-
2
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
A. V. Aho and M. J. Corasick. Efficient string matching: an aid to bibliographic search. Communications of the ACM, 18(6):333-340, 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.6
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
4
-
-
18644363579
-
Deep packet filter with dedicated logic and read only memories
-
FCCM 2004. 12th Annual IEEE Symposium on IEEE, 2004
-
Y. H. Cho and W. H. Mangione-Smith. Deep packet filter with dedicated logic and read only memories. In Field-Programmable Custom Computing Machines, 2004. FCCM 2004. 12th Annual IEEE Symposium on, pages 125-134. IEEE, 2004.
-
(2004)
Field-Programmable Custom Computing Machines
, pp. 125-134
-
-
Cho, Y.H.1
Mangione-Smith, W.H.2
-
5
-
-
84881179333
-
-
Feb.
-
S. Clark. http://www.nfcworld.com/2012/02/09/313079/researcher-hacks- google-wallet-pin-on-rooted-android-phone/, Feb. 2012.
-
(2012)
-
-
Clark, S.1
-
7
-
-
35048818195
-
Increasing performance in high speed NIDs
-
N. Desai. Increasing performance in high speed NIDs. A look at Snort's Internals, 2002.
-
(2002)
A Look at Snort's Internals
-
-
Desai, N.1
-
8
-
-
1842478680
-
Deep packet inspection using parallel bloom filters
-
S. Dharmapurikar, P. Krishnamurthy, T. S. Sproull, and J. W. Lockwood. Deep packet inspection using parallel bloom filters. Micro, IEEE, 24(1):52-61, 2004.
-
(2004)
Micro, IEEE
, vol.24
, Issue.1
, pp. 52-61
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Sproull, T.S.3
Lockwood, J.W.4
-
10
-
-
80053135174
-
They can hear your heartbeats: Non-invasive security for implantable medical devices
-
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: non-invasive security for implantable medical devices. In Proceedings of SIGCOMM, 2011.
-
(2011)
Proceedings of SIGCOMM
-
-
Gollakota, S.1
Hassanieh, H.2
Ransford, B.3
Katabi, D.4
Fu, K.5
-
11
-
-
50249098733
-
Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses
-
IEEE
-
D. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. Maisel. Pacemakers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses. In IEEE Symposium on Security and Privacy, pages 129-142. IEEE, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 129-142
-
-
Halperin, D.1
Heydt-Benjamin, T.2
Ransford, B.3
Clark, S.4
Defend, B.5
Morgan, W.6
Fu, K.7
Kohno, T.8
Maisel, W.9
-
12
-
-
79952350393
-
Hijacking power and bandwidth from the mobile phone's audio interface
-
ACM
-
Y. Kuo, S. Verma, T. Schmid, and P. Dutta. Hijacking power and bandwidth from the mobile phone's audio interface. In Proceedings of the First ACM Symposium on Computing for Development, page 24. ACM, 2010.
-
(2010)
Proceedings of the First ACM Symposium on Computing for Development
, pp. 24
-
-
Kuo, Y.1
Verma, S.2
Schmid, T.3
Dutta, P.4
-
13
-
-
84881177064
-
-
June
-
R. Lemos. http://www.eweek.com/c/a/security/android-phone-hacked-by- researchers-via-nfc-843123/, June 2012.
-
(2012)
-
-
Lemos, R.1
-
14
-
-
84864334953
-
Software abstractions for trusted sensors
-
ACM
-
H. Liu, S. Saroiu, A. Wolman, and H. Raj. Software abstractions for trusted sensors. In Proceedings of the 10th international conference on Mobile systems, Applications, and Services, pages 365-378. ACM, 2012.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services
, pp. 365-378
-
-
Liu, H.1
Saroiu, S.2
Wolman, A.3
Raj, H.4
-
15
-
-
84881139754
-
-
Dec.
-
McAfee Labs. http://www.mcafee.com/us/resources/reports/rp-threat- predictions-2013.pdf, Dec. 2012.
-
(2012)
-
-
-
17
-
-
85094317081
-
A platform for RFID security and privacy administration
-
M. Rieback, G. Gaydadjiev, B. Crispo, R. Hofman, and A. Tanenbaum. A platform for RFID security and privacy administration. In USENIX LISA, pages 89-102, 2006.
-
(2006)
USENIX LISA
, pp. 89-102
-
-
Rieback, M.1
Gaydadjiev, G.2
Crispo, B.3
Hofman, R.4
Tanenbaum, A.5
-
18
-
-
79251591926
-
Livelab: Measuring wireless networks and smartphone users in the field
-
C. Shepard, A. Rahmati, C. Tossell, L. Zhong, and P. Kortum. Livelab: measuring wireless networks and smartphone users in the field. ACM SIGMETRICS Performance Evaluation Review, 38(3):15-20, 2011.
-
(2011)
ACM SIGMETRICS Performance Evaluation Review
, vol.38
, Issue.3
, pp. 15-20
-
-
Shepard, C.1
Rahmati, A.2
Tossell, C.3
Zhong, L.4
Kortum, P.5
-
19
-
-
84860267053
-
An amulet for trustworthy wearable mhealth
-
ACM
-
J. Sorber, M. Shin, R. Peterson, C. Cornelius, S. Mare, A. Prasad, Z. Marois, E. Smithayer, and D. Kotz. An amulet for trustworthy wearable mhealth. In Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications, page 7. ACM, 2012.
-
(2012)
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
, pp. 7
-
-
Sorber, J.1
Shin, M.2
Peterson, R.3
Cornelius, C.4
Mare, S.5
Prasad, A.6
Marois, Z.7
Smithayer, E.8
Kotz, D.9
-
20
-
-
84864353539
-
Plug-n-trust: Practical trusted sensing for mhealth
-
ACM
-
J. Sorber, M. Shin, R. Peterson, and D. Kotz. Plug-n-trust: practical trusted sensing for mhealth. In Proceedings of the 10th international conference on Mobile systems, Applications, and Services, pages 309-322. ACM, 2012.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services
, pp. 309-322
-
-
Sorber, J.1
Shin, M.2
Peterson, R.3
Kotz, D.4
-
21
-
-
84881152045
-
-
Dec.
-
viaForensics. https://viaforensics.com/mobile-security/forensics- security-analysis-google-wallet.html, Dec. 2011.
-
(2011)
-
-
|