Sciweavers

1490 search results - page 81 / 298
» Monitoring Mobile Code
Sort
View
141
Voted
RAID
2010
Springer
15 years 1 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
131
Voted
TCSV
2002
94views more  TCSV 2002»
15 years 2 months ago
Supporting image and video applications in a multihop radio environment using path diversity and multiple description coding
This paper examines the effectiveness of combining multiple description coding (MDC) and multiple path transport (MPT) for video and image transmission in a multihop mobile radio n...
Nitin Gogate, Doo-Man Chung, Shivendra S. Panwar, ...
135
Voted
CASSIS
2005
Springer
15 years 8 months ago
Mobile Resource Guarantees and Policies
This paper introduces notions of resource policy for mobile code to be run on smart devices, to integrate with the proof-carrying code architecture of the Mobile Resource Guarantee...
David Aspinall, Kenneth MacKenzie
AICT
2006
IEEE
135views Communications» more  AICT 2006»
15 years 8 months ago
Towards Node-Level Security Management in Self-Organizing Mobile Ad Hoc Networks
The inherent freedom due to a lack of central authority in self-organized mobile ad hoc networks introduces challenges for security and trust management. Arguably, trust managemen...
Reijo Savola, Ilkka Uusitalo
112
Voted
PERVASIVE
2005
Springer
15 years 8 months ago
Parasitic Mobility for Pervasive Sensor Networks
Distributed sensor networks offer many new capabilities for contextually monitoring environments. By making such systems mobile, we increase the application-space for the distribut...
Mathew Laibowitz, Joseph A. Paradiso