Results 1 - 10
of
14
HYBRID MODEL FOR DETECTING VIRUSES IN MOBILE NETWORKS
"... Malware is malicious software which disturbs the network computer operation, hacking the sensitive information and accesses the private systems. It is nothing but a program which is specifically designed to injure the computer it may be a virus or worm. So, in order to overcome this problem a two-la ..."
Abstract
- Add to MetaCart
does not consider the hybrid viruses that disseminate via both BT and SMS channels. So, to increase the efficiency of restraining the propagation of mobile phone viruses, we introduce an innovative approach called a Hybrid virus detection model. The hybrid malware can be distributed by both end
Wireless Security Perspectives
"... Almost two months to the day the first mobile virus appeared, a second bug has struck. Like the Cabir worm, the new Mosquito Trojan targets handsets running the Symbian Series 60 operating system. Mosquito first appeared in mid-August and takes its name from the Mosquitos game published by Ojom for ..."
Abstract
- Add to MetaCart
for Symbian-based camera phones. The virus writers hacked the game, embedded a Trojan Horse and then distributed the corrupted version for free on the internet. The Trojan Horse malware concept is named after the mythical, apparently innocent, wooden horse left outside the gates of Troy. It actually hid
hardware and mobile web technology Master of Science Thesis in Programme Computer Systems and Networks
, 2013
"... Digitising statistics handling through ..."
doi:10.1155/2012/923594 Research Article Analysis of Mobility and Sharing of WSNs By IP Applications
"... License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Movement of wireless sensor and actuator networks, and of nodes between WSANs are becoming more commonplace. However, enabling remote usage of sensory data in multiple ..."
Abstract
- Add to MetaCart
in multiple applications, remote configuration, and actuation is still a big challenge. The purpose of this paper is to analyse and describe which mobility support can best be used in different scenarios, and how shared usage of mobile WSANs by multiple IP applications can best be scaled up. This paper
CMU-CyLab-08-007
, 2008
"... Mobile users share the same expectations as wired users: they want to communicate with other people, they ex-pect the communication to be secure, and it should all be easy. However, mobility poses many challenges for security. Communication is often ad hoc, and the infras-tructure may be untrusted. ..."
Abstract
- Add to MetaCart
-tations of these protocols become more prone to human error. We present GAnGS, a fully-implemented system for exchanging authentic information between mobile de-vices when they are physically present in the same lo-cation. GAnGS is scalable, appropriate for two or more devices. We implement two user-friendly variants of GAn
Human Trust Establishment
, 2011
"... Users regularly experience a crisis of confidence on the Internet. Is that email truly originating from the claimed individual? Is that Facebook invitation indeed from that person or is it a fake page set up by an impersonator? These doubts are usually resolved through a leap of faith, expressing th ..."
Abstract
- Add to MetaCart
offering secrecy and authenticity, which we use to support secure messaging and file exchange. Essentially, we support an abstraction to safely “sling ” information from one device to another. 1 SafeSlinger also provides an API for importing applications’ public keys into a user’s contact information
KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer
, 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract
- Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,
Taipei TW
"... Establishing secure communication among a group of physically collocated people is a challenge. This problem can be reduced to establishing authentic public keys among all the participants – these public keys then serve to establish a shared secret symmetric key for encryption and authentication of ..."
Abstract
- Add to MetaCart
of messages. Unfortunately, in most real-world settings, public key infrastructures (PKI) are uncommon and distributing a secret in a public space is difficult. Thus, it is a challenge to exchange authentic public keys in a scalable, secure, and easy to use fashion. In this paper, we propose GAnGS, a protocol
3esis Supervisor Accepted by
, 2005
"... in partial ful2llment of the requirements for the degree of ..."
Wireless Sensor Networking in Challenging Environments
, 2014
"... This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact ..."
Abstract
- Add to MetaCart
This Dissertation is brought to you for free and open access by Washington University Open Scholarship. It has been accepted for inclusion in All Theses and Dissertations (ETDs) by an authorized administrator of Washington University Open Scholarship. For more information, please contact
Results 1 - 10
of
14