
-
Radiofrequency interference with medical devices: A technical information statement
-
H. Bassen. Radiofrequency interference with medical devices. a technical information statement. IEEE Engineering in Medicine and Biology, 17(3):111-114, 1998. (Pubitemid 28240551)
-
(1998)
IEEE Engineering in Medicine and Biology Magazine
, vol.17
, Issue.3
, pp. 111-114
-
-
Bassen, H.I.1
-
10
-
-
84970901426
-
Touchlogger: Inferring keystrokes on touch screen from smartphone motion
-
L. Cai and H. Chen. Touchlogger: inferring keystrokes on touch screen from smartphone motion. In Proc. of USENIX HotSec, 2011.
-
Proc. of USENIX HotSec, 2011
-
-
Cai, L.1
Chen, H.2
-
12
-
-
66649129942
-
The pollution attack in p2p live video streaming: Measurement results and defenses
-
P. Dhungel, X. Hei, K. W. Ross, and N. Saxena. The pollution attack in p2p live video streaming: measurement results and defenses. In Proc. of P2P-TV, 2007.
-
Proc. of P2P-TV, 2007
-
-
Dhungel, P.1
Hei, X.2
Ross, K.W.3
Saxena, N.4
-
13
-
-
80051484444
-
An improved sms based heterogeneous mobile botnet model
-
G. Geng, G. Xu, M. Zhang, Y. Yang, and G. Yang. An improved sms based heterogeneous mobile botnet model. In Proc. of IEEE ICIA, 2011.
-
Proc. of IEEE ICIA, 2011
-
-
Geng, G.1
Xu, G.2
Zhang, M.3
Yang, Y.4
Yang, G.5
-
14
-
-
70349193896
-
Audio steganography for covert data transmissions by imperceptible tone insertion
-
Available at
-
K. Gopalan and S. Wenndt. Audio steganography for covert data transmissions by imperceptible tone insertion. In Communication systems and applications, Available at http://qcn.stanford.edu/, 2004.
-
(2004)
Communication Systems and Applications
-
-
Gopalan, K.1
Wenndt, S.2
-
16
-
-
84863297774
-
ACComplice: Location Inference using Accelerometers on Smartphones
-
J. Han, E. Owusu, T.-L. Nguyen, A. Perrig, and J. Zhang. ACComplice: Location Inference using Accelerometers on Smartphones. In Proc. of COMSNETS, Jan. 2012.
-
Proc. of COMSNETS, Jan. 2012
-
-
Han, J.1
Owusu, E.2
Nguyen, T.-L.3
Perrig, A.4
Zhang, J.5
-
17
-
-
77249113101
-
-
Harris Interactive. Available at
-
Harris Interactive. Teenagers: A Generation Unplugged. Available at http://bit.ly/IyH71E, 2008.
-
(2008)
Teenagers: A Generation Unplugged
-
-
-
19
-
-
84870431329
-
A sms-based mobile botnet using flooding algorithm
-
J. Hua and K. Sakurai. A sms-based mobile botnet using flooding algorithm. In Proc. of WISTP, 2011.
-
Proc. of WISTP, 2011
-
-
Hua, J.1
Sakurai, K.2
-
20
-
-
79955468168
-
Influence of user perception, security needs, and social factors on device pairing method choices
-
I. Ion, M. Langheinrich, P. Kumaraguru, and S. Capkun. Influence of user perception, security needs, and social factors on device pairing method choices. In Proc. of SOUPS, 2010.
-
Proc. of SOUPS, 2010
-
-
Ion, I.1
Langheinrich, M.2
Kumaraguru, P.3
Capkun, S.4
-
22
-
-
79958168340
-
Two heads are better than one: Security and usability of device associations in group scenarios
-
R. Kainda, I. Flechais, and A. W. Roscoe. Two heads are better than one: Security and usability of device associations in group scenarios. In Proc. of SOUPS, pages 1-13, 2010.
-
(2010)
Proc. of SOUPS
, pp. 1-13
-
-
Kainda, R.1
Flechais, I.2
Roscoe, A.W.3
-
23
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
ACM
-
H. Kim, J. Smith, and K. G. Shin. Detecting energy-greedy anomalies and mobile malware variants. In Proc. of MobiSys. ACM, 2008.
-
(2008)
Proc. of MobiSys.
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
26
-
-
84861598862
-
Can open wifi networks be lethal weapons for botnets?
-
to appear
-
M. Knysz, X. Hu, Y. Zeng, and K. G. Shin. Can open wifi networks be lethal weapons for botnets? In Proc. of INFOCOM, to appear, 2012.
-
(2012)
Proc. of INFOCOM
-
-
Knysz, M.1
Hu, X.2
Zeng, Y.3
Shin, K.G.4
-
27
-
-
70350738597
-
Serial hook-ups: A comparative usability study of secure device pairing methods
-
A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun, and Y. Wang. Serial hook-ups: A comparative usability study of secure device pairing methods. In Proc. of SOUPS, 2009.
-
Proc. of SOUPS, 2009
-
-
Kobsa, A.1
Sonawalla, R.2
Tsudik, G.3
Uzun, E.4
Wang, Y.5
-
29
-
-
84904466354
-
College Student's Hand-phone Usage Culture Survey
-
D. Lee. College Student's Hand-phone Usage Culture Survey. In University Culture Newspaper, 2002.
-
(2002)
University Culture Newspaper
-
-
Lee, D.1
-
30
-
-
77949505341
-
Clinically significant magnetic interference of implanted cardiac devices by portable headphones
-
October
-
S. Lee, K. Fu, T. Kohno, B. Ransford, and W. Maisel. Clinically significant magnetic interference of implanted cardiac devices by portable headphones. Heart rhythm : the official journal of the Heart Rhythm Society, 6(10), October 2009.
-
(2009)
Heart Rhythm: The Official Journal of the Heart Rhythm Society
, vol.6
, Issue.10
-
-
Lee, S.1
Fu, K.2
Kohno, T.3
Ransford, B.4
Maisel, W.5
-
39
-
-
84877991794
-
Stegobot: A covert social network botnet
-
S. Nagaraja, A. Houmansadr, P. Piyawongwisal, V. Singh, P. Agarwal, and N. Borisov. Stegobot: a covert social network botnet. In Proc. of IH, 2011.
-
Proc. of IH, 2011
-
-
Nagaraja, S.1
Houmansadr, A.2
Piyawongwisal, P.3
Singh, V.4
Agarwal, P.5
Borisov, N.6
-
40
-
-
84860294696
-
ACCessory: Keystroke Inference using Accelerometers on Smartphones
-
E. Owusu, J. Han, S. Das, A. Perrig, and J. Zhang. ACCessory: Keystroke Inference using Accelerometers on Smartphones. In Proc. of HotMobile), Feb. 2012.
-
Proc. of HotMobile, Feb. 2012
-
-
Owusu, E.1
Han, J.2
Das, S.3
Perrig, A.4
Zhang, J.5
-
43
-
-
84877997420
-
Authentication technologies for the blind or visually impaired
-
N. Saxena and J. H. Watt. Authentication technologies for the blind or visually impaired. In Proc. of USENIX HotSec, 2009.
-
Proc. of USENIX HotSec, 2009
-
-
Saxena, N.1
Watt, J.H.2
-
44
-
-
84857164924
-
Soundcomber: A stealthy and context-aware sound trojan for smartphones
-
R. Schlegel, K. Zhang, X. yong Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundcomber: A stealthy and context-aware sound trojan for smartphones. In Proc. of NDSS, 2011.
-
Proc. of NDSS, 2011
-
-
Schlegel, R.1
Zhang, K.2
Yong Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
46
-
-
84870406397
-
Evaluating bluetooth as a medium for botnet command and control
-
K. Singh, S. Sangal, N. Jain, P. Traynor, and W. Lee. Evaluating bluetooth as a medium for botnet command and control. In Proc. of DIMVA, 2010.
-
Proc. of DIMVA, 2010
-
-
Singh, K.1
Sangal, S.2
Jain, N.3
Traynor, P.4
Lee, W.5
-
48
-
-
79957956581
-
America's Cellular Telephone Obsession: New Geographies of Personal Communication
-
T. A. Wikle. America's Cellular Telephone Obsession: New Geographies of Personal Communication. In Journal of American and Comparative Cultures, 2001.
-
(2001)
Journal of American and Comparative Cultures
-
-
Wikle, T.A.1
-
49
-
-
85084094893
-
Andbot: Towards advanced mobile botnets
-
C. Xiang, F. Binxing, Y. Lihua, L. Xiaoyi, and Z. Tianning. Andbot: towards advanced mobile botnets. In Proc. of USENIX LEET, 2011.
-
Proc. of USENIX LEET, 2011
-
-
Xiang, C.1
Binxing, F.2
Lihua, Y.3
Xiaoyi, L.4
Tianning, Z.5
-
50
-
-
84860677644
-
Design of SMS commanded and controlled and P2P structured mobile botnets
-
Y. Zeng, K. Shin, and X. Hu. Design of SMS commanded and controlled and P2P structured mobile botnets. In Proc. of ACM WiSec, 2012.
-
Proc. of ACM WiSec, 2012
-
-
Zeng, Y.1
Shin, K.2
Hu, X.3
|