This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
—The central paradigm of today’s successful Internet is to keep the network core simple and move complexity towards the network end points. Unfortunately, this very paradigm li...
Third generation’s wireless communications systems comprise advanced signal processing algorithms that increase the computational requirements more than ten-fold over 2G’s sys...
Heiko Michel, Alexander Worm, Norbert Wehn, Michae...
Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
Screen space is a limited resource for computer users-multiple monitors are one means of workspace expansion, and "virtual desktops" are yet another way to increase scre...