Study on Intrusion Detection on Mobile Security using SIM and PDA
@inproceedings{Kathirvel2016StudyOI, title={Study on Intrusion Detection on Mobile Security using SIM and PDA}, author={K. Kathirvel}, year={2016} }
A new wave in advancement of the Internet of Things is driving toward ubiquitous mutually connected wireless sensor networks and embedded devices that can be potentially accessed from anywhere in the world. Hence cyber security is essential in Internet of things and also it becomes a challenge in securing the data in the Internet connected devices. I Therefore, IoT devices specifically Wireless sensor may now embody an idyllic intention for malware writers. As the number of vulnerabilities and… CONTINUE READING
References
SHOWING 1-10 OF 23 REFERENCES
A cloud-based intrusion detection and response system for mobile phones
- Computer Science
- 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W)
- 2011
- 96
- PDF
Behavior-Based Intrusion Detection in Mobile Phone Systems
- Computer Science
- J. Parallel Distributed Comput.
- 2002
- 63
Host-Based Intrusion Detection for Advanced Mobile Devices
- Computer Science
- 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06)
- 2006
- 58
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
- Computer Science
- Third IEEE International Conference on Pervasive Computing and Communications Workshops
- 2005
- 106
- PDF
Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery
- Computer Science
- 2006 Securecomm and Workshops
- 2006
- 137
- PDF
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
- Computer Science
- J. Syst. Softw.
- 2010
- 100
Monitoring Smartphones for Anomaly Detection
- Engineering, Computer Science
- Mob. Networks Appl.
- 2009
- 149
- PDF
Intrusion detection model based on Android
- Computer Science
- 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology
- 2011
- 27