Milan / Malaga / Thessaloniki / Berlin / London / /
Company
MOBILE DEVICES SHIPPED WORLDWIDE / Control Data / Telecom Italia / COSMOTE - Mobile Telecommunications S.A. / Trend Micro / Mobile Security Technologies / Hispasec Sistemas / Wi-Fi Access Point Internet Security / Cisco / Smart Mobile Networks / /
Country
Germany / Italy / United States / Spain / Greece / / /
Facility
Imperial College / Information Technologies Institute / Technical University of Berlin / Building Analysis Datasets / /
IndustryTerm
malicious devices / rogue devices / real mobile devices / neural networks / communication technologies / real time / change detection algorithms / real mobile network / telco network / realistic client systems / wireless communications / Internet-connected devices / security systems / wireless medium / wireless interfaces / security technologies / energy / unmodified mobile device / poorly-designed mobile applications / femtocell device / real smartphone hardware / visual networking index / communication hardware / virtualization solution / consumer devices / cellular network / computing / real-time monitoring / on non-mobile devices / mobile virtualization technology / security solutions / navigation systems / Search engine optimization / malicious web sites / cellular networks / self-aware networks / physical device / tolerant communications / search engine results / legitimate applications / control-plane protocols / wired Internet / Smart devices / mobile core network / malicious software / mobile wireless networks / mobile web browsers / wireless networks / chosen / wireline networks / mobile network operator / mobile phone network / malicious applications / mobile communication technologies / radio access network / advertisement networks / data collection infrastructure / virtualization technology / cyber-physical-human systems / visual analytics tools / control server / network operator / classification algorithms / software vulnerabilities / massive real-time data / security devices / search results / mobile device / /
OperatingSystem
VMs / Android / DoS / /
Organization
Kaspersky Lab / U.S. Securities and Exchange Commission / Information Technologies Institute / US Federal Reserve / European Union / Imperial College London / Technical University of Berlin / Centre for Research and Technology Hellas / IEEE Computer Society / Femtocell Architecture Mobile Honeypot Mobile Network Operator Command / /
Person
M. Ongtang / V / Addison Wesley / George Lyberopoulosk / Steffen Liebergeld / Malware Android / David Garcia / /
Position
driver / security analyst / Analyst / /
Product
I NTRODUCTION Smartphones / /
ProgrammingLanguage
FP / C / /
PublishedMedium
The Computer Journal / Communications of the ACM / /
RadioStation
Core / /
Technology
mobile phones / operating system / mobile devices / security technologies / communication technologies / mobile virtualization technology / control-plane protocols / mobile communication technologies / 3G / virtualization technology / virtual machine / SMS / wireless communications / smart phones / Smartphone / Search engine / Android / mobile device / change detection algorithms / TCP/IP / Wi-Fi / pdf / cellular telephone / smartphones / Mobile Computing / classification algorithms / Data Mining / simulation / /