Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device
暂无分享,去创建一个
[1] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[2] Gregory D. Abowd,et al. Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.
[3] Grant A. Jacoby,et al. Battery-based intrusion detection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[4] Li Han,et al. Research on Context-Aware Mobile Computing , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[5] Guanling Chen,et al. A Survey of Context-Aware Mobile Computing Research , 2000 .
[6] Giovanni Vigna,et al. Using Labeling to Prevent Cross-Service Attacks Against Smart Phones , 2006, DIMVA.
[7] Michael S. Hsiao,et al. Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[8] P. Coulton,et al. Mobile phone vulnerabilities: a new generation of malware , 2004, IEEE International Symposium on Consumer Electronics, 2004.
[9] Dongsoo Kim,et al. Understanding Influence of Mobile Internet Services on Life Behavior of Mobile Users , 2007, HCI.
[10] Bill N. Schilit,et al. Context-aware computing applications , 1994, Workshop on Mobile Computing Systems and Applications.