An Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computers

作者: Daniel C. Nash

DOI:

关键词:

摘要:

参考文章(10)
Emilie Lundin, Erland Jonsson, Survey of Intrusion Detection Research Chalmers University of Technology. ,(2002)
J. Balthrop, S. Forrest, M.R. Glickman, Revisiting LISYS: parameters and normal behavior congress on evolutionary computation. ,vol. 2, pp. 1045- 1050 ,(2002) , 10.1109/CEC.2002.1004387
Anil Somayaji, Stephanie Forrest, Automated response using system-call delays usenix security symposium. pp. 14- 14 ,(2000)
T. Martin, M. Hsiao, Dong Ha, J. Krishnaswami, Denial-of-service attacks on battery-powered mobile computers pervasive computing and communications. pp. 309- 318 ,(2004) , 10.1109/PERCOM.2004.1276868
T. Mudge, Power: a first-class architectural design constraint IEEE Computer. ,vol. 34, pp. 52- 58 ,(2001) , 10.1109/2.917539
Paul Kocher, Joshua Jaffe, Benjamin Jun, Differential Power Analysis international cryptology conference. ,vol. 1666, pp. 388- 397 ,(1999) , 10.1007/3-540-48405-1_25
M. Satyanarayanan, Pervasive computing: vision and challenges IEEE Personal Communications. ,vol. 8, pp. 10- 17 ,(2001) , 10.1109/98.943998