Sciweavers

53 search results - page 9 / 11
» A context-sensitive security model for privacy protection on...
Sort
View
WISTP
2010
Springer
14 years 1 months ago
A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given ...
Tansu Alpcan, Christian Bauckhage, Aubrey-Derrick ...
CCS
2009
ACM
14 years 7 months ago
Authenticated wireless roaming via tunnels: making mobile guests feel at home
In wireless roaming a mobile device obtains a service from some foreign network while being registered for the similar service at its own home network. However, recent proposals tr...
Mark Manulis, Damien Leroy, François Koeune...
PERVASIVE
2011
Springer
12 years 9 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...
SACMAT
2009
ACM
14 years 1 months ago
Working set-based access control for network file systems
Securing access to files is an important and growing concern in corporate environments. Employees are increasingly accessing files from untrusted devices, including personal hom...
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
JTAER
2007
125views more  JTAER 2007»
13 years 6 months ago
Australian Case Studies in Mobile Commerce
Sixteen wireless case studies highlight issues relating to mobile commerce in Australia. The issues include: the need for a clear business case; difficulty of achieving critical m...
Jonathan O'Donnell, Margaret Jackson, Marita Shell...