메뉴 건너뛰기




Volumn , Issue , 2012, Pages 82-403

Building a cloud-based mobile application testbed

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84898177911     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.4018/978-1-4666-2536-5.ch018     Document Type: Chapter
Times cited : (8)

References (66)
  • 4
    • 77955227439 scopus 로고    scopus 로고
    • Automated analysis of feature models 20 years later: A literature review
    • doi:10.1016/j.is.2010.01.001
    • Benavides, D., Segura, S., & Ruiz-Cortés, A. (2010). Automated analysis of feature models 20 years later: A literature review. Information Systems, 35(6). doi:10.1016/j.is.2010.01.001
    • (2010) Information Systems , vol.35 , Issue.6
    • Benavides, D.1    Segura, S.2    Ruiz-Cortés, A.3
  • 6
    • 50049087364 scopus 로고    scopus 로고
    • On mobile viruses exploiting messaging and Bluetooth services
    • doi:10.1109/SECCOMW.2006.359562
    • Bose, A., & Shin, K. G. (2006). On mobile viruses exploiting messaging and Bluetooth services. Securecomm and Workshops, 2006, 1-10. doi:10.1109/SECCOMW.2006.359562
    • (2006) Securecomm and Workshops 2006 , pp. 1-10
    • Bose, A.1    Shin, K.G.2
  • 10
    • 47649085662 scopus 로고    scopus 로고
    • The rise of people-centric sensing
    • doi:10.1109/MIC.2008.90 Retrieved from
    • Campbell, A. T., Eisenman, S. B., & Lane, N. D. (2008). The rise of people-centric sensing. IEEE Internet Computing, 12(4). Retrieved from http://www.computer.org/portal/web/csdl/doi/10.1109/MIC.2008.90 doi:10.1109/MIC.2008.90
    • (2008) IEEE Internet Computing , vol.12 , Issue.4
    • Campbell, A.T.1    Eisenman, S.B.2    Lane, N.D.3
  • 11
    • 3543049206 scopus 로고    scopus 로고
    • Distributed computing research issuesingridcomputing
    • ACM. doi:10.1145/582475.582486
    • Casanova, H. (2002). Distributed computing research issuesingridcomputing.ACMSIGACTNews, 33(3), 50-70. ACM. doi:10.1145/582475.582486
    • (2002) ACMSIGACTNews , vol.33 , Issue.3 , pp. 50-70
    • Casanova, H.1
  • 13
    • 77951289727 scopus 로고    scopus 로고
    • Testbed experiments on the location to service translation (LoST) protocol for mobile users
    • IEEE, doi:10.1109/CCNC.2010.5421603
    • Chintapatla, B., Goulart, A., & Magnussen, W. (2010). Testbed experiments on the location to service translation (LoST) protocol for mobile users. 2010 7th IEEE Consumer Communications and Networking Conference, (pp. 1-5). IEEE. doi:10.1109/CCNC.2010.5421603
    • (2010) 2010 7th IEEE Consumer Communications and Networking Conference , pp. 1-5
    • Chintapatla, B.1    Goulart, A.2    Magnussen, W.3
  • 14
    • 84898179063 scopus 로고    scopus 로고
    • Global PC market maintains double-digit growth in third quarter despite weak results in some segments, according to IDC
    • Retrieved from
    • Chou, J., O'Donnell, B., & Shrirer, M. (2010). Global PC market maintains double-digit growth in third quarter despite weak results in some segments, according to IDC. International Data Corporation. Retrieved from http://www.businesswire.com/ news/home/20101013007002/en/Global-PC-Market-Maintains-Double-Digit-Growth-Quarter
    • (2010) International Data Corporation
    • Chou, J.1    O'Donnell, B.2    Shrirer, M.3
  • 15
    • 85025697660 scopus 로고    scopus 로고
    • Survey demonstrates poor smartphone security attitude amongst users
    • Credant Technologies., Retrieved from
    • Credant Technologies. (2009). Survey demonstrates poor smartphone security attitude amongst users. Credant Technologies. Retrieved fromhttp://www.prosecurityzone.com/News/It_security/Mobile_computing_security/Survey_demonstrates_poor_smartphone_security_attitude_ amongst_users_8942.asp#axzz1jxol1VYk
    • (2009) Credant Technologies
  • 16
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • doi:10.1109/MPRV.2004.21
    • Dagon, D., Martin, T., & Starner, T. (2004). Mobile phones as computing devices: The viruses are coming! Pervasive Computing, 3(4), 11-15. doi:10.1109/MPRV.2004.21
    • (2004) Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 17
    • 76649132306 scopus 로고    scopus 로고
    • Txteagle: Mobile crowdsourcing
    • In N. Aykin (Ed.), 456, Berlin, Germany, Springer, doi:10.1007/978-3-642-02767-3
    • Eagle, N. (2009). Txteagle: Mobile crowdsourcing. In N. Aykin (Ed.), International Conference on Internationalization Design and Global Development (Vol. 5623, pp. 447-456-456). Berlin, Germany: Springer. doi:10.1007/978-3-642-02767-3
    • (2009) International Conference On Internationalization Design and Global Development , pp. 447-456
    • Eagle, N.1
  • 23
    • 66249120727 scopus 로고    scopus 로고
    • Phone infections
    • doi:doi:10.1126/science.1174658
    • Havlin, S. (2009). Phone infections. Quantum, 324, 1023-1024. doi:doi:10.1126/science.1174658
    • (2009) Quantum , vol.324 , pp. 1023-1024
    • Havlin, S.1
  • 27
    • 84871168093 scopus 로고    scopus 로고
    • Information Sciences Institute, (n.d.), Retrieved from
    • Information Sciences Institute. (n.d.). Network Simulator (NS-2). Retrieved from http://www.isi.edu/nsnam/ns/
    • Network Simulator (NS-2)
  • 30
    • 0024683661 scopus 로고
    • An approach to experimental evaluation of real-time fault-tolerant distributed computing schemes
    • doi:10.1109/32.24725
    • Kim, K. H. (1989). An approach to experimental evaluation of real-time fault-tolerant distributed computing schemes. IEEE Transactions on Software Engineering, 15(6), 715-725. doi:10.1109/32.24725
    • (1989) IEEE Transactions On Software Engineering , vol.15 , Issue.6 , pp. 715-725
    • Kim, K.H.1
  • 31
    • 33749643165 scopus 로고    scopus 로고
    • Threats to security in DSRC/WAVE
    • In T. Kunz & S. S. Ravi (Eds.), Springer, Retrieved from
    • Laurendeau, C., & Barbeau, M. (2006). Threats to security in DSRC/WAVE. In T. Kunz & S. S. Ravi (Eds.), Lecture Notes in Computer Science, 4104, (pp. 266-279). Springer. Retrieved from http://www.springerlink.com/index/2328535l2q76hgt4.pdf
    • (2006) Lecture Notes In Computer Science, 4104 , pp. 266-279
    • Laurendeau, C.1    Barbeau, M.2
  • 32
    • 44649187943 scopus 로고    scopus 로고
    • Is it finally time to worry about mobile malware?
