Smartphone Malware and Its Propagation Modeling: A Survey
暂无分享,去创建一个
Sancheng Peng | Shui Yu | Aimin Yang | Shui Yu | Aimin Yang | Sancheng Peng
[1] Yasir Saleem,et al. Network Simulator NS-2 , 2015 .
[2] P. Coulton,et al. Mobile phone vulnerabilities: a new generation of malware , 2004, IEEE International Symposium on Consumer Electronics, 2004.
[3] Sihan Qing,et al. A survey and trends on Internet worms , 2005, Comput. Secur..
[4] R. May,et al. Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.
[5] Madhav V. Marathe,et al. EpiNet: a simulation framework to study the spread of malware in wireless networks , 2009, SimuTools.
[6] Geoffrey M. Voelker,et al. Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.
[7] Sancheng Peng,et al. Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones , 2013, J. Comput. Syst. Sci..
[8] Guanhua Yan,et al. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.
[9] Georgios Kambourakis,et al. iSAM: An iPhone Stealth Airborne Malware , 2011, SEC.
[10] L. Allen. An Introduction to Stochastic Epidemic Models , 2008 .
[11] L. Allen,et al. A comparison of three different stochastic population models with regard to persistence time. , 2003, Theoretical population biology.
[12] Yoichi Shinoda,et al. Modeling Malware Diffusion in Wireless Networks with Nodes' Heterogeneity and Mobility , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.
[13] Brian L. Mark,et al. Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.
[14] L. Allen,et al. Comparison of deterministic and stochastic SIS and SIR models in discrete time. , 2000, Mathematical biosciences.
[15] Legand L. Burge,et al. Modelling the spread of mobile malware , 2008, Int. J. Comput. Aided Eng. Technol..
[16] K. Abbas,et al. MODELING INFECTIOUS DISEASES USING GLOBAL STOCHASTIC CELLULAR AUTOMATA , 2005 .
[17] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[18] L. Allen. Some discrete-time SI, SIR, and SIS epidemic models. , 1994, Mathematical biosciences.
[19] Binshan Lin,et al. Security aspects of mobile phone virus: a critical survey , 2008, Ind. Manag. Data Syst..
[20] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[21] Vasileios Karyotis,et al. Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis , 2008, Journal of Computer Science and Technology.
[22] Jiming Liu,et al. Modeling and predicting the dynamics of mobile virus spread affected by human behavior , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[23] Marko Helenius,et al. About malicious software in smartphones , 2006, Journal in Computer Virology.
[24] Sancheng Peng,et al. Modeling Malware Propagation in Smartphone Social Networks , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[25] Matthew Smith,et al. Evaluating the threat of epidemic mobile malware , 2012, 2012 IEEE 8th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[26] Kang G. Shin,et al. On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.
[27] W. O. Kermack,et al. A contribution to the mathematical theory of epidemics , 1927 .
[28] Stefan Saroiu,et al. A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.
[29] Jiming Liu,et al. Modeling and Restraining Mobile Virus Propagation , 2013, IEEE Transactions on Mobile Computing.
[30] P. P. Chaudhuri,et al. A Survey on Cellular Automata ∗ , 2003 .
[31] R. Mark Wilson. Using the friendship paradox to sample a social network , 2010 .
[32] Yurong Song,et al. Model and Dynamic Behavior of Malware Propagation over Wireless Sensor Networks , 2009, Complex.
[33] Biplab Sikdar,et al. Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[34] Marin Silic,et al. Emerging security threats for mobile platforms , 2011, 2011 Proceedings of the 34th International Convention MIPRO.
[35] Sencun Zhu,et al. Improving sensor network immunity under worm attacks: a software diversity approach , 2008, MobiHoc '08.
[36] W. O. Kermack,et al. Contributions to the mathematical theory of epidemics—I , 1991, Bulletin of mathematical biology.
[37] Maziar Nekovee,et al. The Opportunistic Transmission of Wireless Worms between Mobile Devices , 2008, ArXiv.
[38] John R. Birge,et al. Introduction to Stochastic Programming , 1997 .
[39] Fan Zhang,et al. Stealthy video capturer: a new video-based spyware in 3G smartphones , 2009, WiSec '09.
[40] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[41] Brian D. Noble,et al. Modeling epidemic spreading in mobile environments , 2005, WiSe '05.
[42] Wei Xia,et al. Commwarrior worm propagation model for smart phone networks , 2008 .
[43] Patrick P. C. Lee,et al. On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.
[44] YiXian Yang,et al. Epidemic Model of Mobile Phone Virus for Hybrid Spread Mode with Preventive Immunity and Mutation , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).
[45] Guanhua Yan,et al. Modeling Propagation Dynamics of Bluetooth Worms , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[46] San Cheng Peng. A Survey on Malware Containment Models in Smartphones , 2012 .
[47] Krishna P. Gummadi,et al. Exploiting Social Interactions in Mobile Systems , 2007, UbiComp.
[48] Maziar Nekovee,et al. Worm epidemics in wireless ad hoc networks , 2007, ArXiv.
[49] Guanhua Yan,et al. Bluetooth Worms: Models, Dynamics, and Defense Implications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[50] Kwang-Cheng Chen,et al. On Modeling Malware Propagation in Generalized Social Networks , 2011, IEEE Communications Letters.
[51] Guo-Ping Jiang,et al. Modeling malware propagation in wireless sensor networks using cellular automata , 2008, 2008 International Conference on Neural Networks and Signal Processing.
[52] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[53] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[54] Steven Myers,et al. Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm , 2011, LEET.
[55] Hayder Radha,et al. Using signal processing techniques to model worm propagation over wireless sensor networks , 2006 .
[56] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[57] P. Kaye. Infectious diseases of humans: Dynamics and control , 1993 .
[58] Albert-László Barabási,et al. Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.
[59] Wang Suo-ping. A Discrete Probabilistic Model of Malware Propagation , 2010 .
[60] Georgios Kambourakis,et al. User privacy and modern mobile services: are they on the same path? , 2012, Personal and Ubiquitous Computing.
[61] J. P. Trapman,et al. On stochastic models for the spread of infections , 2006 .
[62] Vinod Yegneswaran,et al. An Analysis of the iKee.B iPhone Botnet , 2010, MobiSec.
[63] Chuanyi Ji,et al. Spatial-temporal modeling of malware propagation in networks , 2005, IEEE Transactions on Neural Networks.
[64] Sancheng Peng,et al. Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[65] Ángel Martín del Rey,et al. Modeling epidemics using cellular automata , 2006, Applied Mathematics and Computation.
[66] Donald F. Towsley,et al. Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms , 2007, IEEE Transactions on Dependable and Secure Computing.
[67] Madhav V. Marathe,et al. High Performance Scalable and Expressive Modeling Environment to Study Mobile Malware in Large Dynamic Networks , 2011, 2011 IEEE International Parallel & Distributed Processing Symposium.
[68] Peng Wu,et al. General worm propagation model forwireless ad hoc networks , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[69] W. O. Kermack,et al. Contributions to the Mathematical Theory of Epidemics. II. The Problem of Endemicity , 1932 .
[70] Sancheng Peng,et al. Survivability modeling and analysis on 3D mobile ad-hoc networks , 2011 .