Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments
暂无分享,去创建一个
[1] Mahmut T. Kandemir,et al. Studying energy trade offs in offloading computation/compilation in Java-enabled mobile devices , 2004, IEEE Transactions on Parallel and Distributed Systems.
[2] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[3] Dimitris Gritzalis,et al. Delegate the smartphone user? Security awareness in smartphone platforms , 2013, Comput. Secur..
[4] Songwu Lu,et al. SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.
[5] Jason Flinn,et al. Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.
[6] Pi-Cheng Hsiu,et al. Dynamic Backlight Scaling Optimization: A Cloud-Based Energy-Saving Service for Mobile Streaming Applications , 2014, IEEE Transactions on Computers.
[7] Doohwan Oh,et al. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems , 2013, Sensors.
[8] Kun Yang,et al. On effective offloading services for resource-constrained mobile devices running heavier mobile Internet applications , 2008, IEEE Communications Magazine.
[9] Robert S. Boyer,et al. A fast string searching algorithm , 1977, CACM.
[10] Doohwan Oh,et al. Multi-Threading and Suffix Grouping on Massive Multiple Pattern Matching Algorithm , 2012, Comput. J..
[11] Yung-Hsiang Lu,et al. Energy efficient content-based image retrieval for mobile systems , 2009, 2009 IEEE International Symposium on Circuits and Systems.
[12] Won Woo Ro,et al. Offloading of media transcoding for high-quality multimedia services , 2012, IEEE Transactions on Consumer Electronics.
[13] Seung Woo Lee,et al. A Hardware-Based String Matching Using State Transition Compression for Deep Packet Inspection , 2013 .
[14] Cheng Wang,et al. Computation offloading to save energy on handheld devices: a partition scheme , 2001, CASES '01.
[15] James Murty,et al. Programming Amazon web services - S3, EC2, SQS, FPS, and SimpleDB: outsource your infrastructure , 2008 .
[16] Zhiyuan Li,et al. Energy impact of secure computation on a handheld device , 2002, 2002 IEEE International Workshop on Workload Characterization.
[17] William H. Sanders,et al. Secloud: A cloud-based comprehensive and lightweight security solution for smartphones , 2013, Comput. Secur..
[18] Sahin Albayrak,et al. Monitoring smartphones for anomaly detection , 2008 .
[19] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[20] Bernd Freisleben,et al. Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments , 2011, 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing.
[21] David Brumley,et al. SplitScreen: Enabling efficient, distributed malware detection , 2010, Journal of Communications and Networks.
[22] Judith Kelner,et al. Deep packet inspection tools and techniques in commodity platforms: Challenges and trends , 2012, J. Netw. Comput. Appl..
[23] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[24] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[25] Tae-Hyung Kim,et al. Energy-efficient Run-time Detection of Malware-infected Executables and Dynamic Libraries on Mobile Devices , 2009, 2009 Software Technologies for Future Dependable Distributed Systems.
[26] Bharat K. Bhargava,et al. A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.
[27] Sahin Albayrak,et al. Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..
[28] Tsern-Huei Lee,et al. Using String Matching for Deep Packet Inspection , 2008, Computer.
[29] Udi Manber,et al. A FAST ALGORITHM FOR MULTI-PATTERN SEARCHING , 1999 .
[30] Viktor K. Prasanna,et al. A Memory-Efficient and Modular Approach for Large-Scale String Pattern Matching , 2013, IEEE Transactions on Computers.
[31] Beipeng Mu,et al. NetSecu: A Collaborative Network Security Platform for In-network Security , 2011, 2011 Third International Conference on Communications and Mobile Computing.
[32] Liviu Iftode,et al. Enhancing Mobile Malware Detection with Social Collaboration , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.