A Framework For Detecting Bluetooth Mobile Worms.
Bluetooth is an industrial standard for wireless specification for wireless personal area network (PAN). In recent years, Bluetooth technology has become a standard in mobile devices such as cell phones, smart phones and personal digital assistant (PDA) for short range communication.
| Main Authors: | Sarwar, Usman, Ramadass, Sureswaran, Budiarto, Rahmat |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/9372/ http://eprints.usm.my/9372/1/A_Framework_For_Detecting_Bluetooth_Mobile_Worms.pdf |
Similar Items
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007)
by: Budiarto, Rahmat, et al.
Published: (2007)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
POSFinger: A New Fingerprint For Passive Remote Operating System Identification.
by: Manasrah, Ahmad, et al.
Published: (2007)
by: Manasrah, Ahmad, et al.
Published: (2007)
A Study on Techniques for Handling Transmission Error of IPV6 Packets over Fmer Optic Links
by: Budiarto, Rahmat, et al.
Published: (2010)
by: Budiarto, Rahmat, et al.
Published: (2010)
Context Aware Handover Algorithms For Mobile Positioning Systems
by: Zaman Khan, Sazid, et al.
Published: (2014)
by: Zaman Khan, Sazid, et al.
Published: (2014)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Efficient Queue And Gsi Security
Management Framework For Mobile
Desktop Grid
by: Sarwar, Muhammad Imran
Published: (2008)
by: Sarwar, Muhammad Imran
Published: (2008)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Future Internet With IPv6.
by: Budiarto, Rahmat
Published: (2009)
by: Budiarto, Rahmat
Published: (2009)
Survey And New Approach In Service Discovery And Advertisement For Mobile Ad Hoc Networks.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
Enhanced Bluetooth Low Energy 5 Aodv-Based Mesh Communication Protocol With Multipath Support
by: Ghori, Muhammad Rizwan
Published: (2023)
by: Ghori, Muhammad Rizwan
Published: (2023)
Security Mechanisms For The Ipv4 To Ipv6 Transition.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Simple Knit Design System; Using Pattern Matching.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
A Neural Network-Based Application to Identify Cubic Structures in Multi Component Crystalline Materials Using X-Ray Diffraction Data.
by: Syukur, Mohammad, et al.
Published: (2007)
by: Syukur, Mohammad, et al.
Published: (2007)
Color-based Image Retrieval Using Wavelet.
by: Sumari, Putra, et al.
Published: (2004)
by: Sumari, Putra, et al.
Published: (2004)
A New Image-Database Encryption Based on A Hybrid Approach of Data-at-Rest and Data-in-Motion Encryption Protocol.
by: Ooi, Bee Sien, et al.
Published: (2004)
by: Ooi, Bee Sien, et al.
Published: (2004)
Selecting A Cyclic Redundancy Check (CRC) Generator Polynomial for CEH (CRC Extension Header).
by: Supriyanto, Supriyanto, et al.
Published: (2009)
by: Supriyanto, Supriyanto, et al.
Published: (2009)
QoS Mechanism With Probability For IPv6-Based IPTV Network.
by: H.S, Primantara, et al.
Published: (2009)
by: H.S, Primantara, et al.
Published: (2009)
lPv6 Transition: Why A New Security Mechanisms Model Is Necessary.
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
by: Hj Mat Taib, Abidah, et al.
Published: (2007)
Hybrid Hierarchical Approach For Addressing Service
Discovery Issues In MANETS.
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
by: Seno, Seyed Amin Hosseini, et al.
Published: (2007)
Honeypots: Why We Need A Dynamics Honeypots?
by: Budiarto, Rahmat, et al.
Published: (2004)
by: Budiarto, Rahmat, et al.
Published: (2004)
A Mobile Learning Objects Compilation Framework Based On Semantic Web And Random Forest
by: Phillip, Rogers Bhalalusesa
Published: (2017)
by: Phillip, Rogers Bhalalusesa
Published: (2017)
Quality Of Service Enabled Cross-Layer Multicast Framework For Mobile Ad Hoc Networks.
by: Mohammed Saghir, Mohammed
Published: (2008)
by: Mohammed Saghir, Mohammed
Published: (2008)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
A New Approach to Enhance E-mail Performance through POP3 Protocol
by: Al Bazar, Hussein, et al.
Published: (2008)
by: Al Bazar, Hussein, et al.
Published: (2008)
An Intelligent Method. For Processing String In 3-D Based
On Its Minimum Energy.
by: Budiarto, Rahmat, et al.
Published: (2002)
by: Budiarto, Rahmat, et al.
Published: (2002)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
Performance Evaluation Of Unidirectional Lightweight Encapsulation Using ns-2 And DVB-S Testbed.
by: Ang, Way-Chuang, et al.
Published: (2007)
by: Ang, Way-Chuang, et al.
Published: (2007)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
A Framework Of High Mobility Routing For Video Transmission In Vehicular Ad Hoc Networks Using Relative Speed And Distance
by: Mohammed Yousef, Walid Shaher
Published: (2017)
by: Mohammed Yousef, Walid Shaher
Published: (2017)
SIP-based proactive and adaptive mobility management framework for heterogeneous networks
by: YEE, Y, et al.
Published: (2008)
by: YEE, Y, et al.
Published: (2008)
SIP-based proactive and adaptive mobility management framework for heterogeneous networks
by: YEE, Y, et al.
Published: (2008)
by: YEE, Y, et al.
Published: (2008)
Framework To Enhance Veracity And Quality Of Big Data
by: Ridzuan, Fakhitah
Published: (2021)
by: Ridzuan, Fakhitah
Published: (2021)
Concept And Relation Extraction Framework For Ontology Learning
by: Al-Aswadi, Fatima Nadeem Salem
Published: (2023)
by: Al-Aswadi, Fatima Nadeem Salem
Published: (2023)
Ethical Framework On Breast Self-Examination System
by: Khana, Rajes
Published: (2022)
by: Khana, Rajes
Published: (2022)
Enhanced Automated Framework For Cattle Tracking And Classification
by: Williams, Bello Rotimi
Published: (2022)
by: Williams, Bello Rotimi
Published: (2022)
Rough Set Granularity in Mobile Web Pre-Caching
by: Sulaiman, Sarina, et al.
by: Sulaiman, Sarina, et al.
Similar Items
-
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007) -
High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.
by: Budiarto, Rahmat, et al.
Published: (2007) -
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007) -
Development Of Penetration Testing Model For Increasing Network Security.
by: Budiarto, Rahmat, et al.
Published: (2004) -
POSFinger: A New Fingerprint For Passive Remote Operating System Identification.
by: Manasrah, Ahmad, et al.
Published: (2007)