-
1
-
-
0033872896
-
RADAR: An inbuilding rf-based user location and tracking system
-
P. Bahl and V. N. Padmanabhan. RADAR: An Inbuilding RF-based User Location and Tracking System. In InfoCom, 2000.
-
(2000)
InfoCom
-
-
Bahl, P.1
Padmanabhan, V.N.2
-
4
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
New York, NY, USA,. ACM
-
B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti. Clonecloud: elastic execution between mobile device and cloud. In Proceedings of the sixth conference on Computer systems, EuroSys '11, pages 301-314, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the Sixth Conference on Computer Systems, EuroSys '11
, pp. 301-314
-
-
Chun, B.-G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
5
-
-
77954993714
-
Maui: Making smartphones last longer with code offload
-
E. Cuervo, A. Balasubramanian, D. ki Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl. Maui: making smartphones last longer with code offload. In MobiSys'10, pages 49-62, 2010.
-
(2010)
MobiSys'10
, pp. 49-62
-
-
Cuervo, E.1
Balasubramanian, A.2
Ki Cho, D.3
Wolman, A.4
Saroiu, S.5
Chandra, R.6
Bahl, P.7
-
6
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
Oct
-
H. Deng, W. Li, and D. Agrawal. Routing security in wireless ad hoc networks. Communications Magazine, IEEE, 40(10):70-75, Oct 2002.
-
(2002)
Communications Magazine, IEEE
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.3
-
7
-
-
84875695278
-
Mobots: A new generation of botnets on mobile devices and networks
-
IEEE
-
M. Eslahi, R. Salleh, and N. B. Anuar. Mobots: A new generation of botnets on mobile devices and networks. In Computer Applications and Industrial Electronics (ISCAIE), 2012 IEEE Symposium on, pages 262-266. IEEE, 2012.
-
(2012)
Computer Applications and Industrial Electronics (ISCAIE), 2012 IEEE Symposium on
, pp. 262-266
-
-
Eslahi, M.1
Salleh, R.2
Anuar, N.B.3
-
10
-
-
51349159708
-
Anonymity and security in delay tolerant networks
-
Sept
-
A. Kate, G. Zaverucha, and U. Hengartner. Anonymity and security in delay tolerant networks. In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, pages 504-513, Sept 2007.
-
(2007)
Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on
, pp. 504-513
-
-
Kate, A.1
Zaverucha, G.2
Hengartner, U.3
-
11
-
-
84946398426
-
The use of honeynets to detect exploited systems across large enterprise networks
-
IEEE
-
J. Levine, R. LaBella, H. Owen, D. Contis, and B. Culver. The use of honeynets to detect exploited systems across large enterprise networks. In Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pages 92-99. IEEE, 2003.
-
(2003)
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
, pp. 92-99
-
-
Levine, J.1
LaBella, R.2
Owen, H.3
Contis, D.4
Culver, B.5
-
12
-
-
70249128691
-
Are you moved by your social network application
-
New York, NY, USA,. ACM
-
A. Mtibaa, A. Chaintreau, J. LeBrun, E. Oliver, A.-K. Pietilainen, and C. Diot. Are you moved by your social network application? In WOSN'08: Proceedings of the first workshop on Online social networks, pages 67-72, New York, NY, USA, 2008. ACM.
-
(2008)
WOSN'08: Proceedings of the First Workshop on Online Social Networks
, pp. 67-72
-
-
Mtibaa, A.1
Chaintreau, A.2
LeBrun, J.3
Oliver, E.4
Pietilainen, A.-K.5
Diot, C.6
-
14
-
-
84883732455
-
Towards resource sharing in mobile device clouds: Power balancing across mobile devices
-
ACM
-
A. Mtibaa, A. Fahim, K. A. Harras, and M. H. Ammar. Towards resource sharing in mobile device clouds: Power balancing across mobile devices. In Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, pages 51-56. ACM, 2013.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Mobile Cloud Computing
, pp. 51-56
-
-
Mtibaa, A.1
Fahim, A.2
Harras, K.A.3
Ammar, M.H.4
-
15
-
-
84939250765
-
From botnets to mobibots: A novel malicious communication paradigm for mobile botnets
-
August
-
A. Mtibaa, K. Harras, and H. Alnuweiri. From botnets to mobibots: a novel malicious communication paradigm for mobile botnets. Communications Magazine, IEEE, 53(8):61-67, August 2015.
-
(2015)
Communications Magazine, IEEE
, vol.53
, Issue.8
, pp. 61-67
-
-
Mtibaa, A.1
Harras, K.2
Alnuweiri, H.3
-
16
-
-
84964269875
-
Exploiting social information for dynamic tuning in cluster based wifi localization
-
IEEE
-
A. Mtibaa, K. A. Harras, and M. Abdellatif. Exploiting social information for dynamic tuning in cluster based wifi localization. In Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on. IEEE, 2015.
-
(2015)
Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on
-
-
Mtibaa, A.1
Harras, K.A.2
Abdellatif, M.3
-
17
-
-
84908200506
-
Malicious attacks in mobile device clouds: A data driven risk assessment
-
IEEE
-
A. Mtibaa, K. A. Harras, and H. Alnuweiri. Malicious attacks in mobile device clouds: A data driven risk assessment. In Computer Communication and Networks (ICCCN), 2014 23rd International Conference on, pages 1-8. IEEE, 2014.
-
(2014)
Computer Communication and Networks (ICCCN), 2014 23rd International Conference on
, pp. 1-8
-
-
Mtibaa, A.1
Harras, K.A.2
Alnuweiri, H.3
-
18
-
-
84960156087
-
Towards mobile opportunistic computing
-
June
-
A. Mtibaa, K. A. Harras, K. Habak, M. Ammar, and E. W. Zegura. Towards mobile opportunistic computing. In Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on, pages 1111-1114, June 2015.
-
(2015)
Cloud Computing (CLOUD), 2015 IEEE 8th International Conference on
, pp. 1111-1114
-
-
Mtibaa, A.1
Harras, K.A.2
Habak, K.3
Ammar, M.4
Zegura, E.W.5
-
19
-
-
78049508730
-
On the relevance of social information to opportunistic forwarding
-
A. Mtibaa, M. May, and M. Ammar. On the relevance of social information to opportunistic forwarding. Modeling, Analysis, and Simulation of Computer Systems, International Symposium on, 0:141-150, 2010.
-
(2010)
Modeling, Analysis, and Simulation of Computer Systems, International Symposium on
, pp. 141-150
-
-
Mtibaa, A.1
May, M.2
Ammar, M.3
-
21
-
-
84995476635
-
Mobiclique: Middleware for mobile social networking
-
ACM
-
A.-K. Pietiläinen, E. Oliver, J. LeBrun, G. Varghese, and C. Diot. Mobiclique: middleware for mobile social networking. In Proceedings of the 2nd ACM workshop on Online social networks, pages 49-54. ACM, 2009.
-
(2009)
Proceedings of the 2nd ACM Workshop on Online Social Networks
, pp. 49-54
-
-
Pietiläinen, A.-K.1
Oliver, E.2
LeBrun, J.3
Varghese, G.4
Diot, C.5
-
23
-
-
70350136710
-
The case for vm-based cloudlets in mobile computing
-
M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies. The case for vm-based cloudlets in mobile computing. Pervasive Computing, IEEE, 8(4):14-23, 2009.
-
(2009)
Pervasive Computing, IEEE
, vol.8
, Issue.4
, pp. 14-23
-
-
Satyanarayanan, M.1
Bahl, P.2
Caceres, R.3
Davies, N.4
-
24
-
-
84863537855
-
Serendipity: Enabling remote computing among intermittently connected mobile devices
-
C. Shi, V. Lakafosis, M. H. Ammar, and E. W. Zegura. Serendipity: enabling remote computing among intermittently connected mobile devices. In MobiHoc, pages 145-154, 2012.
-
(2012)
MobiHoc
, pp. 145-154
-
-
Shi, C.1
Lakafosis, V.2
Ammar, M.H.3
Zegura, E.W.4
-
26
-
-
74049108559
-
On cellular botnets: Measuring the impact of malicious devices on a cellular network core
-
ACM
-
P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel, and T. La Porta. On cellular botnets: measuring the impact of malicious devices on a cellular network core. In Proceedings of the 16th ACM conference on Computer and communications security, pages 223-234. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 223-234
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
McDaniel, P.6
La Porta, T.7
-
27
-
-
78049364023
-
Mobile botnet detection using network forensics
-
Springer
-
I. Vural and H. Venter. Mobile botnet detection using network forensics. In Future Internet-FIS 2010, pages 57-67. Springer, 2010.
-
(2010)
Future Internet-FIS 2010
, pp. 57-67
-
-
Vural, I.1
Venter, H.2
-
28
-
-
0035789243
-
Security-aware ad hoc routing for wireless networks
-
New York, NY, USA,. ACM
-
S. Yi, P. Naldurg, and R. Kravets. Security-aware ad hoc routing for wireless networks. In Proceedings of the 2Nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc '01, pages 299-302, New York, NY, USA, 2001. ACM.
-
(2001)
Proceedings of the 2Nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc '01
, pp. 299-302
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
30
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
New York, NY, USA,. ACM
-
Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom '00, pages 275-283, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom '00
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
|