Mobile Computing and Networking



Download 252,25 Kb.
bet22/22
Sana22.07.2021
Hajmi252,25 Kb.
#126088
1   ...   14   15   16   17   18   19   20   21   22
Bog'liq
Term Paper edited

References

[19] I. Stojmenovic, I. (Ed.). Handbook of Wireless Networks and Mobile Computing, vol. 27, John Wiley & Sons, 2003.

[20] J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” USENIX Security, pp. 15-28, August 2003.

[21] T. S. Sobh, “Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art,”

Computer Standards & Interfaces, vol. 28, no. 6, pp. 670-694, 2006.

[22] A. Beach, M. Gartrell, and R. Han, “Solutions to security and privacy issues in mobile social networking,” in Proc. IEEE

International Conference on Computational Science and Engineering, vol. 4, August 2009, pp. 1036-1042.

[23] D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, and D. Sisalem, “Survey of security vulnerabilities in session initiation protocol,” IEEE Communications Surveys and Tutorials, vol. 8, no. 1-4, pp. 68-81, 2006.

[24] S. A. Schuckers, “Spoofing and anti-spoofing measures,” Information Security Technical Report, vol. 7, no. 4, pp. 56-62, 2002.

[25] W. Stallings, Network Security Essentials: Applications and Standards, Pearson Education India, 2007.

[26] S. J. Cereola and R. J. Cereola, “Breach of data at TJX: An instructional case used to study COSO and COBIT, with a focus

on computer controls, data security, and privacy legislation,” Issues in Accounting Education, vol. 26, no. 3, pp. 521-545.

[27] S. Ramu, “Mobile malware evolution, detection and defense, EECE 571B, Term Survey Paper, 2006.

[28] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2, pp. 293-315, 2003.

[29] J. J. V. Rensburg and B. Irwin, “Wireless security tools, Computer Science, vol. 83, no. 944, p. 3924, 2006.

[30] T. Hardjono and J. Seberry, Information Security Issues in Mobile

[31] M. Decker, “A security model for mobile processes,” in Proc. 7th International IEEE Conference on Mobile Business, July 2008, pp. 211-220.

[32] G. H. Forman and J. Zahorjan, “The challenges of mobile computing,” Computer, vol. 27, no. 4, pp. 38-47, 1994.



Heraghty, M. (2014). The workplace of 2025 will be wherever you want it. Retrieved from http://www.bbc.com/news/business-19639048

Knowlton, T. (2014). Canadians anticipate connected world in 2025, Have concerns about security and privacy. Retrieved from http://www.techvibes.com/blog/connected-world-2014-09-22
Download 252,25 Kb.

Do'stlaringiz bilan baham:
1   ...   14   15   16   17   18   19   20   21   22




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish