On the Feasibility of Malware Attacks in Smartphone Platforms (Englisch)
- Neue Suche nach: Mylonas, Alexios
- Neue Suche nach: Dritsas, Stelios
- Neue Suche nach: Tsoumas, Bill
- Neue Suche nach: Gritzalis, Dimitris
- Neue Suche nach: Mylonas, Alexios
- Neue Suche nach: Dritsas, Stelios
- Neue Suche nach: Tsoumas, Bill
- Neue Suche nach: Gritzalis, Dimitris
In:
E-Business and Telecommunications
5
;
217-232
;
2012
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:On the Feasibility of Malware Attacks in Smartphone Platforms
-
Beteiligte:Mylonas, Alexios ( Autor:in ) / Dritsas, Stelios ( Autor:in ) / Tsoumas, Bill ( Autor:in ) / Gritzalis, Dimitris ( Autor:in )
-
Erschienen in:E-Business and Telecommunications , 5 ; 217-232Communications in Computer and Information Science ; 314, 5 ; 217-232
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2012
-
Format / Umfang:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Biometric Privacy Protection: Guidelines and TechnologiesLabati, Ruggero Donida / Piuri, Vincenzo / Scotti, Fabio et al. | 2012
- 20
-
Face Recognition in Uncontrolled Environments, Experiments in an AirportConde, Cristina / Diego, Isaac Martin / Cabello, Enrique et al. | 2012
- 33
-
Paradigms of Distributed Software Systems: Services, Processes and Self-organizationLamersdorf, Winfried et al. | 2012
- 43
-
A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor NetworksGasull, V. G. / Larios, D. F. / Barbancho, J. / León, C. / Obaidat, M. S. et al. | 2012
- 60
-
Evaluating Super Node Selection and Load Balancing in P2P VoIP Networks Using Stochastic Graph TransformationKhan, Ajab / Heckel, Reiko et al. | 2012
- 74
-
Shared Security: How Wireless Sensor Networks Can Benefit from Threshold CryptographyKoschuch, Manuel / Hudler, Matthias / Krüger, Michael / Lory, Peter / Wenzl, Jürgen et al. | 2012
- 85
-
Selection of Information-Intensive Services: A Multi-criteria Decision ModelMettler, Tobias / Eurich, Markus et al. | 2012
- 100
-
Territorial Safety NetworksSteinhauser, Martin / Sonnenbichler, Andreas C. / Geyer-Schulz, Andreas et al. | 2012
- 115
-
Killer Applications for Fiber to the Home Networks: Market Potential, Time Horizons and User GroupsEvens, Tom / Boudry, Elke / Verdegem, Pieter / Marez, Lieven / Vanhauwaert, Erik / Casier, Koen / Ooteghem, Jan / Verbrugge, Sofie et al. | 2012
- 129
-
To Bid or Not To Bid? Investigating Retail-Brand Keyword Performance in Sponsored Search AdvertisingBlask, Tobias / Funk, Burkhardt / Schulte, Reinhard et al. | 2012
- 141
-
Client-Oriented Preferences Model for QoS Aggregation in Service-Based ApplicationsFakhfakh, Nabil / Pourraz, Frédéric / Verjus, Hervé / Moreaux, Patrice et al. | 2012
- 156
-
An Answer to “Who Needs a Stylus?” on Handwriting Recognition on Mobile DevicesHolzinger, Andreas / Searle, Gig / Peischl, Bernhard / Debevc, Matjaz et al. | 2012
- 168
-
Application of Metamorphic Testing to a Case Study in Web Services CompositionsCastro-Cabrera, Carmen / Medina-Bulo, Inmaculada et al. | 2012
- 185
-
Time Stretching of UWB Radio Signals Using a Photonic Analogue-to-Digital Converter System Based on Wavelength Division MultiplexingAlves, Tiago / Cartaxo, Adolfo et al. | 2012
- 203
-
Spam Filtering through Anomaly DetectionSantos, Igor / Laorden, Carlos / Ugarte-Pedrero, Xabier / Sanz, Borja / Bringas, Pablo G. et al. | 2012
- 217
-
On the Feasibility of Malware Attacks in Smartphone PlatformsMylonas, Alexios / Dritsas, Stelios / Tsoumas, Bill / Gritzalis, Dimitris et al. | 2012
- 233
-
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption SchemeFukushima, Kazuhide / Kiyomoto, Shinsaku / Miyake, Yutaka / Sakurai, Kouichi et al. | 2012
- 249
-
Accelerating Reduction for Enabling Fast Multiplication over Large Binary FieldsDas, Saptarsi / Narayan, Ranjani / Nandy, Soumitra Kumar et al. | 2012
- 264
-
A Related-Key Attack against Multiple Encryption Based on Fixed PointsBay, Aslı / Mashatan, Atefeh / Vaudenay, Serge et al. | 2012
- 281
-
Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist GrøstlAoki, Kazumaro / Matusiewicz, Krystian / Roland, Günther / Sasaki, Yu / Schläffer, Martin et al. | 2012
- 296
-
Attack Interference: A Path to Defending Security ProtocolsFiazza, Maria-Camilla / Peroli, Michele / Viganò, Luca et al. | 2012
- 315
-
A Framework for Dynamic Optimization of Security and PerformancesTaddeo, Antonio Vincenzo / García Morales, Luis Germán / Ferrante, Alberto et al. | 2012
- 330
-
Broadcast Authentication in a Low Speed Controller Area NetworkGroza, Bogdan / Murvay, Pal-Stefan et al. | 2012
- 347
-
Efficiently Managing Multimedia Hierarchical Data with the WINDSURF LibraryBartolini, Ilaria / Patella, Marco / Stromei, Guido et al. | 2012
- 362
-
A Method of Real-Time Non-uniform Speech StretchingKupryjanow, Adam / Czyzewski, Andrzej et al. | 2012
- 374
-
Decoding of LDPC-Based 2D-Barcodes Using a 2D-Hidden-Markov-ModelProß, Wolfgang / Quint, Franz / Otesteanu, Marius et al. | 2012
- 388
-
A Comparative Evaluation of Gaussian Multiscale Aggregation for Hand Biometricsde-Santos-Sierra, Alberto / Sánchez-Ávila, Carmen / Guerra-Casanova, Javier / Bailador-del-Pozo, Gonzalo et al. | 2012
- 400
-
Touching Character Segmentation Method of Archaic Lanna ScriptPravesjit, Sakkayaphop / Thammano, Arit et al. | 2012
- 409
-
Small and Large Vocabulary Speech Recognition of MP3 Data under Real-Word Conditions: Experimental StudyPollak, Petr / Borsky, Michal et al. | 2012
- 420
-
Weight Based Fast Mode Decision for H.264/AVC Video Coding StandardGanguly, Amrita / Mahanta, Anil et al. | 2012
- 432
-
Investigation and Improved Configuration Settings for H.264 CGS/MGS Quality Scalable CodingYang, Shih-Hsuan / Tang, Wei-Lune et al. | 2012
- 449
-
Downlink Multiuser MIMO-OFDM SystemsAust, Sebastian / Ahrens, Andreas / Cano-Broncano, Francisco / Benavente-Peces, César et al. | 2012
- 464
-
Experience in Deploying a Wireless Sensor Network in a VineyardGay-Fernandez, José A. / Cuiñas, Iñigo et al. | 2012
- 477
-
Experimental Detection and Synchronisation Validation for a TR-UWB System Based on the Time Delayed Sampling and Correletion SchemePardiñas-Mir, Jorge A. / Muller, Muriel / Lamberti, Roger / Gimenes, Claude et al. | 2012
- 492
-
Link Adaptation in Ad Hoc Networks Based on Interference MinimizationAwuor, Fredrick / Djouani, Karim / Kimeli, Kimutai / Rambim, Dorothy et al. | 2012
- 503
-
Unidirectional Traffic Flow to Protect Wireless Sensor Networks against Byzantine AttacksStelte, Björn et al. | 2012
- 519
-
Successive Interference Cancellation for Multi-user MIMO-OFDM Ad-Hoc Networks: A Performance-Complexity TradeoffMiridakis, Nikolaos I. / Vergados, Dimitrios D. et al. | 2012