Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform Page: IX
xi, 149 pages : illustrations (chiefly color)View a full description of this dissertation.
Extracted Text
The following text was automatically extracted from the image on this page using optical character recognition software:
Table 8.1.
Table 9.1.
Table 9.2.
Table 9.3.
Table A.1.
Table A.2.
Table B.1.ix
The average processing time delay per buffer .......................................................87
Description of EEG data collection. .....................................................................99
Confusion matrix for multilayer perception ........................................................110
Performance of the multilayer perception............................................................110
The bit ranges for each raw data..........................................................................125
FFT performance results ......................................................................................129
Android smart phone devices used in this work ..................................................134
Upcoming Pages
Here’s what’s next.
Search Inside
This dissertation can be searched. Note: Results may vary based on the legibility of text within the document.
Tools / Downloads
Get a copy of this page or view the extracted text.
Citing and Sharing
Basic information for referencing this web page. We also provide extended guidance on usage rights, references, copying or embedding.
Reference the current page of this Dissertation.
Mohamed Issadeen, Mohamed Fazeen. Modeling and Analysis of Intentional And Unintentional Security Vulnerabilities in a Mobile Platform, dissertation, December 2014; Denton, Texas. (https://digital.library.unt.edu/ark:/67531/metadc700067/m1/11/: accessed July 18, 2024), University of North Texas Libraries, UNT Digital Library, https://digital.library.unt.edu; .