Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm.
Nathaniel HustedSteven A. MyersPublished in: LEET (2011)
Keyphrases
- mobile wireless
- wireless networks
- sensor networks
- ad hoc networks
- data broadcasting
- base station
- mobile computing
- short term
- routing protocol
- reverse engineering
- end to end
- wireless sensor networks
- long term
- real time
- sensor data
- wireless communication
- malware detection
- malicious code
- data streams
- data collection
- response time