    • doi:10.1109/MC.2008.159
    • Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14. doi:10.1109/MC.2008.159
    • (2008) Computer , vol.41 , Issue.5 , pp. 12-14
    • Lawton, G.1
  • 33
    • 18144370814 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • doi:10.1109/MC.2005.134
    • Leavitt, N. (2005). Mobile phones: The next frontier for hackers? Computer, 38(4), 20-23. doi:10.1109/MC.2005.134
    • (2005) Computer , vol.38 , Issue.4 , pp. 20-23
    • Leavitt, N.1
  • 35
    • 79953104597 scopus 로고    scopus 로고
    • Building applications for the Android OS mobile platform: A primer and course materials
    • Retrieved from
    • Matos, V., & Grasser, R. (2010). Building applications for the Android OS mobile platform: A primer and course materials. Journal of Computing Sciences in Colleges, 26(1), 23-29. Retrieved from http://portal.acm.org/citation.cfm?id=1858449.1858455
    • (2010) Journal of Computing Sciences In Colleges , vol.26 , Issue.1 , pp. 23-29
    • Matos, V.1    Grasser, R.2
  • 38
    • 84866497422 scopus 로고    scopus 로고
    • Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application
    • (Vol. 10, ACM Press, doi:10.1145/1460412.1460445
    • Miluzzo, E., Lane, N. D., Fodor, K., Peterson, R., Lu, H., Musolesi, M., et al. (2008). Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application. Conference on Embedded Networked Sensor Systems (Vol. 10, pp. 337-350). ACM Press. doi:10.1145/1460412.1460445
    • (2008) Conference On Embedded Networked Sensor Systems , pp. 337-350
    • Miluzzo, E.1    Lane, N.D.2    Fodor, K.3    Peterson, R.4    Lu, H.5    Musolesi, M.6
  • 42
    • 74349106562 scopus 로고    scopus 로고
    • Asurvey of platforms for mobile networks research
    • doi:10.1145/1508285.1508292
    • Oliver, E. (2009).Asurvey of platforms for mobile networks research. ACM SIGMOBILE Mobile Computing and Communications Review, 12(4), 56. doi:10.1145/1508285.1508292
    • (2009) ACM SIGMOBILE Mobile Computing and Communications Review , vol.12 , Issue.4 , pp. 56
    • Oliver, E.1
  • 44
    • 10644275203 scopus 로고    scopus 로고
    • Embedded devices next on the virus target list
    • doi:10.1049/ess:20040612
    • Piercy, M. (2004). Embedded devices next on the virus target list. Electronics Systems and Software, 2(6), 42-43. doi:10.1049/ess:20040612
    • (2004) Electronics Systems and Software , vol.2 , Issue.6 , pp. 42-43
    • Piercy, M.1
  • 45
    • 34547137910 scopus 로고    scopus 로고
    • Skoll: A process and infrastructure for distributed continuous quality assurance
    • IEEE Computer Society, doi:10.1109/TSE.2007.70719
    • Porter, A., Yilmaz, C., Memon, A. M., Schmidt, D. C., & Natarajan, B. (2007). Skoll: A process and infrastructure for distributed continuous quality assurance. IEEE Transactions on Software Engineering, 33(8), 510-525. IEEE Computer Society. doi:10.1109/TSE.2007.70719
    • (2007) IEEE Transactions On Software Engineering , vol.33 , Issue.8 , pp. 510-525
    • Porter, A.1    Yilmaz, C.2    Memon, A.M.3    Schmidt, D.C.4    Natarajan, B.5
  • 48
    • 53949105871 scopus 로고    scopus 로고
    • The opportunistic transmission of wireless worms between mobile devices
    • Elsevier B.V. Retrieved from
    • Rhodes, C. J., & Nekovee, M. (2008). The opportunistic transmission of wireless worms between mobile devices. Physica A: Statistical Mechanics and its Applications, 387(27), 6837-6844. Elsevier B.V. Retrieved from http://arxiv. org/abs/0802.2685
    • (2008) Physica A: Statistical Mechanics and Its Applications , vol.387 , Issue.27 , pp. 6837-6844
    • Rhodes, C.J.1    Nekovee, M.2
  • 49
    • 84898286851 scopus 로고    scopus 로고
