Proceedings of the Third ACM Workshop on Security and Privacy in Smartphones &Amp; Mobile Devices 2013
DOI: 10.1145/2516760.2516763
|View full text |Cite
|
Sign up to set email alerts
|

This network is infected

Abstract: In recent years, the number of sophisticated cyber attacks has increased rapidly. At the same time, people tend to utilize unknown, in terms of trustworthiness, wireless networks in their daily life. They connect to these networks, e.g., airports, without knowledge of whether they are safe or infected with actively propagating malware. In traditional networks, malicious behavior can be detected via Intrusion Detection Systems (IDSs). However, IDSs cannot be applied easily to mobile environments and to resource… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 14 publications
references
References 11 publications
0
0
0
Order By: Relevance