The paper's aim is to provide information about mobile viruses for end‐users or organizations and recommend useful tips of how individuals can protect their mobile phones…
The paper's aim is to provide information about mobile viruses for end‐users or organizations and recommend useful tips of how individuals can protect their mobile phones from the intrusion of mobile phone viruses.
This paper surveys chronicle, securities, risks and countermeasure of mobile phone viruses.
This paper investigates infection routes, threats, damage, and spreading ways of mobile phone viruses and provides available countermeasures. It also provides useful tips about mobile viruses, indicating what to do and how to do it.
This research may not be exhaustive about mobile viruses.
A very useful source of information and impartial advice for end‐users or organizations who are planning to protect their mobile phones and their own privacy.
This paper is the first to survey the risk of mobile phones and it discusses how organizations or individuals can protect mobile phones from the intrusion of viruses and how to develop their own mobile virus security plan.
An e‐mail virus is an e‐mail that can infect other programs by modifying them to include a replication of itself. When the infected e‐mails are opened, the e‐mail virus…
An e‐mail virus is an e‐mail that can infect other programs by modifying them to include a replication of itself. When the infected e‐mails are opened, the e‐mail virus spreads itself to others. Today's society has seen a dramatic increase in the use of e‐mails. As a result, organizations must take even more precautions to guard against the introduction of e‐mail viruses into their systems. This paper discusses how organizations can protect their e‐mails from the intrusion of e‐mail virus and how to develop their own e‐mail virus security plan.
To provide the secure web services framework in an environment designed to integrate RFID system into the EPCglobal Network.
Utilizing web services helps maximize the value of information generated from RFID systems and, taking advantage of web services security (WSS) technology, to provide an XML‐based abstraction layer for established security technologies that delivers confidentiality, integrity, authentication, authorization, and non‐repudiation in EPCglobal Network.
This paper inspects four cases of trust relationships in one‐to‐one and one‐to‐many teamwork models that exemplify how the proposed WSS specifications being used in industry‐wide EPCglobal Network are envisioned. For each of these cases the different security strategies were proposed. Also a comparative view is given, of discussed security strategies which businesses may wish to consult.
This first proposed secure framework integrating web services and WSS technology to industry‐wide EPCglobal Network will provide business an integration and collaboration capabilities, which make it easier for trading partners to electronically share real‐time RFID data and conduct transactions in an accurate, complete, highly controlled, and secure environment.
New malicious e‐mails are created at the rate of thousands a year and pose a serious security threat. Especially, new, unseen Internet worms and virus often are arriving…
New malicious e‐mails are created at the rate of thousands a year and pose a serious security threat. Especially, new, unseen Internet worms and virus often are arriving as e‐mail attachments. In this paper, Bayesian probabilistic network is examined to detect new malicious e‐mail viruses through anomaly detection. Experimental results show a better malicious e‐mail detection using Bayesian probabilistic networks. Managerial implications on how companies can protect their e‐mails and develop their own e‐mail security plan are addressed as well.