-
1
-
-
69649100696
-
Atestbed for mobile social computing
-
IEEE, doi:10.1109/TRIDENTCOM.2009.4976250
-
Alazzawe,A.,Wijesekera, D.,Dantu, R.. (2009). Atestbed for mobile social computing. 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks Communities and Workshops, (pp. 1-6). IEEE. doi:10.1109/TRIDENTCOM.2009.4976250
-
(2009)
2009 5th International Conference On Testbeds and Research Infrastructures For the Development of Networks Communities and Workshops
, pp. 1-6
-
-
Alazzawe, A.1
Wijesekera, D.2
Dantu, R.3
-
2
-
-
78650112569
-
Location-based crowdsourcing: Extending crowdsourcing to the real world
-
2, ACM, Retrieved from
-
th Nordic Conference on Human-Computer Interaction: Extending Boundaries, (pp., 13-2)2. ACM. Retrieved from http://portal.acm.org/citation.cfm?id=1868921
-
(2010)
th Nordic Conference On Human-Computer Interaction: Extending Boundaries
, pp. 13-14
-
-
Alt, F.1
Shirazi, A.S.2
Schmidt, A.3
Kramer, U.4
Nawaz, Z.5
-
3
-
-
79951716928
-
Common sense: Mobile environmental sensing platforms to support community action and citizen science
-
Retrieved from
-
Aoki, P. M., Honicky, R. J., Mainwaring, A., My-ers, C., Paulos, E., Subramanian, S., & Woodruff, A. (2008). Common sense: Mobile environmental sensing platforms to support community action and citizen science. Adjunct Proceedings of the Tenth International Conference on Ubiquitous Computing, (pp. 59-60). Retrieved from http://www.paulaoki.com/papers/ubicomp08-demo.pdf
-
(2008)
Adjunct Proceedings of the Tenth International Conference On Ubiquitous Computing
, pp. 59-60
-
-
Aoki, P.M.1
Honicky, R.J.2
Mainwaring, A.3
My-Ers, C.4
Paulos, E.5
Subramanian, S.6
Woodruff, A.7
-
4
-
-
77955227439
-
Automated analysis of feature models 20 years later: A literature review
-
doi:10.1016/j.is.2010.01.001
-
Benavides, D., Segura, S., & Ruiz-Cortés, A. (2010). Automated analysis of feature models 20 years later: A literature review. Information Systems, 35(6). doi:10.1016/j.is.2010.01.001
-
(2010)
Information Systems
, vol.35
, Issue.6
-
-
Benavides, D.1
Segura, S.2
Ruiz-Cortés, A.3
-
5
-
-
25144450482
-
Automated reasoning on feature models
-
Retrieved from
-
Benavides, D., Trinidad, P., & Ruiz-Cortés, A. (2005). Automated reasoning on feature models. Advanced Information Systems Engineering, Lecture Notes in Computer Science, 3520, (pp. 381-390). Retrieved from http://www.springer-link.com/ content/qh6yvx3y6pxet8ex/
-
(2005)
Advanced Information Systems Engineering, Lecture Notes In Computer Science, 3520
, pp. 381-390
-
-
Benavides, D.1
Trinidad, P.2
Ruiz-Cortés, A.3
-
6
-
-
50049087364
-
On mobile viruses exploiting messaging and Bluetooth services
-
doi:10.1109/SECCOMW.2006.359562
-
Bose, A., & Shin, K. G. (2006). On mobile viruses exploiting messaging and Bluetooth services. Securecomm and Workshops, 2006, 1-10. doi:10.1109/SECCOMW.2006.359562
-
(2006)
Securecomm and Workshops 2006
, pp. 1-10
-
-
Bose, A.1
Shin, K.G.2
-
7
-
-
75449117714
-
Participatory sensing
-
Citeseer, doi:10.1109/MIC.2010.12
-
Burke, J., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., and Srivastava, M. B. (2006). Participatory sensing. IEEE Internet Computing, 14(1), 12-42. Citeseer. doi:10.1109/MIC.2010.12
-
(2006)
IEEE Internet Computing
, vol.14
, Issue.1
, pp. 12-42
-
-
Burke, J.1
Estrin, D.2
Hansen, M.3
Parker, A.4
Ramanathan, N.5
Reddy, S.6
Srivastava, M.B.7
-
8
-
-
