暂无分享,去创建一个
Dimitrios Tzovaras | Erol Gelenbe | David García | George L. Lyberopoulos | Gökçe Görbil | Steffen Liebergeld | Madalina Baltatu | E. Gelenbe | D. Tzovaras | G. Lyberopoulos | Steffen Liebergeld | M. Baltatu | Gökçe Görbil | David García
[1] Ravishankar Borgaonkar,et al. Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications , 2012, NDSS.
[2] Collin Mulliner,et al. Nomadic Honeypots : A Novel Concept for Smartphone Honeypots , 2013 .
[3] Matthias Lange,et al. Android Security, Pitfalls and Lessons Learned , 2013, ISCIS.
[4] E. Gelenbe. Search in unknown random environments. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.
[5] Erol Gelenbe,et al. Disruption tolerant communications for large scale emergency evacuation , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[6] Madalina Baltatu,et al. NEMESYS: First Year Project Experience in Telecom Italia Information Technology , 2013, ISCIS.
[7] Erol Gelenbe,et al. Opportunistic Communications for Emergency Support Systems , 2011, ANT/MobiWIS.
[8] Dimitrios Tzovaras,et al. Towards Visualizing Mobile Network Data , 2013, ISCIS.
[9] P C LeePatrick,et al. On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009 .
[10] Marc Dacier,et al. SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models , 2008, 2008 Seventh European Dependable Computing Conference.
[11] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[12] Thomas F. La Porta,et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.
[13] E. Gelenbe,et al. Time and energy in team-based search , 2013 .
[14] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[15] Patrick P. C. Lee,et al. On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.
[16] Erol Gelenbe,et al. Steps toward self-aware networks , 2009, CACM.
[17] Erol Gelenbe,et al. Natural Computation , 2012, Comput. J..
[18] Erol Gelenbe,et al. A self-aware approach to denial of service defence , 2007, Comput. Networks.
[19] David García,et al. Infrastructure for Detecting Android Malware , 2013, ISCIS.
[20] Erol Gelenbe,et al. Large scale simulation for human evacuation and rescue , 2012, Comput. Math. Appl..
[21] Erol Gelenbe,et al. Task Assignment and Transaction Clustering Heuristics for Distributed Systems , 1997, Inf. Sci..
[22] Steffen Liebergeld,et al. Android Security , Pitfalls , Lessons Learned and BYOD Technical report , 2013 .
[23] Erol Gelenbe,et al. Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach , 2013, ISCIS.
[24] Erol Gelenbe,et al. Emergency Cyber-Physical-Human Systems , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[25] Erol Gelenbe,et al. Intelligent Navigation Systems for Building Evacuation , 2011, ISCIS.
[26] Erol Gelenbe,et al. Probabilistic models of computer systems—Part I (exact results) , 1976, Acta Informatica.
[27] Thomas C. Schmidt,et al. Design, Implementation, and Operation of a Mobile Honeypot , 2013, ArXiv.
[28] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[29] Erol Gelenbe,et al. Random Neural Networks with Multiple Classes of Signals , 1999, Neural Computation.
[30] Marco Cova,et al. HARMUR: storing and analyzing historic data on malicious domains , 2011, BADGERS '11.