Performance Measuring in Smartphones Using MOSES Algorithm

Size: px
Start display at page:

Download "Performance Measuring in Smartphones Using MOSES Algorithm"

Transcription

1 Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India, Head of the department ECE, Department of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur,Tamilnadu, India, ISSN: X Abstract: Now a day s most of the people used in smart phones. Smartphone s usage will be increased. So the security level will be implemented in smart phones are important one. MOSES algorithm improves the security in smart phones. Because it will provide separate security in data and application using virtualization techniques. We run a set of experiments using MOSES algorithm. In the simulation results the Smartphone s performance overhead is high. we proposed a modified MOSES algorithm in order to reduce the performance overhead. Keywords Android Security, virtualization, Performance measuring, Performance overhead. 1.INTRODUCTION: Smartphones usage increasingly, and many users carry multiple phones to accommodate work, personal, and geographic mobility needs. Smartphones have become omnipresent devices. They combine the computing power previously known from desktop computers with the mobility and connectivity of cellular phones. Several device manufacturers are even following this trend by producing smart phones able to handle two subscriber identification modules (SIMs) at the same time. Here the third party application also installed. So security issues can arise any malicious person can open leakage of data. One possible solution to this problem by isolating applications and data related to work separated from recreational applications and private/personal data. Within the same device, separate security environments might exist: one security environment could be only restricted to sensitive/corporate data and trusted applications; a second security environment could be used for entertainment where third-party games and popular applications could be installed. The second environment cannot access data from first environment. Such a solution could be implemented by means of virtualization technologies. The network, storage and server these type of virtualization are used in the IT network companies. 2. ANDROID SECURITY: Android is open source platform, developers will work along to enhance it. Android platform is multitasking software; therefore no application will gain critical access to the components of OS. Android platform is UNIX based operating system that is the most secure operating system. The developers need a unique signature to publish their application on market. Users will report a possible security flaw through their Google account.all applications on android need permission from the user at the time of installation. 3. RELATED WORK: 3.1 A System for Enforcing Fine-Grained Context-Related Policies on Android: Current smartphone systems allow the user to use only marginally contextual information to specify the behavior of the applications: this hinders the wide adoption of this technology to its full potential. The concept of context-related access control is not new, this is the first work that brings this concept into the smartphone environment. In particular, a context can be defined by: the status of variables sensed by physical (lowlevel) sensors, like time and location; additional processing on these data via software (high level) sensors; or particular interactions with the users or third parties. CRêPE allows context-related policies to be set (even at runtime) by both the user and authorized third parties locally or remotely (via SMS, MMS, Bluetooth, and QR-code). 349

2 3.2 Bring Your Own Device Approaches: Besides approaches to improve Android security in general, some solutions specifically aimed at supporting the BYOD have been proposed Secure Container: ISSN: X Secure container is a special mobile client application that creates an isolated environment on the phone at the application layer. The application allows an enterprise administrator to create policies which control this isolated environment but cannot control the behaviour of a user outside this container Mobile Virtualization: Virtualization provides environments that are isolated from each other. The hypervisor is responsible for guaranteeing such isolation and for coordinating the activities of the virtual machines. Virtualization has been widely used in traditional computers because it can: (i) increase security, and (ii) reduce the cost of deployment of applications (the hardware is shared in a secure way). 4. MOSES OVERVIEW: 4.1 Existing System: This section provides an overview of our approach named MOde-of-uses SEparation in Smartphones (MOSES). MOSES provides for separating data and apps dedicated to different contexts that are installed in a single device. For instance, corporate data and apps can be separated from personal data and apps within a single device. Our approach provides compartments where data and apps are stored. MOSES enforcement mechanism guarantees data and apps within a compartment are isolated from others compartments data and apps. These compartments are called Security Profiles in MOSES. Security profile have set of policies and regulation. MOSES is the automatic activation of SP depending on the context, in which the device is being used. A context definition is a Boolean expression defined over any information that can be obtained from the smartphone s raw sensors (e.g., GPS sensor) and logical sensors. Logical sensors are functions which combine raw data from physical sensors to capture specific user behaviours (such as detecting whether the user is running). When a context definition evaluates to true, the SP associated with such a context is activated. It is a possible situation when several contexts, which are associated with different SPs, may be active at the same time. Each SP is associated with an owner of the profile and can be protected with a password. A SP can be created edited locally through an app installed on the device. Additionally, MOSES supports remote SP management. The former possibility may be used by a user of the phone for managing her personal SP, while the latter may be employed by an enterprise administrator to control the work SP. To avoid that the user tampers with the work SP, the security administrator protects the work SP with a password. In this way, MOSES can be used for realising a Mobile Device Management solution to manage remotely the security settings of a fleet of mobile devices. The previous version of MOSES used on Taintdroid to split data between different profiles. In the current version of MOSES, the separation of application data is implemented on the Linux kernel level through file system virtualization approach. 350

3 Fig. 1 MOSES Architecture 4.2 Advantages: Each security profile can be associated to one (or) more contexts that determine when the profile become active. Both contexts and profiles can be easily and dynamically specified by users. Switching between security profiles can require user interaction (or) Be automatic, efficient, transparent to the user. Virtualization used for file system. Attribute based policies are supported. security profile management will be improved. One of the features introduced in MOSES is the automatic activation of SP depending on the context, in which the device is being used. MOSES can be used for realising a Mobile Device Management solution to manage remotely the security settings of a fleet of mobile devices. 4.3 Disadvantage: The currently working MOSES algorithm does not separate system data (e.g., system configuration files) and information on SD cards. Moreover, performance overheads are high. The energy, storage and security profile switching overhead is high. 5. ARCHITECTURE: MOSES COMPONENTS: 1. Security profile manager: The Security Profile Manager holds the information linking a SP with one or more Context. The Security Profile Manager is responsible for the activation and deactivation of SPs. 2. Moses Hypervisor: The Moses Hypervisor is the component that acts as a policy decision point (PDP) in MOSES. The Moses Hypervisor provides a central point for MOSES security checks against the policies defined for the active SP to regulate access to resources. The Moses Hypervisor delegates the policy checks to its two managers: 1. Moses App Manager 2. Moses Rules Manager. 3. Moses Policy Manager: The Moses Policy Manager acts as the policy administrator point (PAP) in MOSES. It provides the API for creating, updating and deleting MOSES policies. It also allows a user to define, modify, remove monitored Context sand assign them to SPs. Moreover, this component also controls access to MOSES policy database (moses.db) allowing only applications with special permissions to interact with this component. 4. Moses Taint Manager: The Moses Taint Manager component manages the shadow database which stores the taint values used by Taintdroid. In MOSES, we can taint specific rows of a content provider: to be able to perform per row filtering when an app access data in the content provider. For instance, it is possible to filter out from the query result data the rows which contain the information about device identifiers or user contacts. Given the fact that the enforcement of policies depends on the information provided by the Moses Taint Manager, this component acts as a policy information point (PIP). 5. Moses Hypervisor Components: The decisions taken by the Moses Hypervisor need to been forced by the policy enforcement point (PEP). MOSES affects several components within Android middleware where decisions need to be enforced. For this reason, the PEP includes several Android components offering system services such as 351

