scispace - formally typeset
Search or ask a question
Topic

Internet appliance

About: Internet appliance is a research topic. Over the lifetime, 1974 publications have been published within this topic receiving 43571 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: This article presents a detailed analysis on how malware has evolved over the last years for the most popular platforms and surveys, classify and discusses efforts made on detecting both malware and other suspicious software (grayware) between 2010 and 2013.
Abstract: Smart devices equipped with powerful sensing, computing and networking capabilities have proliferated lately, ranging from popular smartphones and tablets to Internet appliances, smart TVs, and others that will soon appear (e.g., watches, glasses, and clothes). One key feature of such devices is their ability to incorporate third-party apps from a variety of markets. This poses strong security and privacy issues to users and infrastructure operators, particularly through software of malicious (or dubious) nature that can easily get access to the services provided by the device and collect sensory data and personal information. Malware in current smart devices —mostly smartphones and tablets— have rocketed in the last few years, in some cases supported by sophisticated techniques purposely designed to overcome security architectures currently in use by such devices. Even though important advances have been made on malware detection in traditional personal computers during the last decades, adopting and adapting those techniques to smart devices is a challenging problem. For example, power consumption is one major constraint that makes unaffordable to run traditional detection engines on the device, while externalized (i.e., cloud-based) techniques rise many privacy concerns. This article examines the problem of malware in smart devices and recent progress made in detection techniques. We first present a detailed analysis on how malware has evolved over the last years for the most popular platforms. We identify exhibited behaviors, pursued goals, infection and distribution strategies, etc. and provide numerous examples through case studies of the most relevant specimens. We next survey, classify and discuss efforts made on detecting both malware and other suspicious software (grayware), concentrating on the 20 most relevant techniques proposed between 2010 and 2013. Based on the conclusions extracted from this study, we finally provide constructive discussion on open research problems and areas where we believe that more work is needed.

245 citations

Patent
25 Feb 1998
TL;DR: An Internet switch box connects between a telephone set and a public switched telephone network (PSTN) line, the latter being used both for PSTN telephone conversations and for connection to an Internet service provider (ISP).
Abstract: An Internet switch box connects between a telephone set and a public switched telephone network (PSTN) line, the latter of which is used both for PSTN telephone conversations and for connection to an Internet service provider (ISP). The switch box contains hardware and embedded software for establishing a connection to an ISP and for Internet telephony. When two users, each having an Internet switch box connected to the telephone set, wish to have an Internet telephony conversation, one calls the other over the PSTN. When they agree to an Internet telephony conversation, they signal their Internet switch boxes, by pressing either buttons on the switch boxes or certain keys on the telephone keypads, to switch to Internet telephony. The switch boxes disconnect the PSTN call and connect to their ISPs. Once the switch boxes are on the Internet, they contact each other through a server which supplies Internet protocol (IP) addresses of switch boxes, and the users continue their conversation by Internet telephony. The users can also prearrange to call each other solely by Internet telephony, in which case they do not need to talk to each other over the PSTN.

229 citations

Patent
06 Jun 1995
TL;DR: In this article, a method for promoting a sponsor's products by providing a consumer or potential consumer with sponsor-paid access to the Internet includes the step of distributing a floppy disc with Internet access software thereon.
Abstract: A method for promoting a sponsor's products by providing a consumer or potential consumer with sponsor-paid access to the Internet includes the step of distributing a floppy disc with Internet access software thereon. Associated with the floppy disc is a unique PIN number along with instructions on installing and using the Internet access software on a personal computer (PC). The Internet access software accesses and "handshakes" with an "Internet Entry Server", which verifies the PIN number, provides the access and times the sponsor paid Internet access time. In return, the Internet Entry Server performs as registration process which includes a number of personal questions and custom data gathering queries tailored by the sponsor for response by the user and initially gives the user a mandatory "guided tour" of the sponsor's Internet Home Page and domain where the user is exposed to current products and/or services of the sponsor and can download promotional coupons, product information, etc. The user is then released to browse the Internet and, after the free time is over, user paid refresh options are provided.

228 citations

Journal Article
TL;DR: The Internet has revolutionized the way information is shared and accessed since the rise of modern search engines, social networks and ubiquitous access through devices such as smartphones and tablet or laptop computers.
Abstract: The Internet has revolutionized the way information is shared and accessed. Information retrieval is easier now than ever before. Since the rise of modern search engines, social networks, and ubiquitous access through devices such as smartphones and tablet or laptop computers, information is

227 citations

Patent
06 May 2002
TL;DR: In this paper, a cross-referencing resource is proposed for disseminating over the Internet product information produced and maintained by product manufacturers using existing universal product codes (bar codes) as access keys.
Abstract: Methods and apparatus for disseminating over the Internet product information produced and maintained by product manufacturers using existing universal product codes (bar codes) as access keys. A cross-referencing resource preferably implemented by the existing Internet Domain Name System (DNS) receives Internet request messages containing all or part of a universal product code value and returns the Internet address at which data or services relating to the identified product, or to the manufacturer of that product, may be obtained. By using preferred Web data storage formats and protocol which conform to XML, XLS, XLink, Xpointer, RDF and Web service standards specifications, product and company information may be seamlessly identified, retrieved and integrated with information from other sources. A “web register” module can be employed to provide an Internet interface between a shared sales Internet server and an otherwise conventional inventory control system, and operates in conjunction with the cross-referencing server to provide detailed product information to Internet shoppers who may purchase goods from existing stores via the Internet.

221 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
81% related
Mobile device
58.6K papers, 942.8K citations
77% related
Information system
107.5K papers, 1.8M citations
76% related
Web page
50.3K papers, 975.1K citations
74% related
Mobile computing
51.3K papers, 1M citations
74% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20237
202215
20211
20202
201814
201770