7Jun/110
Temporal Complex Network Measures for Mobile Malware Containment
Posted by John Tang
Picture the scene: you've bought a shiny new smartphone and have been customising it all weekend by installing various apps from the app store, however the following week you encounter a run of bad luck...
...first your house is burgled when you're at work, next your credit card is maxed out, your friends have been receiving spam text messages from you and to top it off, weeks later, some of your colleagues have had the same experience; what is going on?
Little beknown to you, within one of these seemingly innocuous apps lurks a piece of mobile malware (mobware) which has access to a wealth of personal information which an attacker can access remotely. Â
Pages
Categories
- Awards
- Conference
- Distributed Systems
- Energy
- Location
- Measurements
- Mobile
- Networks
- Operating Systems
- Parallelism
- Programming
- Rants
- Research Agenda
- Sensors
- Social
- Storage
- Uncategorized
- Workshop
Blogroll
Archive
- March 2018
- February 2018
- November 2017
- April 2016
- August 2015
- January 2015
- November 2014
- September 2014
- August 2014
- June 2014
- December 2013
- November 2013
- October 2013
- September 2013
- August 2013
- July 2013
- April 2013
- October 2012
- September 2012
- July 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- October 2011
- September 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- January 2011