Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
暂无分享,去创建一个
Michael S. Hsiao | Dong S. Ha | Thomas L. Martin | Daniel C. Nash | M. Hsiao | T. Martin | D. Ha | Daniel C. Nash
[1] Mahadev Satyanarayanan,et al. Pervasive computing: vision and challenges , 2001, IEEE Wirel. Commun..
[2] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[3] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[4] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[5] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[6] Stephanie Forrest,et al. Automated response using system-call delays , 2000 .
[7] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.