A defense model against mobile phone malicious codes based on social computing
暂无分享,去创建一个
Xiaotong Liu | Yao Wang | Leyi Shi | Leyi Shi | Xiaotong Liu | Yao Wang
[1] Liu Yan. Research on Simulation and Modeling of Social Network Worm Propagation , 2011 .
[2] Sencun Zhu,et al. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.
[3] Andrew B. Whinston,et al. Social Computing: An Overview , 2007, Commun. Assoc. Inf. Syst..
[4] Guoqing Chen,et al. Towards Understanding Dynamics of Mobile Phone Worm Propagation Using Social Network Analysis , 2009, 2009 Eighth International Conference on Mobile Business.
[5] Araceli Sanchis,et al. Web news mining in an evolving framework , 2016, Inf. Fusion.
[6] Latifur Khan,et al. A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.
[7] Boleslaw K. Szymanski,et al. Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[8] Fei-peng Li,et al. Research on Simulation and Modeling of Social Network Worm Propagation: Research on Simulation and Modeling of Social Network Worm Propagation , 2011 .
[9] Juan E. Tapiador,et al. Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.
[10] Jie Wu,et al. Forming Opinions via Trusted Friends: Time-Evolving Rating Prediction Using Fluid Dynamics , 2016, IEEE Transactions on Computers.