Attacks on mobile networks: An overview of new security challenge
暂无分享,去创建一个
M.E. Rusli | S. Sudin | A. Tretiakov | R.H.R.M. Ali | M. Rusli | S. Sudin | A. Tretiakov | R.H.R.M. Ali
[1] Herbert W. Hethcote,et al. The Mathematics of Infectious Diseases , 2000, SIAM Rev..
[2] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[3] Helen J. Wang,et al. Smartphone attacks and defenses , 2004 .
[4] Hyunsoo Yoon,et al. Dynamic Simulation on Network Security Simulator Using SSFNET , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[5] Bernhard Plattner,et al. Experiences with worm propagation simulations , 2003, WORM '03.
[6] Donald F. Towsley,et al. Monitoring and early warning for internet worms , 2003, CCS '03.
[7] Matthew M. Williamson,et al. Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.
[8] William H. Sanders,et al. Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[9] Wenke Lee,et al. Simulating Internet worms , 2004, The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, 2004. (MASCOTS 2004). Proceedings..
[10] Thomas F. La Porta,et al. Exploiting open functionality in SMS-capable cellular networks , 2008, J. Comput. Secur..
[11] Kang G. Shin,et al. On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.
[12] George F. Riley,et al. The Georgia Tech Network Simulator , 2003, MoMeTools '03.
[13] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[14] David M. Nicol,et al. Simulating realistic network worm traffic for worm warning system design and testing , 2003, WORM '03.
[15] Mikko Hypponen,et al. Malware goes mobile. , 2006, Scientific American.
[16] Geoffrey M. Voelker,et al. Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.
[17] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[18] S. Viveros. The economic impact of malicious code in wireless mobile networks , 2003 .
[19] Jianping Pan,et al. Wireless network security , 2006, Wirel. Commun. Mob. Comput..
[20] Michalis Faloutsos,et al. Overcoming the challenge of security in a mobile environment , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[21] Brian D. Noble,et al. Modeling epidemic spreading in mobile environments , 2005, WiSe '05.
[22] Hongkyun Jung,et al. The Development of SoC Platform for Embedded System Applications , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).
[23] Shane Coursen. Mobile Malware: The future of mobile malware , 2007 .
[24] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[25] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[26] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[27] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[28] Giovanni Vigna,et al. Using Labeling to Prevent Cross-Service Attacks Against Smart Phones , 2006, DIMVA.
[29] Guanhua Yan,et al. Bluetooth Worms: Models, Dynamics, and Defense Implications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[30] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[31] George F. Riley,et al. Modeling and simulations of worms and mitigation techniques , 2007 .
[32] James P. McDermott,et al. Attack net penetration testing , 2001, NSPW '00.