Studying Bluetooth Malware Propagation: The BlueBag Project
暂无分享,去创建一个
[1] Eric Filiol,et al. Open Problems in Computer Virology , 2006, Journal in Computer Virology.
[2] Michael Bailey,et al. Shining Light on Dark Address Space , 2001 .
[3] Giuseppe Serazzi,et al. Computer Virus Propagation Models , 2003, MASCOTS Tutorials.
[4] Scott F. Midkiff,et al. Demonstrating vulnerabilities in Bluetooth security , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[5] Yuh-Jzer Joung,et al. An ns-based Bluetooth topology construction simulation environment , 2003, 36th Annual Simulation Symposium, 2003..
[6] Steve R. White,et al. Open Problems in Computer Virus Research , 1998 .
[7] Cecilia Mascolo,et al. A community based mobility model for ad hoc network research , 2006, REALMAN '06.
[8] Weibo Gong,et al. Email Virus Propagation Modeling and Analysis , 2003 .
[9] Herbert W. Hethcote,et al. The Mathematics of Infectious Diseases , 2000, SIAM Rev..
[10] Avishai Wool,et al. Cracking the Bluetooth PIN , 2005, MobiSys '05.
[11] Robert Morrow. Bluetooth Implementation and Use , 2002 .
[12] Markus Jakobsson,et al. Security Weaknesses in Bluetooth , 2001, CT-RSA.
[13] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[14] Eugene H. Spafford,et al. Crisis and aftermath , 1989, Commun. ACM.
[15] M. Hannikainen,et al. Design and implementation of an enhanced security layer for Bluetooth , 2005, Proceedings of the 8th International Conference on Telecommunications, 2005. ConTEL 2005..
[16] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.