4 1. Location Manager 2. Activity Manager Service. 6. Moses Reaper: The enforcement of separated SPs requires special components to manage application processes and file system views The Moses Reaper is the component responsible for shutting down processes of applications no longer allowed in the new SP after the switch. 7. Moses Mounter : In MOSES, applications have access to different data depending on the active profile. To separate data between profiles different file system view are supported. This functionality is provided by the Moses Mounter. To allow the user of the device to interact with MOSES, we provide two MOSES applications: 1. Moses Sp Changer 2. Moses PolicyGui The Moses Sp Changer allows the user to manually activate SP. It communicate with the Moses Hypervisor and sends it a signal to switch to the profile required by the user. The Moses PolicyGui allows the user to manage SPs. 6. IMPLEMENTATION: 6.1 Context Detection: The context detection used for identifying which security profile will be activated. Here three types of security profiles are used. To separate different security profiles each security profile have own Context_id. 6.2 Filesystem Virtualization: The file system virtualization used for separate different data in to different security profile. Virtualization means creation of virtual something. Here the file will be created virtually and data stored in different security profiles. 6.3 Dynamic Application Activation: Each SP is assigned with a list of application UIDs that are allowed to be run when this profile is active. MOSES uses these identifiers to control which applications can be activated for each SP. During the SP switching, the MosesAppManager selects from the MOSES database the list of UIDs, which are allowed in the activated profile, and stores it into the set of allowed UIDs. When a new SP is activated, only the of the allowed applications for this profile will be displayed. 6.4 Attribute-Based Policies: Within each SP, MOSES enforces an attribute based access control (ABAC) model. In the concept the system want to installed the application otherwise it deny the application. 6.5 Security Profile Management: The security profile management used to manage the different security profiles with in a single device. 7.PROPOSED SYSTEM: 7.1 Modified MOSES algorithm : ISSN: X In the existing system the Performance are measured energy, storage, security profile switching. These performance are measured using network simulator -2. In the simulation results the performance of energy, storage, security profile switch overhead is high. To overcome this problem this MOSES algorithm will be changed in small level. Energy consumption, Storage size and Security profile switching will be reduced by changing in the program. 352

5 7.2 Proposed system advantages: The modified MOSES algorithm reduce the performance overhead. Energy, storage and security profile switch usage reduced. System Operate in a speed manner. 7.3 Proposed system disadvantage: This algorithm not implemented in real time mobile phone because the cost in expensive. 8. PERFORMANCE EVALUATION: 8.1 Network Simulator NS-2: NS-2 is an open-source simulation tool running on Unix-like operating systems. It is a discreet event simulator. It has many advantages that make it a useful tool, such as support for multiple protocols and the capability of graphically detailing network traffic. 8.2 Simulation setting: ISSN: X We conducted the simulation experiments using network simulator-2 and considered the network with 10 mobile nodes. Here the base station transmit the packets randomly. The MOSES algorithm will be running on background, it will measure the smartphones energy, storage and security profile switching. The simulation setting shows in fig.2. In the evaluation interval, packetsize, delay, control overhead, average energy consumption, residual energy consumption, normalized overhead. 8.3 Simulation results: Energy Overhead: Fig.2Simulation setting To measure the energy overhead produced by MOSES, we performed the following tests. We charged the battery of our device to the 100 percent. Then, every 10 minutes we run in ten mobile application using moses algorithm. The different ten applications are running and moses the algorithm measured the total amount of usage energy. We executed this experiment for 353

6 two types of systems: MOSES without SP changes, and MOSES with SP changes. The results of this experiment are reported in Fig.3,4,5. Here interval, average energy consumption are calculated. Also residual energy is calculated, residual energy means remaining energy in the phone. Average energy consumption with security profile is high compare to without security profile switching in smartphone Fig. 3 Interval against delay Fig.4 Average energy consumption 354

7 Fig. 5Average residual energy consumption Storage Overhead: One of the most significant overheads produced by MOSES is the storage overhead. In fact, the separation of data for different SPs means that some application information will be duplicated in different profiles. In general, the storage size consumed where OS. MOSES measure the storage performance show fig.6,7. Fig.6 Packetsize against control overhead 355

8 Fig.7 Packetsize against normalized overhead 7.3 Security Profile Switch Overhead: In this section, we present the results of the experiments measuring the time required to switch between SPs. We remind that during the profile switch (from an old to a new profile), MOSES performs the following security profile switching in fig.8,9. Fig.8 Interval against control overhead 356

9 Fig. 9 Interval against normalized overhead 8 CONCLUSIONS AND FUTURE WORK: Moses provide improve security by isolating data and application by using software. In the project provide security and measuring performance using with security profile and without security profile. Here the energy, storage and security profile switching performances are measured. In the results the performance overhead is present. In future this moses algorithm is modified and reduce the performance overhead and implemented in real time smartphone. REFERENCES [1] Gartner Says Smartphone Sales Accounted for 55 Percent of Overall Mobile Phone Sales in Third Quarter of [2] Are Your Sales Reps Missing Important Sales Opportunities? [3] Unisys Establishes a Bring Your Own Device (BYOD) Policy, [4] W. Enck, P. Gilbert, B.-G. Chun, L.P. Cox, J. Jung, P. McDaniel, and A.N. Sheth, Taintdroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones, Proc. Ninth USENIX Conf. Operating Systems Design and Implementation (OSDI 10), pp. 1-6, [5] C. Gibler, J. Crussell, J. Erickson, and H. Chen, AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale, Proc. Fifth Int l Conf. Trust and Trustworthy Computing (TRUST 12), pp , [6] Y. Xu, F. Bruns, E. Gonzalez, S. Traboulsi, K. Mott, and A. Bilgic, Performance Evaluation of Para-Virtualization on Modern Mobile Phone Platform, Proc. Int l Conf. Computer, Electrical, and Systems Science and Eng. (ICCESSE 10),

Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm

Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Performance Analysis Of Policy Based Mobile Virtualization in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P Abstract: Now a day s most of the people used in smart phones. Smartphone

More information

DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES

DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES IJITE Vol. 4 No.1-2 January-December 2013, pp.13-17 International Sciences Press DETECTION OF CONTRAVENTION IN MOBILE CLOUD SERVICES D. Lakshmana Kumar 1 and G. Draksha 2 1 M.Tech. Student, Department

More information

The Behavioral Analysis of Android Malware

The Behavioral Analysis of Android Malware , pp.41-47 http://dx.doi.org/10.14257/astl.2014.63.09 The Behavioral Analysis of Android Malware Fan Yuhui, Xu Ning Department of Computer and Information Engineering, Huainan Normal University, Huainan,

More information

Analysis of advanced issues in mobile security in android operating system

Analysis of advanced issues in mobile security in android operating system Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of

More information

Android Security Extensions

Android Security Extensions Android Security Extensions Android Security Model Main objective is simplicity Users should not be bothered Does the user care? Most do not care until its too late But We do It needs a more advanced security

More information

Android Security Extensions 2. Giovanni Russello g.russello@auckland.ac.nz

Android Security Extensions 2. Giovanni Russello g.russello@auckland.ac.nz Android Security Extensions 2 Giovanni Russello g.russello@auckland.ac.nz Preparing the Report A report must be provided before your presentation The report should be 4 pages long The content of the report

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat. Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the

More information

Energy efficient sensing for managing context and privacy on smartphones

Energy efficient sensing for managing context and privacy on smartphones Energy efficient sensing for managing context and privacy on smartphones Prajit Kumar Das, Anupam Joshi and Tim Finin University of Maryland, Baltimore County Baltimore, MD 21250 USA {prajit1,finin,joshi}@.umbc.edu

More information

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment

Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),

More information

www.ijreat.org Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

www.ijreat.org Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Emergency Alert System using Android L.Hariprasath 1, R.Dhivya 2, S.Adithya 3 1 Assistant professor, Department of IT, Anand Institute of Higher Technology Kazhipattur, Chennai, Tamilnadu, India 2&3 UG-Student,

More information

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY

ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing

More information

Research on Situation and Key Issues of Smart Mobile Terminal Security

Research on Situation and Key Issues of Smart Mobile Terminal Security Research on Situation and Key Issues of Smart Mobile Terminal Security Hao-hao Song, Jun-bing Zhang, Lei Lu and Jian Gu Abstract As information technology continues to develop, smart mobile terminal has

More information

AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring

AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring AppScope: Application Energy Metering Framework for Android Smartphones using Kernel Activity Monitoring Chanmin Yoon*, Dongwon Kim, Wonwoo Jung, Chulkoo Kang, Hojung Cha Dept. of Computer Science Yonsei

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 3, March 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile

More information

Fig. 1 BAN Architecture III. ATMEL BOARD

Fig. 1 BAN Architecture III. ATMEL BOARD Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

A Research on Camera Based Attack and Prevention Techniques on Android Mobile Phones

A Research on Camera Based Attack and Prevention Techniques on Android Mobile Phones A Research on Camera Based Attack and Prevention Techniques on Android Mobile Phones Anushree Pore, Prof. Mahip Bartere PG Student, Dept. of CSE, G H Raisoni College of Engineering, Amravati, Maharashtra,

More information

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE.

BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. BUSINESS PROTECTION. PERSONAL PRIVACY. ONE DEVICE. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.

