Virtual Safe: Unauthorized Walking Behavior Detection for Mobile Devices
نویسندگان
چکیده
منابع مشابه
Safe Execution of Temporally Flexible Plans for Bipedal Walking Devices
Plans with temporal flexibility have been used to allow discrete systems to adapt to disturbances that occur while the plan is being executed. To control more complex devices, such as bipedal walking machines, we must extend this execution paradigm to the control of hybrid (discrete/continuous) systems. Systems of this type are difficult to control for two reasons: 1) their high dimensionality ...
متن کاملDetection of Unauthorized IoT Devices Using Machine Learning Techniques
Security experts have demonstrated numerous risks imposed by Internet of Things (IoT) devices on organizations. Due to the widespread adoption of such devices, their diversity, standardization obstacles, and inherent mobility, organizations require an intelligent mechanism capable of automatically detecting suspicious IoT devices connected to their networks. In particular, devices not included ...
متن کاملVStore++: Virtual Storage Services for Mobile Devices
This paper addresses media sharing via an approach that offers ‘fungible’ storage, where storage services implement virtual stores that are dynamically mapped to suitable ‘nearby’ or otherwise available physical devices. In particular, the novel VStore++ system provides seamless and flexible data storage, access, and sharing services, by exploiting virtualization technology to aggregate and mak...
متن کاملVirtual Physical Security for Mobile Computing Devices
In this paper I have attempted to explain briefly, how enterprise security for Mobile Computing Devices can be achieved in organizations. Enterprise security plans must not only address the data security over the network but also the protection of data at rest on mobile devices like Laptop PCs, PDAs, and Smart phones. The inherent lack of physical access control on mobile devices creates specia...
متن کاملConnection Interface Designing for Grid and Mobile Devices
There area lot of mobile computer devices with a variety of applications and users Tend to use them more. Due to the limitations of mobile devices, running most of the procedures are impossible. To resolve this problem, mobile devices can be connected to the grid, to use the facilities of grid. On the other hand the communication mechanisms are different for each device and they cannot be c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Mobile Computing
سال: 2019
ISSN: 1536-1233,1558-0660,2161-9875
DOI: 10.1109/tmc.2018.2843801