70349118942
-
Transparent checkpoints of closed distributed systems in emulab
-
ACM Press, doi:10.1145/1519065.1519084
-
Burtsev, A., Radhakrishnan, P., Hibler, M., & Lepreau, J. (2009). Transparent checkpoints of closed distributed systems in emulab. Proceedings of the Fourth ACM European Conference on Computer Systems EuroSys 09, (p. 173). ACM Press. doi:10.1145/1519065.1519084
-
(2009)
Proceedings of the Fourth ACM European Conference On Computer Systems EuroSys 09
, pp. 173
-
-
Burtsev, A.1
Radhakrishnan, P.2
Hibler, M.3
Lepreau, J.4
-
9
-
-
84923201020
-
Defending against sensor-sniffing ATAACKs on mobile phones
-
NewYork, NY:ACM, doi
-
Cai, L., Machiraju, S., & Chen, H. (2009). Defending against sensor-sniffing ATAACKs on mobile phones. Proceedings of the 1st ACM Workshop on Networking, Systems, and Applications for Mobile Handhelds (pp. 31-36). NewYork, NY:ACM. doi: http://doi.acm.org/10.1145/1592606.1592614
-
(2009)
Proceedings of the 1st ACM Workshop On Networking, Systems, and Applications For Mobile Handhelds
, pp. 31-36
-
-
Cai, L.1
Machiraju, S.2
Chen, H.3
-
10
-
-
47649085662
-
The rise of people-centric sensing
-
doi:10.1109/MIC.2008.90 Retrieved from
-
Campbell, A. T., Eisenman, S. B., & Lane, N. D. (2008). The rise of people-centric sensing. IEEE Internet Computing, 12(4). Retrieved from http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2008.90 doi:10.1109/MIC.2008.90
-
(2008)
IEEE Internet Computing
, vol.12
, Issue.4
-
-
Campbell, A.T.1
Eisenman, S.B.2
Lane, N.D.3
-
11
-
-
3543049206
-
Distributed computing research issuesingridcomputing
-
ACM. doi:10.1145/582475.582486
-
Casanova, H. (2002). Distributed computing research issuesingridcomputing.ACMSIGACTNews, 33(3), 50-70. ACM. doi:10.1145/582475.582486
-
(2002)
ACMSIGACTNews
, vol.33
, Issue.3
, pp. 50-70
-
-
Casanova, H.1
-
12
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
ACM, Retrieved from
-
Cheng, J., Wong, S. H. Y., Yang, H., & Lu, S. (2007). SmartSiren: Virus detection and alert for smartphones. Proceedings of the 5th International Conference on Mobile Systems Applications and Services (pp. 258-271). ACM. Retrieved from https://www.usenix.org/events/mobisys07/full_papers/p258.pdf
-
(2007)
Proceedings of the 5th International Conference On Mobile Systems Applications and Services
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.Y.2
Yang, H.3
Lu, S.4
-
13
-
-
77951289727
-
Testbed experiments on the location to service translation (LoST) protocol for mobile users
-
IEEE, doi:10.1109/CCNC.2010.5421603
-
Chintapatla, B., Goulart, A., & Magnussen, W. (2010). Testbed experiments on the location to service translation (LoST) protocol for mobile users. 2010 7th IEEE Consumer Communications and Networking Conference, (pp. 1-5). IEEE. doi:10.1109/CCNC.2010.5421603
-
(2010)
2010 7th IEEE Consumer Communications and Networking Conference
, pp. 1-5
-
-
Chintapatla, B.1
Goulart, A.2
Magnussen, W.3
-
14
-
-
84898179063
-
Global PC market maintains double-digit growth in third quarter despite weak results in some segments, according to IDC
-
Retrieved from
-
Chou, J., O'Donnell, B., & Shrirer, M. (2010). Global PC market maintains double-digit growth in third quarter despite weak results in some segments, according to IDC. International Data Corporation. Retrieved from http://www.businesswire.com/ news/home/20101013007002/en/Global-PC-Market-Maintains-Double-Digit-Growth-Quarter
-
(2010)
International Data Corporation
-
-
Chou, J.1
O'Donnell, B.2
Shrirer, M.3
-
15
-
-
85025697660
-
Survey demonstrates poor smartphone security attitude amongst users
-
Credant Technologies., Retrieved from
-
Credant Technologies. (2009). Survey demonstrates poor smartphone security attitude amongst users. Credant Technologies. Retrieved fromhttp://www.prosecurityzone.com/News/It_security/Mobile_computing_security/Survey_demonstrates_poor_smartphone_security_attitude_ amongst_users_8942.asp#axzz1jxol1VYk
-
(2009)
Credant Technologies
-
-
-
16
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
doi:10.1109/MPRV.2004.21
-
Dagon, D., Martin, T., & Starner, T. (2004). Mobile phones as computing devices: The viruses are coming! Pervasive Computing, 3(4), 11-15. doi:10.1109/MPRV.2004.21
-
(2004)
Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
17
-
-
76649132306
-
Txteagle: Mobile crowdsourcing
-
In N. Aykin (Ed.), 456, Berlin, Germany, Springer, doi:10.1007/978-3-642-02767-3
-
Eagle, N. (2009). Txteagle: Mobile crowdsourcing. In N. Aykin (Ed.), International Conference on Internationalization Design and Global Development (Vol. 5623, pp. 447-456-456). Berlin, Germany: Springer. doi:10.1007/978-3-642-02767-3
-
(2009)
International Conference On Internationalization Design and Global Development
, pp. 447-456
-
-
Eagle, N.1
-
18
-
-
19944388571
-
Social serendipity: Mobilizing social software
-
doi:10.1109/MPRV.2005.37
-
Eagle, N., & Pentland,A. (2005). Social serendipity: Mobilizing social software. IEEE Pervasive Computing / IEEE Computer Society [and] IEEE Communications Society, 4(2), 28-34. doi:10.1109/MPRV.2005.37
-
(2005)
IEEE Pervasive Computing / IEEE Computer Society [and] IEEE Communications Society
, vol.4
, Issue.2
, pp. 28-34
-
-
Eagle, N.1
Pentland, A.2
-
19
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY: ACM, doi
-
Enck, W., Ongtang, M., & McDaniel, P. (2009). On lightweight mobile phone application certification. Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 235-245). New York, NY: ACM. doi:http://doi.acm.org/10.1145/1653662.1653691
-
(2009)
Proceedings of the 16th ACM Conference On Computer and Communications Security
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
22
-
-
34547232581
-
User case study and network evolution in the mobile phone sector (a study on current mobile phone applications)
-
New York, NY: ACM, doi
-
Fritsch, T., Ritter, H., & Schiller, J. (2006). User case study and network evolution in the mobile phone sector (a study on current mobile phone applications). Proceedings of the 2006 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology. New York, NY: ACM. doi:http://doi.acm.org/ 10.1145/1178823.1178836
-
(2006)
Proceedings of the 2006 ACM SIGCHI International Conference On Advances In Computer Entertainment Technology
-
-
Fritsch, T.1
Ritter, H.2
Schiller, J.3
-
23
-
-
66249120727
-
Phone infections
-
doi:doi:10.1126/science.1174658
-
Havlin, S. (2009). Phone infections. Quantum, 324, 1023-1024. doi:doi:10.1126/science.1174658
-
(2009)
Quantum
, vol.324
, pp. 1023-1024
-
-
Havlin, S.1
-
24
-
-
79952401386
-
User demand prediction from application usage pattern in virtual smartphone
-
doi:10.1109/CloudCom.2010.52
-
Heo, J., Terada, K., Toyama, M., Kurumatani, S., & Chen, E. Y. (2010). User demand prediction from application usage pattern in virtual smartphone. 2010 IEEE Second International Conference on Cloud Computing Technology and Science, (pp. 449-455). IEEE. doi:10.1109/CloudCom.2010.52
-
(2010)
2010 IEEE Second International Conference On Cloud Computing Technology and Science
, pp. 449-455
-
-
Heo, J.1
Terada, K.2
Toyama, M.3
Kurumatani, S.4
Chen, E.Y.5
-
25
-
-
79251585299
-
Large-scale virtualization in the emulab network testbed
-
USENIXAssociation, Retrieved from
-
Hibler, M., Ricci, R., Stoller, L., Duerig, J., Guruprasad, S., Stack, T., et al. (2008). Large-scale virtualization in the emulab network testbed. Proceedings of the 2008 USENIX Annual Technical Conference,(pp. 113-128). USENIXAssociation. Retrieved from http://portal.acm.org/citation.cfm?id=1404023
-
(2008)
Proceedings of the 2008 USENIX Annual Technical Conference
, pp. 113-128
-
-
Hibler, M.1
Ricci, R.2
Stoller, L.3
Duerig, J.4
Guruprasad, S.5
Stack, T.6
-
26
-
-
78649278628
-
An optimization neural network for smartphone data protection
-
Hu, W.-C., Zuo, Y., Kaabouch, N., & Chen, L. (2010).An optimization neural network for smartphone data protection. 2010 IEEE International Conference on Electro/Information Technology (EIT), (pp. 1-6).
-
(2010)
2010 IEEE International Conference On Electro/Information Technology (EIT)
, pp. 1-6
-
-
Hu, W.-C.1
Zuo, Y.2
Kaabouch, N.3
Chen, L.4
-
27
-
-
84871168093
-
-
Information Sciences Institute, (n.d.), Retrieved from
-
Information Sciences Institute. (n.d.). Network Simulator (NS-2). Retrieved from http://www.isi.edu/nsnam/ns/
-
Network Simulator (NS-2)
-
-
-
28
-
-
33747172362
-
Maximizing the spread of influence through a social network
-
ACM Press, doi:10.1145/956755.956769
-
Kempe, D., Kleinberg, J., & Tardos, É. (2003). Maximizing the spread of influence through a social network. Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining KDD 03, (p. 137). ACM Press. doi:10.1145/956755.956769
-
(2003)
Proceedings of the Ninth ACM SIGKDD International Conference On Knowledge Discovery and Data Mining KDD 03
, pp. 137
-
-
Kempe, D.1
Kleinberg, J.2
Tardos, É.3
-
29
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
ACM Press, doi:10.1145/1378600.1378627
-
th International Conference on Mobile Systems, Applications, and Services, (pp. 239-252). ACM Press. doi:10.1145/1378600.1378627
-
(2008)
th International Conference On Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
30
-
-
0024683661
-
An approach to experimental evaluation of real-time fault-tolerant distributed computing schemes
-
doi:10.1109/32.24725
-
Kim, K. H. (1989). An approach to experimental evaluation of real-time fault-tolerant distributed computing schemes. IEEE Transactions on Software Engineering, 15(6), 715-725. doi:10.1109/32.24725
-
(1989)
IEEE Transactions On Software Engineering
, vol.15
, Issue.6
, pp. 715-725
-
-
Kim, K.H.1
-
31
-
-
33749643165
-
Threats to security in DSRC/WAVE
-
In T. Kunz & S. S. Ravi (Eds.), Springer, Retrieved from
-
Laurendeau, C., & Barbeau, M. (2006). Threats to security in DSRC/WAVE. In T. Kunz & S. S. Ravi (Eds.), Lecture Notes in Computer Science, 4104, (pp. 266-279). Springer. Retrieved from http://www.springerlink.com/index/2328535l2q76hgt4.pdf
-
(2006)
Lecture Notes In Computer Science, 4104
, pp. 266-279
-
-
Laurendeau, C.1
Barbeau, M.2
-
32
-
-
44649187943
-
Is it finally time to worry about mobile malware?
-
doi:10.1109/MC.2008.159
-
Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14. doi:10.1109/MC.2008.159
-
(2008)
Computer
, vol.41
, Issue.5
, pp. 12-14
-
-
Lawton, G.1
-
33
-
-
18144370814
-
Mobile phones: The next frontier for hackers?
-
doi:10.1109/MC.2005.134
-
Leavitt, N. (2005). Mobile phones: The next frontier for hackers? Computer, 38(4), 20-23. doi:10.1109/MC.2005.134
-
(2005)
Computer
, vol.38
, Issue.4
, pp. 20-23
-
-
Leavitt, N.1
-
34
-
-
76649138917
-
VirusMeter: Preventing your cellphone from spies
-
Berlin, Germany, Springer-Verlag, doi
-
Liu, L., Yan, G., Zhang, X., & Chen, S. (2009). VirusMeter: Preventing your cellphone from spies. Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (pp. 244-264). Berlin, Germany: Springer-Verlag. doi:http://dx.doi.org/10.1007/978-3-642-04342-0_13
-
(2009)
Proceedings of the 12th International Symposium On Recent Advances In Intrusion Detection
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
35
-
-
79953104597
-
Building applications for the Android OS mobile platform: A primer and course materials
-
Retrieved from
-
Matos, V., & Grasser, R. (2010). Building applications for the Android OS mobile platform: A primer and course materials. Journal of Computing Sciences in Colleges, 26(1), 23-29. Retrieved from http://portal.acm.org/citation.cfm?id=1858449.1858455
-
(2010)
Journal of Computing Sciences In Colleges
, vol.26
, Issue.1
, pp. 23-29
-
-
Matos, V.1
Grasser, R.2
-
36
-
-
4544349711
-
Skoll: Distributed continuous quality assurance
-
IEEE Computer Society, doi:10.1109/ICSE.2004.1317468
-
Memon, A., Porter, A., Yilmaz, C., Nagarajan, A., Schmidt, D., & Natarajan, B. (2004). Skoll: Distributed continuous quality assurance. Proceedings 26th International Conference on Software Engineering, (pp. 459-468). IEEE Computer Society. doi:10.1109/ICSE.2004.1317468
-
(2004)
Proceedings 26th International Conference On Software Engineering
, pp. 459-468
-
-
Memon, A.1
Porter, A.2
Yilmaz, C.3
Nagarajan, A.4
Schmidt, D.5
Natarajan, B.6
-
37
-
-
47049091432
-
Analytical models for epidemics in mobile networks
-
(WiMob), IEEE, doi:10.1109/WIMOB.2007.4390871
-
Mickens, J. W., & Noble, B. D. (2007). Analytical models for epidemics in mobile networks. Third IEEE International Conference on Wireless and Mobile Computing Networking and Communications WiMob 2007, (WiMob), (p. 77). IEEE. doi:10.1109/WIMOB.2007.4390871
-
(2007)
Third IEEE International Conference On Wireless and Mobile Computing Networking and Communications WiMob 2007
, pp. 77
-
-
Mickens, J.W.1
Noble, B.D.2
-
38
-
-
84866497422
-
Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application
-
(Vol. 10, ACM Press, doi:10.1145/1460412.1460445
-
Miluzzo, E., Lane, N. D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., et al. (2008). Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application. Conference on Embedded Networked Sensor Systems (Vol. 10, pp. 337-350). ACM Press. doi:10.1145/1460412.1460445
-
(2008)
Conference On Embedded Networked Sensor Systems
, pp. 337-350
-
-
Miluzzo, E.1
Lane, N.D.2
Fodor, K.3
Peterson, R.4
Lu, H.5
Musolesi, M.6
-
41
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