More information

Studying Security Weaknesses of Android System

Studying Security Weaknesses of Android System , pp. 7-12 http://dx.doi.org/10.14257/ijsia.2015.9.3.02 Studying Security Weaknesses of Android System Jae-Kyung Park* and Sang-Yong Choi** *Chief researcher at Cyber Security Research Center, Korea Advanced

More information

Understanding Android s Security Framework

Understanding Android s Security Framework Understanding Android s Security Framework William Enck and Patrick McDaniel Tutorial October 2008 Systems and Internet Infrastructure Security Laboratory (SIIS) 1 2 Telecommunications Nets. The telecommunications

More information

Accessing Private Network via Firewall Based On Preset Threshold Value

Accessing Private Network via Firewall Based On Preset Threshold Value IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 3, Ver. V (May-Jun. 2014), PP 55-60 Accessing Private Network via Firewall Based On Preset Threshold

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Control Theoretic Adaptive Monitoring Tools for the Android Platform

Control Theoretic Adaptive Monitoring Tools for the Android Platform Control Theoretic Adaptive Monitoring Tools for the Android Platform DAVID REYNOLDS Department of Computer Science Texas State University San Marcos, USA dr1299@txstate.edu MINA GUIRGUIS Department of

More information

WIND RIVER SECURE ANDROID CAPABILITY

WIND RIVER SECURE ANDROID CAPABILITY WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion

More information

Implementation and Direct Accessing of Android Authority Application in Smart Phones

Implementation and Direct Accessing of Android Authority Application in Smart Phones Implementation and Direct Accessing of Android Authority Application in Smart Phones Amit H. Choksi 1, Jaimin J. Sarvan 2 and Ronak R. Vashi 3 1 ET Dept, BVM Engg. College, V.V.Nagar-388120, Gujarat, India

More information

Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser

Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser 1 Karan Sandeep Bhandari, 2 Vishnu Baliram Mandole, 3 Akash Dattatray Munde, 4 Sachin B. Takmare Bharati Vidyapeeth

More information

Fault-Tolerant Framework for Load Balancing System

Fault-Tolerant Framework for Load Balancing System Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:

More information

A mobile monitoring and alert SMS system with remote configuration A case study for android and the fused location provider

A mobile monitoring and alert SMS system with remote configuration A case study for android and the fused location provider A mobile monitoring and alert SMS system with remote configuration A case study for android and the fused location provider By Tiago Coelho, Sara Paiva Instituto Politécnico de Viana do Castelo, Viana

More information

Keyword: Cloud computing, service model, deployment model, network layer security.

Keyword: Cloud computing, service model, deployment model, network layer security. Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging

More information

A proposal to realize the provision of secure Android applications - ADMS: an application development and management system -

A proposal to realize the provision of secure Android applications - ADMS: an application development and management system - 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing A proposal to realize the provision of secure Android applications - ADMS: an application development

More information

Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security

Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

Issues in Android on Mobile Platform and Their Resolution

Issues in Android on Mobile Platform and Their Resolution Issues in Android on Mobile Platform and Their Resolution 1 Monika A. Ganpate, 2 Dipika R. Shinde 1, 2 Institute of Management and Computer Studies, Thane (West), India, University of Mumbai, India Abstract:

More information

CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016

CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016 VEHICLE TRACKING SYSTEM WITH ANDROID APP SUPPORT ABSTRACT M. Sudhakar Professor Dept of ECE CMR College of Engineering & Technology Kandlakoya, Medchal Rd, Hyderabad e-mail: vp@cmrcet.org K.Kalyani PG

More information

U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD

U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD U.S. Patent Appl. No. 13/247.308 filed September 28, 2011 NETWORK ADDRESS PRESERVATION IN MOBILE NETWORKS TECHNICAL FIELD [0001] The disclosure relates to mobile networks and, more specifically, to wireless

More information

Remote Android Assistant with Global Positioning System Tracking

Remote Android Assistant with Global Positioning System Tracking IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 95-99 Remote Android Assistant with Global Positioning System Tracking

More information

Remote Desktop on Mobile

Remote Desktop on Mobile Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to

More information

How To Protect Your Mobile From Attack From A Signalling Storm

How To Protect Your Mobile From Attack From A Signalling Storm ICL, TUB, CERTH, Telecom Italia IT, COSMOTE, HISPASEC Erol Gelenbe Fellow of the French National Academy of Engineering Dynamic Real-Time Security for Seamless Service Provisioning in the Mobile Ecosystem

More information

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT

CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE CONSIDERATION OF TRUST LEVELS IN CLOUD ENVIRONMENT Bhukya Ganesh 1, Mohd Mukram 2, MD.Tajuddin 3 1 M.Tech Student, Dept of CSE, Shaaz

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK GEARING THE RESOURCE POOR MOBILE DEVICES INTO RESOURCEFULL BY USING THE MOBILE

More information

IMPLEMENTING YOUR BYOD MOBILITY STRATEGY

IMPLEMENTING YOUR BYOD MOBILITY STRATEGY IMPLEMENTING YOUR BYOD MOBILITY STRATEGY An IT Checklist and Guide 1.0 Overview In early 2013 Dell Quest Software announced the results of a global survey of IT executives that was conducted to gauge the

More information

9/26/2011. What is Virtualization? What are the different types of virtualization.

9/26/2011. What is Virtualization? What are the different types of virtualization. CSE 501 Monday, September 26, 2011 Kevin Cleary kpcleary@buffalo.edu What is Virtualization? What are the different types of virtualization. Practical Uses Popular virtualization products Demo Question,

More information

Analysis on Virtualization Technologies in Cloud

Analysis on Virtualization Technologies in Cloud Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization

More information

Architecture (SOSP 2011) 11/11/2011 Minsung Jang

Architecture (SOSP 2011) 11/11/2011 Minsung Jang Cells: A Virtual Mobile Smartphone Architecture (SOSP 2011) Lunch TimeReading Group 11/11/2011 Minsung Jang Summary Novel Architecture for a Virtual Phone How to do away with overhead New way to virtualize

More information

Review of Malware Defense in Mobile Network using Dynamic Analysis of Android Application

Review of Malware Defense in Mobile Network using Dynamic Analysis of Android Application Review of Malware Defense in Mobile Network using Dynamic Analysis of Android Application Miss. Ashwini A. Dongre M. E. 3 rd sem, Dept. of Computer Science and engineering P. R. Patil College of engineering

More information

Cloud Computing for Agent-based Traffic Management Systems

Cloud Computing for Agent-based Traffic Management Systems Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion

More information

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence.

Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence. Business Protection. Personal Privacy. One Device. Enhanced Security for Your Network and Business Intelligence. Work Hard. Rest Easy. Today, employees are always on, which for you means always vulnerable.

More information

For Businesses with more than 25 seats. www.eset.com

For Businesses with more than 25 seats. www.eset.com For Businesses with more than 25 seats www.eset.com ESET Endpoint Protection Standard Whether your business is just starting or Simple and Straightforward established, there are a few things you expect

More information

Firewall-based Solution for Preventing Privilege Escalation Attacks in Android

Firewall-based Solution for Preventing Privilege Escalation Attacks in Android International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 318 327 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Firewall-based Solution for Preventing

More information

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note

BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...

More information

Research and Design of Universal and Open Software Development Platform for Digital Home

Research and Design of Universal and Open Software Development Platform for Digital Home Research and Design of Universal and Open Software Development Platform for Digital Home CaiFeng Cao School of Computer Wuyi University, Jiangmen 529020, China cfcao@126.com Abstract. With the development

More information

Mobile Security 14-829 Fall 2013

Mobile Security 14-829 Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #23 BYOD Bring Your Own Device BYOD is the broad idea of supporting personal computing devices in enterprise scenarios Not just smartphones; this has

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

The Open University s repository of research publications and other research outputs

The Open University s repository of research publications and other research outputs Open Research Online The Open University s repository of research publications and other research outputs PrimAndroid: privacy policy modelling and analysis for Android applications Conference Item How

More information

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation

(U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation (U)SimMonitor: A New Malware that Compromises the Security of Cellular Technology and Allows Security Evaluation DR. C. NTANTOGIAN 1, DR. C. XENAKIS 1, DR. G. KAROPOULOS 2 1 DEPT. O F DIGITAL SYST EMS,

