Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm
暂无分享,去创建一个
[1] Stephan Bohacek,et al. Realistic mobility simulation of urban mesh networks , 2009, Ad Hoc Networks.
[2] Kang G. Shin,et al. Propagation, Detection and Containment of Mobile Malware , 2008 .
[3] Tristan Henderson,et al. CRAWDAD: a community resource for archiving wireless data at Dartmouth , 2005, CCRV.
[4] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[5] Steven Myers,et al. Mobile location tracking in metro areas: malnets and others , 2010, CCS '10.
[6] Cecilia Mascolo,et al. Exploiting temporal complex network metrics in mobile malware containment , 2010, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[7] Alessandro Vespignani,et al. Epidemic spreading in scale-free networks. , 2000, Physical review letters.
[8] Guanhua Yan,et al. Bluetooth worm propagation: mobility pattern matters! , 2007, ASIACCS '07.
[9] Madhav V. Marathe,et al. EpiNet: a simulation framework to study the spread of malware in wireless networks , 2009, SIMUTools 2009.
[10] Stefano Zanero,et al. Studying Bluetooth Malware Propagation: The BlueBag Project , 2007, IEEE Security & Privacy.
[11] Tristan Henderson,et al. CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth , 2005, IEEE Pervasive Comput..
[12] William Hugh Murray,et al. The application of epidemiology to computer viruses , 1988, Comput. Secur..
[13] Mikko Hypponen,et al. Malware goes mobile. , 2006, Scientific American.
[14] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[15] Madhav V. Marathe,et al. EpiNet: a simulation framework to study the spread of malware in wireless networks , 2009, SimuTools.
[16] Stephen Gilmore,et al. Performance Tools and Applications to Networked Systems , 2004 .
[17] José Roberto Castilho Piqueira,et al. Dynamic models for computer viruses , 2008, Comput. Secur..
[18] Andreas Terzis,et al. On Using Mobility to Propagate Malware , 2007, 2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops.
[19] Peng Wu,et al. General worm propagation model forwireless ad hoc networks , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.
[20] Stefan Saroiu,et al. A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.
[21] Nathan Eagle,et al. CRAWDAD dataset mit/reality (v.2005-07-01) , 2005 .
[22] Bill Broyles. Notes , 1907, The Classical Review.
[23] Yang Xiao,et al. Worm Propagation Dynamics in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Communications.
[24] Guanhua Yan,et al. Bluetooth Worms: Models, Dynamics, and Defense Implications , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[25] Albert-László Barabási,et al. Understanding the Spreading Patterns of Mobile Phone Viruses , 2009, Science.
[26] Guanhua Yan,et al. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.
[27] Giuseppe Serazzi,et al. Computer virus propagation models , 2004 .
[28] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.