Security Vulnerability Analysis and Forensic Data Research to Attacks on Mobile Stock Trading System in WiBro Network
暂无分享,去创建一个
[1] Dea-Woo Park,et al. A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique , 2006 .
[2] Mahmoud Reza Hashemi,et al. A Secure m-Payment Protocol for Mobile Devices , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.
[3] Seo Jeong-Man,et al. A Study of Security Method against Attack in TCP/IP , 2005 .
[4] Tzi-cker Chiueh,et al. Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[5] Dea-Woo Park. A study about dynamic intelligent network security systems to decrease by malicious traffic , 2006 .
[6] Weili Han,et al. Anti-Phishing by Smart Mobile Device , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[7] Toshihiko Yamakami. MobileWeb 2.0: Lessons from Web 2.0 and Past Mobile Internet Development , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[8] Dea-Woo Park,et al. A Study on Extraction of Mobile Forensic Data and Integrity Proof , 2007 .
[9] Angela Orebaugh,et al. Wireshark & Ethereal Network Protocol Analyzer Toolkit , 2007 .
[10] M. N. Doja,et al. Image Authentication Schemes against Key-Logger Spyware , 2008, 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing.