logo publicité Visiter le site national
retour à l'accueil plan du site Contacter le groupe régional administration du site
GROUPE D’EXPERTS QUALITE CNAM 292 rue Saint-Martin 75003 PARIS tél : 01 42 72 64 40 Fax : 01 42 78 26 43
Vous êtes ici : Projets > Profiling : the web, the pc, smartphone, or androïd !!!
Actualité
Pour vous, l’actu. QSE
CNAM : références
Colloques & Conférences
Des côtés sympa !
École Vaucanson
Humour
Re-Coins et bricolages !
Soucis et attentes

Charte GEQseC
Le GEQC se définit sous tous ses aspects...
Remerciements
Attente et besoin QSE
Comité de direction
Découvrez nos experts
Offres d’emplois
Séminaires QSE CNAM

Projets
Tous nos projets par domaines ...
Aide à projet qualité
Aide à tous
Biologie
CNRS : PLUME
Energie
Maîtrise des risques
Management
Mardis de l’innovation
MDE - Ing.. De Modèle
Nations Unies : FAO
Process et Mgt. MA
Prospective, les bases
Santé ... Environnement
Sécurité
Sécurité Informatique
Transition énergétique en Bretagne
Week End Rando Visite

Publications
Tous les écrits du GEQC, classés par thèmes. La référence.
Colloques
Ouvrages et publications

Nos référents
Progression scientifique
Direction de Recherhe et HDR CNAM
Laurence Berlie
Anne Labarre
R. Chevance
F. Dieng Diop
J. Foos
M. Godet
A. LeBeau
F. Meunier
H. Mitonneau
T. de Montbrial
L. Bloch
Y. Pesqueux
C. Pinet
J. Printz
A. Rémondière
Anne Marchais-Roubelat
JJ. Salomon
J.L. Thomas
Gilles Teneau
Réflexion et philosophie
HDR et Thèses
Accès aux standards

Profiling : the web, the pc, smartphone, or androïd !!!
jeudi 5 septembre 2013


Can we read "How to find ideas for profiling people on the web, their pc, smartphone, androïd ... and so on !!!" ?

With your browser, you’ll find ideas such as :

- A taxonomy and business analysis for mobile web applications

"Mobile web applications refer to web applications on mobile devices, aimed at personalizing, integrating, and discovering mobile contents in user contexts. This thesis presents a comprehensive study of mobile web applications by proposing a new taxonomy for mobile web applications, and conducting a business analysis in the field of mobile web applications..."

- Effects and opportunities of native code extensions for computationally demanding web applications

- Smartphone software for department of computer science

"The presented document provides an overview of the Smartphone Software for Department of Computer Science project development through out several phases : analysis of the project proposal, preliminary study of the concepts involved in the project, design decisions and modeling, implementation, experiments and conclusions obtained in the end, as well as a reflection on possible future system improvements. The final version of the system, which was built after the design and implementation decisions made through out the development of the project, is a prototype mainly composed of an application for Android smartphones leaning on a distributed architecture in order to provide all its expected functionalities."

- Applying Next Generation Web Technologies in the Configuration of Customer Designed Products

"This thesis investigates on the issues related to optimization of rich content rendered for browsers on mobile devices. It proposes a lightweight framework that solves issues of rendering on the server and client for the mobile browsers. The solution addresses optimization features such as minification, customized content rendering for mobile and other solutions"

- Detection of Smartphone Malware

"With the increasing capabilities of such phones, more and more malicious software (malware) targeting these devices have emerged. In 2004, the first articles about malware for smartphones [53, 169] appeared describing mobile devices as the next generation of targets. Since then, the number of malware increased every month, and variants for various smartphone platforms appeared, e.g. Symbian OS, Windows Mobile, and Android. Our assumption is that the evolution of malware for mobile devices might take a similar direction as the evolution of PC malware. Thus, similar problems will have to be encountered, e.g. missing signatures for unknown threats and new malware appearing at high frequency. For instance, Bulygin [35] showed that a MMS worm targeting random phone book numbers can in- fect more than 700,000 devices in about three hours. Another interesting work was presented by Oberheide et al. [162] who state that the average time required for a signature-based anti-virus engine to become capable of detecting new threats is 48 days. These numbers request extended security measures for smartphones as a malware can seriously damage an infected device within seconds."

- Guidelines for the digital forensic processing of smartphone

"Today Smartphone devices are widespread and they hold a number of types of information about the owner and their activities. As a result of the widespread adoption of these devices into every aspect of our lives they can be involved in almost any crime. The aim of digital forensics of Smartphone devices is to recover the digital evidence in a forensically sound manner so that the digital evidence can be presented and accepted in court. The digital forensic process consists of four phases which are preservation, acquisition, examination/analysis and finally presentation. In this paper we look at various types of crime and their associated digital evidence. The digital forensics process of the Smartphone devices is discussed and, this paper also contains recommended guidelines and procedures for how to perform the phases of the digital forensics process on Smartphone devices. Finally, a description of some challenges that may be faced in this field is given."

- Your Phone, Yourself : When is tracking too much ?

- A Survey of Mobile Malware in the Wild

"Mobile malware is rapidly becoming a serious threat. In this paper, we survey the current state of mobile malware in the wild. We analyze the incentives behind 46 pieces of iOS, Android, and Symbian malware that spread in the wild from 2009 to 2011. We also use this data set to evaluate the effectiveness of techniques for preventing and identifying mobile malware. After observing that 4 pieces of malware use root exploits to mount sophisticated attacks on Android phones, we also examine the incentives that cause non-malicious smartphone tinkerers to publish root exploits and survey the availability of root exploits."

- spying people by profiling smartphone, androïd

IMPRIMER L'ARTICLE
IMPRIMER
Profiling : the web, the pc, smartphone, or androïd !!!

Dans la même rubrique :
Biométrie pour la Sécurité Informatique
Sécurité Informatique ; IMDR-GTR64 ; Objectif et historique
International Information Security Conference
Histoire des micoprocesseurs Intel
Sauvegarde du patrimoine scientifique et technique
Qualité Sécurité Environnement : Moyen pour une histoire de l’internet
Logiciel libre et sécurité
Prochaine journée de la sécurité des S.I
ESORICS 2007
IMdR - GTR64 : Maîtrise de la composante logicielle pour la sécurité, sûreté et durabilité des systèmes complexes

Sur le web :
CERTA-2012-AVI-361 : Multiples vulnérabilités dans WordPress (02 juillet 2012)
CERTA-2012-AVI-360 : Multiples vulnérabilités dans IBM Support Assistant (02 juillet 2012)
CERTA-2012-ACT-026 : Bulletin d'actualité numéro 026 de l'année 2012 (29 juin 2012)
CERTA-2012-AVI-357 : Multiples vulnérabilités dans IBM Rational ClearQuest (29 juin 2012)
CERTA-2012-AVI-358 : Multiples vulnérabilités dans HP System Management Homepage (29 juin 2012)
CERTA-2012-AVI-359 : Vulnérabilité dans des imprimantes HP Photosmart (29 juin 2012)
CERTA-2012-AVI-355 : Multiples vulnérabilités dans Symantec Message Filter (28 juin 2012)
CERTA-2012-AVI-356 : Multiples vulnérabilités dans Cisco WebEx Player (28 juin 2012)


Proposer un article | Nous contacter | Plan du site | Admin | Accueil
Union des Ingénieurs CNAM Association reconnue d'utilité publique (loi de 1901) Ce site est réalisé grâce au système de publication SPIP