Fragmented malware through RFID and its defenses.
Madhu K. ShankarapaniAnthonius SulaimanSrinivas MukkamalaPublished in: J. Comput. Virol. (2009)
Keyphrases
- rfid tags
- radio frequency identification
- rfid technology
- radio frequency identification rfid
- supply chain
- low cost
- network security
- reverse engineering
- malware detection
- machine learning systems
- detect malicious
- rfid reader
- malicious code
- network layer
- static analysis
- data collection
- rfid middleware
- control flow
- dos attacks
- denial of service attacks
- anti collision
- dynamic analysis
- supply chain management
- key technologies
- sensor networks
- data structure
- case study
- location tracking
- data sets
- real time