CC2: Defending Hybrid Worm on Mobile Networks with Two-Dimensional Circulation Control
暂无分享,去创建一个
Guanglu Sun | Deyun Chen | Xiaoyu Ding | Hailu Yang | Yu Xin | Xiaoyu Ding | Hailu Yang | Guanglu Sun | Yu Xin | Deyun Chen
[1] Marco Fiore,et al. Worm Epidemics in Vehicular Networks , 2015, IEEE Transactions on Mobile Computing.
[2] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[3] Réka Albert,et al. Near linear time algorithm to detect community structures in large-scale networks. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.
[4] Brian D. Noble,et al. Modeling epidemic spreading in mobile environments , 2005, WiSe '05.
[5] Brian Thompson,et al. Slowing the spread of Bluetooth-based malware in mobile tactical networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[6] Sajal K. Das,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MOBILE COMPUTING An Epidemic Theoretic Framework for Vulnerability Analysi , 2022 .
[7] Krishna P. Gummadi,et al. Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.
[8] Sencun Zhu,et al. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.
[9] Geoffrey M. Voelker,et al. Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.
[10] Wanlei Zhou,et al. On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[11] Kwang-Cheng Chen,et al. On Modeling Malware Propagation in Generalized Social Networks , 2011, IEEE Communications Letters.
[12] Mao-Bin Hu,et al. Detect overlapping and hierarchical community structure in networks , 2008, ArXiv.
[13] Yonggang Wen,et al. Algorithms and Applications for Community Detection in Weighted Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[14] Dawei Zhao,et al. Virus Propagation and Patch Distribution in Multiplex Networks: Modeling, Analysis, and Optimal Allocation , 2019, IEEE Transactions on Information Forensics and Security.
[15] M E J Newman,et al. Modularity and community structure in networks. , 2006, Proceedings of the National Academy of Sciences of the United States of America.
[16] Albert-László Barabási,et al. Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.
[17] Wang Haibo,et al. An immunization strategy for social network worms based on network vertex influence , 2015, China Communications.
[18] Geoffrey M. Voelker,et al. Defending Mobile Phones from Proximity Malware , 2009, IEEE INFOCOM 2009.
[19] Hasan Çam,et al. Controlling proximity-malware infection in diverse tactical mobile networks using K-distance pruning , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[20] Min Wu,et al. Containing smartphone worm propagation with an influence maximization algorithm , 2014, Comput. Networks.
[21] Azzedine Boukerche,et al. Countermeasures against Worm Spreading , 2019, ACM Comput. Surv..
[22] Yang Xiang,et al. Modeling the Propagation of Worms in Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[23] Sencun Zhu,et al. Improving sensor network immunity under worm attacks: A software diversity approach , 2016, Ad Hoc Networks.
[24] Mostafa Salehi,et al. A local immunization strategy for networks with overlapping community structure , 2017 .
[25] Xiaomei Zhang,et al. Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks , 2017, IEEE/ACM Transactions on Networking.
[26] Sancheng Peng,et al. Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[27] Lu-Xing Yang,et al. A Novel Virus-Patch Dynamic Model , 2015, PloS one.
[28] Songwu Lu,et al. Analysis of the Reliability of a Nationwide Short Message Service , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[29] Pilwon Kim,et al. Epidemic Spreading in Complex Networks with Resilient Nodes: Applications to FMD , 2018, Complex..
[30] Jie Wu,et al. CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[31] Xiaomei Zhang,et al. Infectious Disease Containment Based on a Wireless Sensor System , 2016, IEEE Access.
[32] Boleslaw K. Szymanski,et al. Overlapping community detection in networks: The state-of-the-art and comparative study , 2011, CSUR.
[33] N. Christakis,et al. Social Network Sensors for Early Detection of Contagious Outbreaks , 2010, PloS one.
[34] Stefan Saroiu,et al. A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.
[35] Azzedine Boukerche,et al. A Novel Infrastructure-Based Worm Spreading Countermeasure for Vehicular Networks , 2018, IEEE Transactions on Intelligent Transportation Systems.
[36] Alfred O. Hero,et al. Multilayer Spectral Graph Clustering via Convex Layer Aggregation: Theory and Algorithms , 2017, IEEE Transactions on Signal and Information Processing over Networks.
[37] Jiming Liu,et al. Modeling and Restraining Mobile Virus Propagation , 2013, IEEE Transactions on Mobile Computing.
[38] Guanhua Yan,et al. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.
[39] Eduard Heindl,et al. Understanding the spreading patterns of mobile phone viruses , 2012 .
[40] Donald F. Towsley,et al. Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms , 2007, IEEE Transactions on Dependable and Secure Computing.