Unmanned aerial vehicle smart device ground control station cyber security threat model
暂无分享,去创建一个
Shahryar Sarkani | Timothy Eveleigh | Thomas H. Holzer | Katrina Mansfield | T. Eveleigh | S. Sarkani | T. Holzer | Katrina Mansfield
[1] Charlie Miller,et al. Mobile Attacks and Defense , 2011, IEEE Security & Privacy.
[2] Helen J. Wang,et al. Smartphone attacks and defenses , 2004 .
[3] E. Cummins,et al. Best security practices for android, blackberry, and iOS , 2012, 2012 The First IEEE Workshop on Enabling Technologies for Smartphone and Internet of Things (ETSIoT).
[4] Ravi Sharma,et al. Study of Latest Emerging Trends on Cyber Security and its challenges to Society , 2012 .
[5] Dimitris Gritzalis,et al. A Risk Assessment Method for Smartphones , 2012, SEC.
[6] Marwan Omar,et al. CYBER SECURITY AND MOBILE THREATS: THE NEED FOR ANTIVIRUS APPLICATIONS FOR SMART PHONES , 2012 .
[7] F. Ashcroft,et al. VIII. References , 1955 .
[8] R. Holloway,et al. The cyber crime threat on mobile devices , 2012 .
[9] Igor Bernik,et al. Mobile Devices and Corporate Data Security , .
[10] Yuval Elovici,et al. Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.
[11] Jessica Keyes. Guidelines for Managing and Securing Mobile Devices in the Enterprise , 2013 .
[12] Marin Silic,et al. Emerging security threats for mobile platforms , 2011, 2011 Proceedings of the 34th International Convention MIPRO.
[13] Bharat Bhargava,et al. Secure Wireless Network with Movable Base Stations , 2003 .
[14] Ralph Kohler,et al. Infrastructure, middleware, and applications for portable cellular devices in tactical edge networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[15] Neal Leavitt,et al. Mobile Security: Finally a Serious Problem? , 2011, Computer.
[16] Steve Mansfield-Devine,et al. Android architecture: attacking the weak points , 2012, Netw. Secur..
[17] Yong Wang,et al. Smartphone Security Challenges , 2012, Computer.
[18] Chang-Joo Moon,et al. Ground System Software for Unmanned Aerial Vehicles on Android Device , 2013 .
[19] M. Dunn,et al. NONFORMAL, INFORMAL EDUCATION AND POVERTY REDUCTION – A ROLE FOR TVET? , 2012 .
[20] John P. O'Sullivan. Potential Vulnerabilities of a USMC Tactical Wireless Local Area Network , 2001 .
[21] Chris Rose. Smart Phone, Dumb Security , 2011, BIS 2011.
[22] Dongho Won,et al. A Practical Analysis of Smartphone Security , 2011, HCI.