최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템, v.2 no.12, 2013년, pp.541 - 552
김명희 (부경대학교 정보시스템학과) , (부경대학교 첨단정보 및 정보기술전공) , 박만곤 (부경대학교 IT융합응용공학과)
Recently software security of the smart phone is an important issue in the field of information science and technology due to fast propagation of smart technology in our life. The smart phone as the security critical systems which are utilizing in terminal systems of the banking, ubiquitous home man...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
M. Cinque, D. Cotroneo, Z. Kalbarczyk, R. K. Iyer, "How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones," in Proc. of Dependable Systems and Networks (DSN '07), on 37th Annual IEEE/IFIP International Conference, pp.585-594, Jun., 2007.
A. Shabtai, Y. Fledel, Y. Elovici, "Automated Static Code Analysis for Classifying Android Applications Using Machine Learning," in Proc. of 2010 International Conference on Computational Intelligence and Security (CIS), pp.329-333, Dec., 2010.
H. Reza, S. Buettner, V. Krishna, "A Method to Test Component Off-the-Shelf (COTS) Used in Safety Critical Systems," in Proc. of Information Technology: New Generations 2008 (ITNG08) on Fifth International Conference, pp.189-194, Apr., 2008.
J. White, C. Thompson, H .Turner, B. Dougherty, and D. C. Schmidt, "Primary Title: Wreck Watch: Automatic Traffic Accident Detection and Notification with Smartphones," in Proc. of Mobile Networks and Applications, Springer, Vol.16, pp.285-303, 2011.
Hsiu-Sen Chiang, Woei-Jiunn Tsaur. "Identifying Smartphone Malware Using Data Mining Technology," in Proc. of 20th International Conference on Computer Communications and Networks (ICCCN2011), pp.1-6, Jul. 31-Aug. 4, 2011.
W. Enck, D. Octeau, P. McDaniel, and S. Chaudhuri, "A Study of Android Application Security," in Proceedings of the 20th USENIX Security Symposium, San Francisco, August, 2011.
Yuan Wei, Jin Qin, "Safety-Driven Software Reliability Allocation in Medical Device Application," in Proc. of Quality, Reliability, Risk, Maintenance, and Safety Engineering (ICQR2MSE), pp.105-109, Jun., 2011.
A. Kumar Maji, Kangli Hao, S. Sultana, S. Bagchi, "Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian," in Proc. of International Symposium on Software Reliability Engineering (ISSRE), pp.249-258, Nov., 2010.
M. Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck, C. Wolf, "Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices," in Proc. of Security and Privacy (SP), on 2011 IEEE Symposium, pp.96-111, May, 2011.
Ashwin Chaugule, Zhi Xu and Sencun Zhu, "A Specification Based Intrusion Detection Framework for Mobile Phones," Applied Cryptography and Network Security, Lecture Notes in Computer Science, Vol.6715, pp.19-37, 2011.
R. Mojdehrakhsh, Wei-Tek Tsai. S. Kirani, L. Elliott, "Retrofitting Software Safety in an Implantable Medical Device," in Proc. of IEEE Software, Vol.11, No.1, pp.41-50, Jan., 1994.
Zhang Hong, Liu Binbin, "Integrated Analysis of Software FMEA and FTA," in Proc. of International Conference on Information Technology and Computer Science 2009 (ITCS09), Vol.2, pp.184-187, Jul., 2009.
M. Becher, "Security of smartphones at the dawn of their ubiquitousness," Ph.D. dissertation, University of Mannheim, Oct., 2009.
Shuaifu Dai, Yaxin Liu, Tielei Wang, Tao Wei, Wei Zou, "Behavior-Based Malware Detection on Mobile Phone," in Proc. of 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM10), pp.1-4, Sept., 2010.
N. G. Leveson and P. R. Harvey, "Analyzing Software Safety," in Proc. of IEEE Transactions on Software Engineering, Vol.SE-9, No.5, pp.569-579, Sept., 1983.