doi:10.1145/1622103.1629656
-
Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., & Jahanian, F. (2008). Virtualized in-cloud security services for mobile devices. Proceedings of the First Workshop on Virtualization in Mobile Computing, (pp. 31-35). ACM. doi:10.1145/1622103.1629656
-
(2008)
Proceedings of the First Workshop On Virtualization In Mobile Computing
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
42
-
-
74349106562
-
Asurvey of platforms for mobile networks research
-
doi:10.1145/1508285.1508292
-
Oliver, E. (2009).Asurvey of platforms for mobile networks research. ACM SIGMOBILE Mobile Computing and Communications Review, 12(4), 56. doi:10.1145/1508285.1508292
-
(2009)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.12
, Issue.4
, pp. 56
-
-
Oliver, E.1
-
44
-
-
10644275203
-
Embedded devices next on the virus target list
-
doi:10.1049/ess:20040612
-
Piercy, M. (2004). Embedded devices next on the virus target list. Electronics Systems and Software, 2(6), 42-43. doi:10.1049/ess:20040612
-
(2004)
Electronics Systems and Software
, vol.2
, Issue.6
, pp. 42-43
-
-
Piercy, M.1
-
45
-
-
34547137910
-
Skoll: A process and infrastructure for distributed continuous quality assurance
-
IEEE Computer Society, doi:10.1109/TSE.2007.70719
-
Porter, A., Yilmaz, C., Memon, A. M., Schmidt, D. C., & Natarajan, B. (2007). Skoll: A process and infrastructure for distributed continuous quality assurance. IEEE Transactions on Software Engineering, 33(8), 510-525. IEEE Computer Society. doi:10.1109/TSE.2007.70719
-
(2007)
IEEE Transactions On Software Engineering
, vol.33
, Issue.8
, pp. 510-525
-
-
Porter, A.1
Yilmaz, C.2
Memon, A.M.3
Schmidt, D.C.4
Natarajan, B.5
-
47
-
-
78649666876
-
Repeatable experiments with mobile nodes in a relocatable WSN testbed
-
Rensfelt, O., Hermans, F., Gunningberg, P., & Larzon, L. (2010). Repeatable experiments with mobile nodes in a relocatable WSN testbed. 6th IEEE International Conference on Distributed Computing in Sensor Systems Workshops (DCOSSW), 2010 (pp. 1-6).
-
(2010)
6th IEEE International Conference On Distributed Computing In Sensor Systems Workshops (DCOSSW)
, vol.2010
, pp. 1-6
-
-
Rensfelt, O.1
Hermans, F.2
Gunningberg, P.3
Larzon, L.4
-
48
-
-
53949105871
-
The opportunistic transmission of wireless worms between mobile devices
-
Elsevier B.V. Retrieved from
-
Rhodes, C. J., & Nekovee, M. (2008). The opportunistic transmission of wireless worms between mobile devices. Physica A: Statistical Mechanics and its Applications, 387(27), 6837-6844. Elsevier B.V. Retrieved from http://arxiv. org/abs/0802.2685
-
(2008)
Physica A: Statistical Mechanics and Its Applications
, vol.387
, Issue.27
, pp. 6837-6844
-
-
Rhodes, C.J.1
Nekovee, M.2
-
49
-
-
84898286851
-
-
Scalable Network Technologies, (n.d.), Retrieved from
-
Scalable Network Technologies. (n.d.). Qualnet. Retrieved from http://www.scalable-networks.com/
-
Qualnet
-
-
-
50
-
-
77950172440
-
Smartphone malware evolution revisited: Android next target
-
IEEE, doi:10.1109/MALWARE.2009.5403026
-
Schmidt, A.-D., Schmidt, H.-G., Batyuk, L., Clausen, J. H., Camtepe, S. A., Albayrak, S., & Yildizli, C. (2009). Smartphone malware evolution revisited: Android next target? 2009 4th International Conference on Malicious and Unwanted Software MALWARE, (pp. 1-7). IEEE. doi:10.1109/MALWARE.2009.5403026
-
(2009)
2009 4th International Conference On Malicious and Unwanted Software MALWARE
, pp. 1-7
-
-
Schmidt, A.-D.1
Schmidt, H.-G.2
Batyuk, L.3
Clausen, J.H.4
Camtepe, S.A.5
Albayrak, S.6
Yildizli, C.7
-
51
-
-
84867714245
-
Applying behavioral detection on Android-based devices
-
Springer, Retrieved from
-
Shabtai, A., & Elovici, Y. (2010). Applying behavioral detection on Android-based devices. Mobile Wireless Middleware Operating Systems and Applications, (pp. 235-249). Springer. Retrieved from http://www.springerlink.com/index/ G404U422T1008740.pdf
-
(2010)
Mobile Wireless Middleware Operating Systems and Applications
, pp. 235-249
-
-
Shabtai, A.1
Elovici, Y.2
-
52
-
-
77950675112
-
Google Android: A comprehensive security assessment
-
doi:10.1109/MSP.2010.2
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., & Glezer, C. (2010). Google Android: A comprehensive security assessment. Security & Privacy, 8(2), 35-44. doi:10.1109/MSP.2010.2
-
(2010)
Security & Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
53
-
-
23844543824
-
Threats looming beyond the perimeter
-
Retrieved from
-
Steve, G. (2004). Threats looming beyond the perimeter. Infosecurity Today, 1(6), 12-14. Retrieved from http://www.sciencedirect.com/science/ article/pii/S1742684704001296
-
(2004)
Infosecurity Today
, vol.1
, Issue.6
, pp. 12-14
-
-
Steve, G.1
-
54
-
-
34547218865
-
A preliminary investigation of worm infections in a Bluetooth environment
-
ACM Press, doi:10.1145/1179542.1179545
-
Su, J., Chan, K. K. W., Miklas, A. G., Po, K., Akhavan, A., Saroiu, S., et al. (2006). A preliminary investigation of worm infections in a Bluetooth environment. Proceedings of the 4th ACM Workshop on Recurring Malcode WORM 06, (p. 9). ACM Press. doi:10.1145/1179542.1179545
-
(2006)
Proceedings of the 4th ACM Workshop On Recurring Malcode WORM 06
, pp. 9
-
-
Su, J.1
Chan, K.K.W.2
Miklas, A.G.3
Po, K.4
Akhavan, A.5
Saroiu, S.6
-
56
-
-
3142694961
-
Sensor networks with mobile agents
-
IEEE, doi:10.1109/ MILCOM.2003.1290187
-
Tong, L., Zhao, Q., & Adireddy, S. (2003). Sensor networks with mobile agents. IEEE Military Communications Conference 2003 MILCOM 2003 (Vol. 1, pp. 688-693). IEEE. doi:10.1109/ MILCOM.2003.1290187
-
(2003)
IEEE Military Communications Conference 2003 MILCOM 2003
, pp. 688-693
-
-
Tong, L.1
Zhao, Q.2
Adireddy, S.3
-
57
-
-
33750436929
-
About malicious software in smartphones
-
Paris, France: Springer. doi:doi:10.1007/s11416-006-0022-0
-
Töyssy, S., &Helenius, M. (2006). About malicious software in smartphones. Journal in Computer Virology, 2(2), 109-119. Paris, France: Springer. doi:doi:10.1007/s11416-006-0022-0
-
(2006)
Journal In Computer Virology
, vol.2
, Issue.2
, pp. 109-119
-
-
Töyssy, S.1
Helenius, M.2
-
59
-
-
66349131932
-
Understanding the spreading patterns of mobile phone viruses
-
doi:10.1126/science.1167053 Retrieved from
-
Wang, P., Gonzalez, M., Hidalgo, C.A., & Baraba-si, A. L. (2009). Understanding the spreading patterns of mobile phone viruses. Science, 324(5930), 1071-1076. Retrieved from http://arxiv.org/abs/0906.4567 doi:10.1126/science.1167053
-
(2009)
Science
, vol.324
, Issue.5930
, pp. 1071-1076
-
-
Wang, P.1
Gonzalez, M.2
Hidalgo, C.A.3
Baraba-Si, A.L.4
-
60
-
-
77953132059
-
Automated diagnosis of feature model configurations
-
doi:10.1016/j.jss.2010.02.017
-
White, J., Benavides, D., Schmidt, D. C., Trinidad, P., Dougherty, B., & Ruiz-Cortes, A. (2010). Automated diagnosis of feature model configurations. Journal of Systems and Software, 83(7), 1094-1107. http://www.sciencedirect.com/science/article/pii/S016412121000049X doi:10.1016/j.jss.2010.02.017
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.7
, pp. 1094-1107
-
-
White, J.1
Benavides, D.2
Schmidt, D.C.3
Trinidad, P.4
Dougherty, B.5
Ruiz-Cortes, A.6
-
62
-
-
34748827408
-
Bluetooth worm propagation: Mobility pattern matters
-
Retrieved from
-
nd ACM Symposium on Information, Computer, and Communications Security, (pp. 32-44). Retrieved from http://portal.acm.org/citation.cfm?id=1229294
-
(2007)
nd ACM Symposium On Information, Computer, and Communications Security
, pp. 32-44
-
-
Yan, G.1
Cuellar, L.2
Eidenbenz, S.3
Flores, H.D.4
Hengartner, N.5
Vu, V.6
-
63
-
-
39049104692
-
Bluetooth worms: Models, dynamics, and defense implications
-
IEEE, doi:10.1109/ACSAC.2006.18
-
Yan, G.Eidenbenz, S,. (2006). Bluetooth worms: Models, dynamics, and defense implications. 2006 22nd Annual Computer Security Applications Conference ACSAC06, (pp. 245-256). IEEE. doi:10.1109/ACSAC.2006.18
-
(2006)
2006 22nd Annual Computer Security Applications Conference ACSAC06
, pp. 245-256
-
-
Yan, G.1
Eidenbenz, S.2
-
64
-
-
74549209698
-
mCrowd: A platform for mobile crowdsourcing
-
ACM, doi:10.1145/1644038.1644094
-
Yan, T., Marzilli, M., Holmes, R., Ganesan, D., & Corner, M. (2009). mCrowd: a platform for mobile crowdsourcing. Conference on Embedded Networked Sensor Systems (pp. 347-348). ACM. doi:10.1145/1644038.1644094
-
(2009)
Conference On Embedded Networked Sensor Systems
, pp. 347-348
-
-
Yan, T.1
Marzilli, M.2
Holmes, R.3
Ganesan, D.4
Corner, M.5
-
65
-
-
84942307718
-
A performance study of monitoring and information services for distributed systems
-
IEEE Computer Society, Retrieved from
-
Zhang, X., Freschl, J., & Schopf, J. M.(2003). A performance study of monitoring and information services for distributed systems. Proceedings 12th IEEE International Symposium on High Performance Distributed Computing 2003, (p. 12). IEEE Computer Society. Retrieved from http://arxiv.org/abs/cs/0304015
-
(2003)
Proceedings 12th IEEE International Symposium On High Performance Distributed Computing 2003
, pp. 12
-
-
Zhang, X.1
Freschl, J.2
Schopf, J.M.3
-
66
-
-
84898171540
-
The spread of epidemics on smartphones
-
In Xiao, Y., Shen, X., & Du, D. (Eds.), Springer
-
Zheng, B., Xiong, Y., Zhang, Q., & Lin, C. (2006). The spread of epidemics on smartphones. In Xiao, Y., Shen, X., & Du, D. (Eds.), Wireless/mobile network security. Springer.
-
(2006)
Wireless/mobile Network Security
-
-
Zheng, B.1
Xiong, Y.2
Zhang, Q.3
Lin, C.4
|