[19] I. Stojmenovic, I. (Ed.). Handbook of Wireless Networks and Mobile Computing, vol. 27, John Wiley & Sons, 2003.
[20] J. Bellardo and S. Savage, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions,” USENIX Security, pp. 15-28, August 2003.
[21] T. S. Sobh, “Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art,”
Computer Standards & Interfaces, vol. 28, no. 6, pp. 670-694, 2006.
[22] A. Beach, M. Gartrell, and R. Han, “Solutions to security and privacy issues in mobile social networking,” in Proc. IEEE
International Conference on Computational Science and Engineering, vol. 4, August 2009, pp. 1036-1042.
[23] D. Geneiatakis, T. Dagiuklas, G. Kambourakis, C. Lambrinoudakis, S. Gritzalis, S. Ehlert, and D. Sisalem, “Survey of security vulnerabilities in session initiation protocol,” IEEE Communications Surveys and Tutorials, vol. 8, no. 1-4, pp. 68-81, 2006.
[24] S. A. Schuckers, “Spoofing and anti-spoofing measures,” Information Security Technical Report, vol. 7, no. 4, pp. 56-62, 2002.
[25] W. Stallings, Network Security Essentials: Applications and Standards, Pearson Education India, 2007.
[26] S. J. Cereola and R. J. Cereola, “Breach of data at TJX: An instructional case used to study COSO and COBIT, with a focus
on computer controls, data security, and privacy legislation,” Issues in Accounting Education, vol. 26, no. 3, pp. 521-545.
[27] S. Ramu, “Mobile malware evolution, detection and defense, EECE 571B, Term Survey Paper, 2006.
[28] C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2, pp. 293-315, 2003.
[29] J. J. V. Rensburg and B. Irwin, “Wireless security tools, Computer Science, vol. 83, no. 944, p. 3924, 2006.
[30] T. Hardjono and J. Seberry, Information Security Issues in Mobile
[31] M. Decker, “A security model for mobile processes,” in Proc. 7th International IEEE Conference on Mobile Business, July 2008, pp. 211-220.
[32] G. H. Forman and J. Zahorjan, “The challenges of mobile computing,” Computer, vol. 27, no. 4, pp. 38-47, 1994.
Heraghty, M. (2014). The workplace of 2025 will be wherever you want it. Retrieved from http://www.bbc.com/news/business-19639048
Knowlton, T. (2014). Canadians anticipate connected world in 2025, Have concerns about security and privacy. Retrieved from http://www.techvibes.com/blog/connected-world-2014-09-22
Do'stlaringiz bilan baham: |