A preliminary investigation of worm infections in a bluetooth environment
暂无分享,去创建一个
Stefan Saroiu | Eyal de Lara | Ali Akhavan | Ashvin Goel | Jing Su | Kenneth Po | Andrew G. Miklas | Kelvin K. W. Chan | S. Saroiu | Ashvin Goel | E. D. Lara | A. Akhavan | Jing Su | Kenneth Po
[1] Paula Fikkert,et al. Specification of the Bluetooth System , 2003 .
[2] Nam C. Phamdo,et al. Requirements on worm mitigation technologies in MANETS , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).
[3] Fred Brauer,et al. Compartmental Models in Epidemiology , 2008, Mathematical Epidemiology.
[4] Tristan Henderson,et al. CRAWDAD: a community resource for archiving wireless data at Dartmouth , 2005, CCRV.
[5] Frederik Armknecht. A Linearization Attack on the Bluetooth Key Stream Generator , 2002, IACR Cryptol. ePrint Arch..
[6] Scott R. Fluhrer. Improved key recovery of level 1 of the Bluetooth Encryption System , 2002, IACR Cryptol. ePrint Arch..
[7] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[8] Avishai Wool,et al. Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher , 2005, SecureComm.
[9] Kaisa Nyberg,et al. Correlation Properties of the Bluetooth Combiner Generator , 1999, ICISC.
[10] Robert G. Cole. Initial Studies on Worm Propagation in Manets for Future Army Combat Systems , 2004 .
[11] Stefan Savage,et al. The Spread of the Sapphire/Slammer Worm , 2003 .
[12] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[13] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[14] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[15] Marco Gruteser,et al. Computer Ecology: Responding to Mobile Worms with Location-Based Quarantine Boundaries , 2007 .
[16] Serge Vaudenay,et al. Faster Correlation Attack on Bluetooth Keystream Generator E0 , 2004, CRYPTO.
[17] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[18] Vassilis Kostakos,et al. Instrumenting the City: Developing Methods for Observing and Understanding the Digital Cityscape , 2006, UbiComp.
[19] Alex Pentland,et al. Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.