1 |
Ko, S., Ji, Y., Kim, D.: Understanding Influence of Mobile Internet Services on Life Behavior of Mobile Users. In Proc. of Human-Computer Interaction, LNCS, vol. LNCS 4553, pp. 944-953 (2007)
DOI
ScienceOn
|
2 |
Jamaluddin, J., Zotou, N., Edwards, R.: Mobile phone vulnerabilities: a new generation of malware. In Proc. of IEEE International Symposium on Consumer Electronics, pp. 199-202 (2004)
|
3 |
Schilit, B. N. Adams, N., Want, R.: Context-Aware Computing Applications. In Proc. of IEEE Workshop Mobile Computing Systems and Applications, pp.85-90, (1994)
DOI
|
4 |
Chen, G. & Kotz, D. A Survey of Context-Aware Mobile Computing Research. Dartmouth Computer Science Technical Report, TR2000-381 (2000)
|
5 |
Han, L., Jyri, S., Ma, J., Yu, K.: Research on Context-Aware Mobile Computing. In Proc. of 22nd International Conference on Advanced Information Networking and Applications, pp. 24-30 (2008)
DOI
|
6 |
Dey, A. K., Abowd, G. D.: Towards a Better Understanding of Context and Context-Awareness. In Proc. of the workshop on the What, Who, Where, When and How of Context-Awareness (2000)
DOI
|
7 |
Mulliner, C., Vigna, G., Dagon, D., Lee, W.: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. In Proc. of SIG SIDAR Conf. on Detection of Intrusions and Malware & Vulnerability Assessment, LNCS, Vol.4064, pp. 91-108, (2006)
DOI
ScienceOn
|
8 |
Nash, D. C., Martin, T. L., Ha, D. S., Hsiao, M. S.: Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices. In Proc. of the 3rd Int'l Conf. on Pervasive Computing and Communications Workshops, pp.141-145, (2005)
|
9 |
Martin, T., Hsiao, M., Ha, D., Krishnaswami, J.: Denial-of-Service Attacks on Battery-powered Mobile Computers. In Proc. of the 2th IEEE Annual Conf. on Pervasive Computing and Communications, pp.309-318 (2004)
|
10 |
Jacoby, G. A., Davis IV, N. J.: Battery-Based Intrusion Detection. In Proc. of Globecom 2004, pp. 2250-2255 (2004)
|