Back to Results
First PageMeta Content
Mobile technology / Computer network security / Spamming / Information appliances / Computer security / Network security / Malware / Client honeypot / Erol Gelenbe / Technology / Mobile telecommunications / Computing


Security for Smart Mobile Networks: The NEMESYS Approach Erol Gelenbe∗ , Gokce Gorbil∗ , Dimitrios Tzovaras† , Steffen Liebergeld‡ , David Garcia§ , Madalina Baltatu¶ and George Lyberopoulosk ∗ Imperial
Add to Reading List

Document Date: 2013-10-23 08:34:01


Open Document

File Size: 206,64 KB

Share Result on Facebook

City

Milan / Malaga / Thessaloniki / Berlin / London / /

Company

MOBILE DEVICES SHIPPED WORLDWIDE / Control Data / Telecom Italia / COSMOTE - Mobile Telecommunications S.A. / Trend Micro / Mobile Security Technologies / Hispasec Sistemas / Wi-Fi Access Point Internet Security / Cisco / Smart Mobile Networks / /

Country

Germany / Italy / United States / Spain / Greece / /

/

Facility

Imperial College / Information Technologies Institute / Technical University of Berlin / Building Analysis Datasets / /

IndustryTerm

malicious devices / rogue devices / real mobile devices / neural networks / communication technologies / real time / change detection algorithms / real mobile network / telco network / realistic client systems / wireless communications / Internet-connected devices / security systems / wireless medium / wireless interfaces / security technologies / energy / unmodified mobile device / poorly-designed mobile applications / femtocell device / real smartphone hardware / visual networking index / communication hardware / virtualization solution / consumer devices / cellular network / computing / real-time monitoring / on non-mobile devices / mobile virtualization technology / security solutions / navigation systems / Search engine optimization / malicious web sites / cellular networks / self-aware networks / physical device / tolerant communications / search engine results / legitimate applications / control-plane protocols / wired Internet / Smart devices / mobile core network / malicious software / mobile wireless networks / mobile web browsers / wireless networks / chosen / wireline networks / mobile network operator / mobile phone network / malicious applications / mobile communication technologies / radio access network / advertisement networks / data collection infrastructure / virtualization technology / cyber-physical-human systems / visual analytics tools / control server / network operator / classification algorithms / software vulnerabilities / massive real-time data / security devices / search results / mobile device / /

OperatingSystem

VMs / Android / DoS / /

Organization

Kaspersky Lab / U.S. Securities and Exchange Commission / Information Technologies Institute / US Federal Reserve / European Union / Imperial College London / Technical University of Berlin / Centre for Research and Technology Hellas / IEEE Computer Society / Femtocell Architecture Mobile Honeypot Mobile Network Operator Command / /

Person

M. Ongtang / V / Addison Wesley / George Lyberopoulosk / Steffen Liebergeld / Malware Android / David Garcia / /

Position

driver / security analyst / Analyst / /

Product

I NTRODUCTION Smartphones / /

ProgrammingLanguage

FP / C / /

PublishedMedium

The Computer Journal / Communications of the ACM / /

RadioStation

Core / /

Technology

mobile phones / operating system / mobile devices / security technologies / communication technologies / mobile virtualization technology / control-plane protocols / mobile communication technologies / 3G / virtualization technology / virtual machine / SMS / wireless communications / smart phones / Smartphone / Search engine / Android / mobile device / change detection algorithms / TCP/IP / Wi-Fi / pdf / cellular telephone / smartphones / Mobile Computing / classification algorithms / Data Mining / simulation / /

URL

http /

SocialTag