86 research outputs found

    Analysis of Malicious Detection in Bluetooth Enabled Devices Exploiting Wireless Personal Area Networks

    Get PDF
    The growing popularity of mobile devices (smart phones, handsets, PDAs) along with 3G technology brings the mobile internet services on these devices. The wireless devices with messaging capabilities attracted the malware writers to target the hand held devices. Even though the mobile device have numerous benefits like mobility, compact size and ease of their connectivity, the open nature increases the threats and risks being posed. The mobile viruses so far discovered exploited vulnerabilities in Bluetooth by infecting nearby devices and then propagate through SMS to other devices in the mobile network. The problem becomes worse with the growth of MMS (Multimedia Messaging Service), mobile game, and mobile commerce in near future. This paper investigates the propagation of mobile worms and viruses that spread primarily via SMS/MMS messages and short range radio interfaces – Bluetooth

    Oscillatory and asymptotic properties of solutions of nonlinear fourth order difference equations

    Get PDF
    The authors consider the difference equation Δ2 (rn Δ2 yn) qn f(yn) = Qn; n = 1,2,3,... (*) where rn > 0, qn > 0, for all n 1 and f : is continuous such that uf(u) > 0 for u 0. Dividing the solutions of (*) into several classes for the cases Qn = 0 and Qn 0, the authors obtain conditions for the existence / nonexistence of solutions of (*) in these classes. Examples are inserted to illustrate the results

    Behaviour of stiffened plates in offshore structures

    No full text
    Proceedings of the International Offshore and Polar Engineering Conference1190-195POPE
    corecore