    • Scalable Network Technologies, (n.d.), Retrieved from
    • Scalable Network Technologies. (n.d.). Qualnet. Retrieved from http://www.scalable-networks.com/
    • Qualnet
  • 51
    • 84867714245 scopus 로고    scopus 로고
    • Applying behavioral detection on Android-based devices
    • Springer, Retrieved from
    • Shabtai, A., & Elovici, Y. (2010). Applying behavioral detection on Android-based devices. Mobile Wireless Middleware Operating Systems and Applications, (pp. 235-249). Springer. Retrieved from http://www.springerlink.com/index/ G404U422T1008740.pdf
    • (2010) Mobile Wireless Middleware Operating Systems and Applications , pp. 235-249
    • Shabtai, A.1    Elovici, Y.2
  • 52
    • 77950675112 scopus 로고    scopus 로고
    • Google Android: A comprehensive security assessment
    • doi:10.1109/MSP.2010.2
    • Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., & Glezer, C. (2010). Google Android: A comprehensive security assessment. Security & Privacy, 8(2), 35-44. doi:10.1109/MSP.2010.2
    • (2010) Security & Privacy , vol.8 , Issue.2 , pp. 35-44
    • Shabtai, A.1    Fledel, Y.2    Kanonov, U.3    Elovici, Y.4    Dolev, S.5    Glezer, C.6
  • 53
    • 23844543824 scopus 로고    scopus 로고
    • Threats looming beyond the perimeter
    • Retrieved from
    • Steve, G. (2004). Threats looming beyond the perimeter. Infosecurity Today, 1(6), 12-14. Retrieved from http://www.sciencedirect.com/science/ article/pii/S1742684704001296
    • (2004) Infosecurity Today , vol.1 , Issue.6 , pp. 12-14
    • Steve, G.1
  • 57
    • 33750436929 scopus 로고    scopus 로고
    • About malicious software in smartphones
    • Paris, France: Springer. doi:doi:10.1007/s11416-006-0022-0
    • Töyssy, S., &Helenius, M. (2006). About malicious software in smartphones. Journal in Computer Virology, 2(2), 109-119. Paris, France: Springer. doi:doi:10.1007/s11416-006-0022-0
    • (2006) Journal In Computer Virology , vol.2 , Issue.2 , pp. 109-119
    • Töyssy, S.1    Helenius, M.2
  • 59
    • 66349131932 scopus 로고    scopus 로고
    • Understanding the spreading patterns of mobile phone viruses
    • doi:10.1126/science.1167053 Retrieved from
    • Wang, P., Gonzalez, M., Hidalgo, C.A., & Baraba-si, A. L. (2009). Understanding the spreading patterns of mobile phone viruses. Science, 324(5930), 1071-1076. Retrieved from http://arxiv.org/abs/0906.4567 doi:10.1126/science.1167053
    • (2009) Science , vol.324 , Issue.5930 , pp. 1071-1076
    • Wang, P.1    Gonzalez, M.2    Hidalgo, C.A.3    Baraba-Si, A.L.4
  • 60
    • 77953132059 scopus 로고    scopus 로고
    • Automated diagnosis of feature model configurations
    • doi:10.1016/j.jss.2010.02.017
    • White, J., Benavides, D., Schmidt, D. C., Trinidad, P., Dougherty, B., & Ruiz-Cortes, A. (2010). Automated diagnosis of feature model configurations. Journal of Systems and Software, 83(7), 1094-1107. http://www.sciencedirect.com/science/article/pii/S016412121000049X doi:10.1016/j.jss.2010.02.017
    • (2010) Journal of Systems and Software , vol.83 , Issue.7 , pp. 1094-1107
    • White, J.1    Benavides, D.2    Schmidt, D.C.3    Trinidad, P.4    Dougherty, B.5    Ruiz-Cortes, A.6
  • 66
    • 84898171540 scopus 로고    scopus 로고
    • The spread of epidemics on smartphones
    • In Xiao, Y., Shen, X., & Du, D. (Eds.), Springer
    • Zheng, B., Xiong, Y., Zhang, Q., & Lin, C. (2006). The spread of epidemics on smartphones. In Xiao, Y., Shen, X., & Du, D. (Eds.), Wireless/mobile network security. Springer.
    • (2006) Wireless/mobile Network Security
    • Zheng, B.1    Xiong, Y.2    Zhang, Q.3    Lin, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.