The influence of user mobility in mobile viruspropagation: An enterprise mobile securityperspective
暂无分享,去创建一个
R. Badlishah Ahmad | Syed Zulkarnain Syed Idrus | Azremi Abdullah Al Hadi | Mohd Mustafa Al Bakri Abdullah | Suhizaz Sudin | Len Eh Kan Phak
[1] A. B. Ruighaver,et al. Organisational security culture: Extending the end-user perspective , 2007, Comput. Secur..
[2] Susan Greener,et al. Business Research Methods , 2008 .
[3] S. Viveros. The economic impact of malicious code in wireless mobile networks , 2003 .
[4] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[5] Dong Li,et al. An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.
[6] Christopher Brian Shirey. Modeling the Spread and Prevention of Malicious Mobile Code Via Simulation CS-2004-15 , 2004 .
[7] Shane Coursen. Mobile Malware: The future of mobile malware , 2007 .
[8] Michalis Faloutsos,et al. Overcoming the challenge of security in a mobile environment , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[9] Kathleen M. Eisenhardt,et al. Developing Theory Through Simulation Methods , 2006 .
[10] Andreas Terzis,et al. On Using Mobility to Propagate Malware , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.
[11] Brian D. Noble,et al. Analytical Models for Epidemics in Mobile Networks , 2007 .
[12] Shiva Azadegan,et al. The Benefits of a Notification Process in Addressing the Worsening Computer Virus Problem: Results of a Survey and a Simulation Model , 2002, Comput. Secur..
[13] Kang G. Shin,et al. On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.
[14] Mikko Hypponen,et al. Malware goes mobile. , 2006, Scientific American.
[15] Paul C. van Oorschot,et al. On instant messaging worms, analysis and countermeasures , 2005, WORM '05.
[16] Averill M. Law,et al. Simulation Modeling & Analysis , 1991 .
[17] Geoffrey M. Voelker,et al. Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.
[18] Brian D. Noble,et al. Modeling epidemic spreading in mobile environments , 2005, WiSe '05.
[19] Anat Hovav,et al. Deterring internal information systems misuse , 2007, CACM.
[20] Terrence August,et al. Network Software Security and User Incentives , 2006, Manag. Sci..
[21] Balasubramanian Raman,et al. Mobile Worms and Viruses , 2014 .
[22] Kathleen M. Carley,et al. Simulation modeling in organizational and management research , 2007 .
[23] Giovanni Vigna,et al. Using Labeling to Prevent Cross-Service Attacks Against Smart Phones , 2006, DIMVA.
[24] Krishna P. Gummadi,et al. Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.
[25] Maziar Nekovee,et al. Worm epidemics in wireless ad hoc networks , 2007, ArXiv.
[26] Gordon B. Davis,et al. An Investigation of Media Selection Among Directors and Managers: From "Self" to "Other" Orientation , 1998, MIS Q..
[27] Eirik Albrechtsen,et al. A qualitative study of users' view on information security , 2007, Comput. Secur..
[28] Shuang Xu,et al. Moderating Effects of Task Type on Wireless Technology Acceptance , 2005, J. Manag. Inf. Syst..
[29] Helen J. Wang,et al. Smartphone attacks and defenses , 2004 .
[30] P. Reiher,et al. Mobile contagion: simulation of infection & defense , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).
[31] William H. Sanders,et al. Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[32] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[33] Siu-cheung Chan,et al. Understanding Internet Banking Adoption and Use Behavior: A Hong Kong Perspective , 2004, J. Glob. Inf. Manag..
[34] Neal Leavitt,et al. Mobile phones: the next frontier for hackers? , 2005, Computer.
[35] Chao-Min Chiu,et al. Predicting electronic service continuance with a decomposed theory of planned behaviour , 2004, Behav. Inf. Technol..
[36] Stefano Zanero,et al. Studying Bluetooth Malware Propagation: The BlueBag Project , 2007, IEEE Security & Privacy.
[37] Jeffrey M. Stanton,et al. Analysis of end user security behaviors , 2005, Comput. Secur..