Proximity breeds danger: emerging threats in metro-area wireless networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Security and usability research using a microworld environment
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
A random walk model for infection on graphs
Proceedings of the Fourth International ICST Conference on Performance Evaluation Methodologies and Tools
A random walk model for infection on graphs: spread of epidemics & rumours with mobile agents
Discrete Event Dynamic Systems
On the need for different security methods on mobile phones
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
Tunneled TLS for multi-factor authentication
Proceedings of the 11th annual ACM workshop on Digital rights management
"Andromaly": a behavioral malware detection framework for android devices
Journal of Intelligent Information Systems
Mobile data charging: new attacks and countermeasures
Proceedings of the 2012 ACM conference on Computer and communications security
Slicing droids: program slicing for smali code
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Hi-index | 4.10 |
Security experts are finding an increasing number of viruses, worms, and Trojan horses that target cell phones. Experts say it is only a matter of time before this mobile malware causes extensive damage.