An agent-based modeling framework for cybersecurity in mobile tactical networks
暂无分享,去创建一个
[1] Brian Thompson,et al. The impact of hierarchy on bluetooth-based malware spread in mobile tactical networks , 2016, SummerSim.
[2] M. Rajesh Babu,et al. Lightweight Vigilant procedure to Implement Security Measures in Highly Roving Military Operations , 2013, J. Comput. Sci..
[3] Michael J. North,et al. Complex adaptive systems modeling with Repast Simphony , 2013, Complex Adapt. Syst. Model..
[4] Robert G. Cole. Initial Studies on Worm Propagation in Manets for Future Army Combat Systems , 2004 .
[5] Xiaoyan Hong,et al. A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.
[6] Mikko Hypponen,et al. Malware goes mobile. , 2006, Scientific American.
[7] A. Barabasi,et al. Halting viruses in scale-free networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[8] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[9] Brian D. Noble,et al. Modeling epidemic spreading in mobile environments , 2005, WiSe '05.
[10] Stefano Zanero,et al. Studying Bluetooth Malware Propagation: The BlueBag Project , 2007, IEEE Security & Privacy.
[11] Brian D. Noble,et al. Analytical Models for Epidemics in Mobile Networks , 2007 .
[12] Brian Thompson,et al. Identifying Key Cyber-Physical Terrain , 2017, IWSPA@CODASPY.
[13] P. Kaye. Infectious diseases of humans: Dynamics and control , 1993 .
[14] Volkan Rodoplu,et al. TraJECT-3D: Generating realistic mobility traces for tactical network simulation , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[15] John Paul Dunning,et al. Taming the Blue Beast: A Survey of Bluetooth Based Threats , 2010, IEEE Security & Privacy.
[16] Eduard Heindl,et al. Understanding the spreading patterns of mobile phone viruses , 2012 .
[17] W. O. Kermack,et al. A contribution to the mathematical theory of epidemics , 1927 .
[18] Marius S. Vassiliou,et al. Practical Considerations for Use of Mobile Apps at the Tactical Edge , 2014 .
[19] Stefan Saroiu,et al. A preliminary investigation of worm infections in a bluetooth environment , 2006, WORM '06.
[20] Madhav V. Marathe,et al. EpiNet: a simulation framework to study the spread of malware in wireless networks , 2009, SIMUTools 2009.
[21] Peter C. Mason,et al. Mitigating Security Threats in Tactical Networks , 2010 .
[22] Prabhakar L. Ramteke,et al. MANET : History , Challenges And Applications , 2013 .
[23] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[24] Bruce Lowekamp,et al. A structured group mobility model for the simulation of mobile ad hoc networks , 2004, MobiWac '04.
[25] Nam C. Phamdo,et al. Requirements on worm mitigation technologies in MANETS , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).
[26] Muttukrishnan Rajarajan,et al. Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.
[27] Brian Thompson,et al. Slowing the spread of Bluetooth-based malware in mobile tactical networks , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[28] A. G. McKendrick,et al. XLV.—The Rate of Multiplication of Micro-organisms: A Mathematical Study , 1912 .
[29] Mazleena Salleh,et al. Preventing collusion attack in android , 2015, Int. Arab J. Inf. Technol..
[30] Alessandro Vespignani,et al. Epidemic spreading in complex networks with degree correlations , 2003, cond-mat/0301149.
[31] Marco Fiore,et al. Worm Epidemics in Vehicular Networks , 2015, IEEE Transactions on Mobile Computing.
[32] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[33] Michalis Faloutsos,et al. Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point , 2011, Networking.