More information

Lynn Margaret Batten. IT Security Research Services & Deakin University, Melbourne, Australia. June 2015

Lynn Margaret Batten. IT Security Research Services & Deakin University, Melbourne, Australia. June 2015 Lynn Margaret Batten IT Security Research Services & Deakin University, Melbourne, Australia June 2015 Smart devices versus PCs WebView versus Web 2.0 Tracking Certificates Mallory Countermeasures. On

More information

Cloud Computing Architecture: A Survey

Cloud Computing Architecture: A Survey Cloud Computing Architecture: A Survey Abstract Now a day s Cloud computing is a complex and very rapidly evolving and emerging area that affects IT infrastructure, network services, data management and

More information

A Review of Different Comparative Studies on Mobile Operating System

A Review of Different Comparative Studies on Mobile Operating System Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September

More information

PROFILEDROID: MULTI-LAYER PROFILING OF ANDROID APPLICATIONS XUETAO WEI LORENZO GOMEZ UNIVERSITY OF CALIFORNIA, RIVERSIDE PROFESSOR IULIAN NEAMTIU

PROFILEDROID: MULTI-LAYER PROFILING OF ANDROID APPLICATIONS XUETAO WEI LORENZO GOMEZ UNIVERSITY OF CALIFORNIA, RIVERSIDE PROFESSOR IULIAN NEAMTIU PROFILEDROID: MULTI-LAYER PROFILING OF ANDROID APPLICATIONS XUETAO WEI LORENZO GOMEZ PROFESSOR IULIAN NEAMTIU PROFESSOR MICHALIS FALOUTSOS UNIVERSITY OF CALIFORNIA, RIVERSIDE WE DEPEND ON SMARTPHONES MORE

More information

DiffUser: Differentiated User Access Control on Smartphones

DiffUser: Differentiated User Access Control on Smartphones DiffUser: Differentiated User Access Control on Smartphones Xudong Ni, Zhimin Yang, Xiaole Bai, Adam C. Champion, and Dong Xuan Department of Computer Science and Engineering The Ohio State University

More information

Mobile Image Offloading Using Cloud Computing

Mobile Image Offloading Using Cloud Computing Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of

More information

Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty

Automation of Smartphone Traffic Generation in a Virtualized Environment. Tanya Jha Rashmi Shetty Automation of Smartphone Traffic Generation in a Virtualized Environment Tanya Jha Rashmi Shetty Abstract Scalable and comprehensive analysis of rapidly evolving mobile device application traffic is extremely

More information

Development of a file-sharing system for educational collaboration among higher-education institutions

Development of a file-sharing system for educational collaboration among higher-education institutions Development of a file-sharing system for educational collaboration among higher-education institutions Takuya Matsuhira, Yoshiya Kasahara, and Yoshihiro Takata Abstract Opportunities for educational, research-oriented,

More information

RV-Droid: Runtime Verification and Enforcement for Android Applications

RV-Droid: Runtime Verification and Enforcement for Android Applications RV-Droid: Runtime Verification and Enforcement for Android Applications Yliès Falcone, Sebastian Currea, Mohamad Jaber Laboratoire d Informatique de Grenoble - VASCO Team - University of Grenoble, Université

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

4 Steps to Effective Mobile Application Security

4 Steps to Effective Mobile Application Security Mobile Application Security Whitepaper 4 Steps to Effective Mobile Application Security Table of Contents Executive Summary 3 Mobile Security Risks in Enterprise Environments 4 The Shortcomings of Traditional

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

Securing Corporate Email on Personal Mobile Devices

Securing Corporate Email on Personal Mobile Devices Securing Corporate Email on Personal Mobile Devices Table of Contents The Impact of Personal Mobile Devices on Corporate Security... 3 Introducing LetMobile Secure Mobile Email... 3 Solution Architecture...

More information

Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices

Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices SUMMARY The Specialized

More information

QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing

QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing Journal of Computational Information Systems 11: 11 (2015) 3875 3881 Available at http://www.jofcis.com QRCloud: Android Vulnerability Query and Push Services Based on QR Code in Cloud Computing Jingzheng

More information

Introduction to Android

Introduction to Android Introduction to Android Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch1, John Wiley & Sons, 2012 1. What is Android Android is a mobile operating system that is based on a modified

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

Monitoring Performances of Quality of Service in Cloud with System of Systems

Monitoring Performances of Quality of Service in Cloud with System of Systems Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department

More information

Detection and Identification of Android Malware Based on Information Flow Monitoring

Detection and Identification of Android Malware Based on Information Flow Monitoring Detection and Identification of Android Malware Based on Information Flow Monitoring Radoniaina Andriatsimandefitra, Valérie Viet Triem Tong To cite this version: Radoniaina Andriatsimandefitra, Valérie

More information

Flexible Architecture for Internet of Things Utilizing an Local Manager

Flexible Architecture for Internet of Things Utilizing an Local Manager , pp.235-248 http://dx.doi.org/10.14257/ijfgcn.2014.7.1.24 Flexible Architecture for Internet of Things Utilizing an Local Manager Patrik Huss, Niklas Wigertz, Jingcheng Zhang, Allan Huynh, Qinzhong Ye

More information

A cloud-based architecture to crowdsource mobile app privacy leaks

A cloud-based architecture to crowdsource mobile app privacy leaks Department of Information & Communication Systems Engineering University of the Aegean Karlovasi, Samos, Greece A cloud-based architecture to crowdsource mobile app privacy leaks Dimitrios Papamartzivanos

More information

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment

Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load

Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Payment minimization and Error-tolerant Resource Allocation for Cloud System Using equally spread current execution load Pooja.B. Jewargi Prof. Jyoti.Patil Department of computer science and engineering,

More information

DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015

DOCUMENT REFERENCE: SQ312-003-EN. SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper. May 2015 DOCUMENT REFERENCE: SQ312-003-EN SAMKNOWS SMARTPHONE-BASED TESTING SamKnows App for Android White Paper May 2015 SAMKNOWS QUALITY CONTROLLED DOCUMENT. SQ REV LANG STATUS OWNER DATED 312 003 EN FINAL JP

More information

Application Based Access Control on Cloud Networks for Data Security

Application Based Access Control on Cloud Networks for Data Security Application Based Access Control on Cloud Networks for Data Security Ms. Smitha P M.Tech in DCN, Department of ECE GSSSIETW, Mysuru Karnataka, India Smitha.21sn @gmail.com Mrs. Manjula G Associate. Proffesor,

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Interactive Voice Response System by Using Asterisk

Interactive Voice Response System by Using Asterisk Interactive Voice Response System by Using Asterisk Ankita Bhondge, Aditi Bhatkar, Sapna Fender, Sonali Thakre, Megha Goel Student, Dept. of C.S.E., SRMCEW, RTM University, Nagpur, India. Professor, Dept.

More information

Desktop Virtualization Technologies and Implementation

Desktop Virtualization Technologies and Implementation ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method

More information

Micro-Environment Sensor based Android Application More Ketan Dadasaheb 1 Computer Department SCSCOE Pune, India Jagtap Pravin Vitthal 3

Micro-Environment Sensor based Android Application More Ketan Dadasaheb 1 Computer Department SCSCOE Pune, India Jagtap Pravin Vitthal 3 Volume 3, Issue 1, January 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com ISSN:

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Deploying iphone and ipad Security Overview

Deploying iphone and ipad Security Overview Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information

Introduction to Android

Introduction to Android Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Mobile Operating Systems. Week I

Mobile Operating Systems. Week I Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone

More information

Overview - Snort Intrusion Detection System in Cloud Environment

Overview - Snort Intrusion Detection System in Cloud Environment International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm Overview

More information

International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012. Green WSUS

International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012. Green WSUS International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012 Abstract 112 Green WSUS Seifedine Kadry, Chibli Joumaa American University of the Middle East Kuwait The new era of information

More information

Android Application for Vehicle Theft Prevention and Tracking System

Android Application for Vehicle Theft Prevention and Tracking System Android Application for Vehicle Theft Prevention and Tracking System Rohitaksha K, Madhu C G, Nalini B G,Nirupama C V Computer Science & Engineering Department, VTU JSS Academy of Technical Education,

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information