D. Dagon, T. Martin, T. Starner, "Mobile Phones as Computing Devices: The Viruses are Coming!" in Proc. of IEEE on Pervasive Computing, Vol.3, No.4, pp.11-15, 2004.
J. Wayne, S. Karen, "Guidelines on Cell Phone and PDA Security," in Proc. of National Institute of Standard and Technology, US Department of Commerce, pp.800-124, 2008.
P. Zheng, L. M. Ni, "Spotlight: The Rise of the Smart Phone," in Proc. of IEEE Distributed Systems Online, Vol.7, No.3, Mar., 2006.
A. Tansu, B. Christian and A. D. Schmidt. "A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones," Lecture Notes on Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, pp.31-46, 2010.
B. Scorgie, P. Veeraraghavan, S. Ghosh, "Early Virus Detection for Windows Mobile," in Proc. of 9th Malaysia International Conference Communications (MICC2009), pp.295-300, Dec., 2009.
C. F. Kemerer, B. S. Porter, "Improving the Reliability of Function Point Measurement: An Empirical Study," in Proc. of IEEE Transactions on Software Engineering, Vol.18, No.11, pp.1011-1024, Nov., 1992.
A. Shabtai, Y. Fledel, Y. Elovici, "Securing Android-Powered Mobile Devices Using SE Linux," in Proc. of IEEE Security & Privacy, Vol.8, No.3, pp.36-44, 2010.
Young Mo Kang, Chanwoo Cho, Sungjoo Lee. "Analysis of Factors Affecting the Adoption of Smartphones," in Proc. of 2011 IEEE International Conference on Technology Management (ITMC), pp.919-925, Jun., 2011.
S. Chandra, P.M. Chen, "Whither Generic Recovery from Application Faults? Fault Study Using Open-Source Software," in Proc. of International Conference on Dependable Systems and Networks (DSN2000), pp.97-106, 2000.
Peichang Wang, Junxing Zhang, Zhixue Chang, "Fault Tolerance of Multiprocessor-Structured Control System by Hardware and Software Reconfiguration," in Proc. of International Conference on Mechatronics and Automation (ICMA07), pp.3745-3749, Aug., 2007.
Y. M. Wang, Y. Huang, W. K. Fuchs, "Progressive Retry for Software Error Recovery in Distributed Systems," in Proc. of The Twenty-Third International Symposium on Fault-Tolerant Computing (FTCS-23), pp.138-144, Jun., 1993.
Y. Huang and C. Kintala. "Software Implemented Fault Tolerance: Technologies and Experience," in Proc. of the 1993 International Symposium on Fault-Tolerant Computing, pp.2-9, Jun., 1993.
Y. Huang, C. Kintala, N. Kolettis, N. D. Fulton, "Software Rejuvenation: Analysis, Module and Applications," in Proc. of the 23rd International Symposium on Fault-Tolerant Computing (FTCS-23), pp.381-390, Jun., 1995.
A. Gopalan, S. Banerjee, A. K. Das, S. Shakkottai, "Random Mobility and the Spread of Infection," in Proc. IEEE of INFOCOM 2011, pp.999-1007, Apr., 2011.
B. S. Medikonda, P. S. Ramaiah, "Integrated Safety Analysis of Software-Controlled Critical Systems," ACM SIGSOFT Software Engineering Notes, Vol.35, No.1, Nov., 2010.
T. Maier, "FMEA and FTA to Support Safe Design of Embedded Software in Safety-Critical Systems," in Proc. of CSR 12th Annual Workshop on Safety and Reliability of Software Based Systems, Bruges, Belgium, 1995.
C. T. Alan and P. M. Steven, "Software Safety Analysis of a Flight Management System Vertical Navigation Function- A Status Report," in Proc. of IEEE the 22th Digital Avionics Systems Conference, Indianapolis, pp.12-16, Oct., 2003.
Tao Jianfeng, Wang Shaoping, and Yao Yiping, "Hybrid Method of Computer Aided FMECA and FTA," Journal of Beijing University of Aeronautics and Astronautics, Beijing, China, Vol.26, No.6, pp.663-665, 2000.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.