Amanote Research

Amanote Research

    RegisterSign In

How to Withstand Mobile Virus Attacks, Revisited

doi 10.1145/2611462.2611474
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2014

Authors
Joshua BaronKarim El DefrawyJoshua LampkinsRafail Ostrovsky
Publisher

ACM Press


Related search

How to Prevent AS Hijacking Attacks

2012English

A Methodology to Counter DoS Attacks in Mobile IP Communication

Mobile Information Systems
Computer NetworksComputer Science ApplicationsCommunications
2012English

Resisting Collapse: How Matter Inside a Black Hole Can Withstand Gravity

Physical Review D
AstronomyPhysics
2019English

BK Virus Nephropathy Revisited

American Journal of Transplantation
TransplantationAllergyImmunologyPharmacology
2017English

Explicit Communication Revisited: Two New Attacks on Authentication Protocols

IEEE Transactions on Software Engineering
Software
1997English

Sender-Equivocable Encryption Schemes Secure Against Chosen-Ciphertext Attacks Revisited

International Journal of Applied Mathematics and Computer Science
2015English

Detecting Spoofing Attacks in Mobile Wireless Environments

2009English

How to Avoid Using the Regularity Lemma: Pósa’s Conjecture Revisited

Discrete Mathematics
CombinatoricsTheoretical Computer ScienceDiscrete Mathematics
2010English

How to Build Mobile Applications With Adaptive Architecture

International Journal of Software Engineering and its Applications
Software
2015English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy