Containing smartphone worm propagation with an influence maximization algorithm
暂无分享,去创建一个
Min Wu | Sancheng Peng | Shui Yu | Guojun Wang | Shui Yu | Guojun Wang | Sancheng Peng | Min Wu
[1] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[2] Guanhua Yan,et al. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.
[3] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[4] Masahiro Kimura,et al. Efficient discovery of influential nodes for SIS models in social networks , 2011, Knowledge and Information Systems.
[5] Sencun Zhu,et al. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.
[6] Sencun Zhu,et al. Designing System-Level Defenses against Cellphone Malware , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.
[7] Pablo A. Estévez,et al. Selecting the Most Influential Nodes in Social Networks , 2007, 2007 International Joint Conference on Neural Networks.
[8] Sencun Zhu,et al. A systematic approach for cell-phone worm containment , 2008, WWW.
[9] Geoffrey M. Voelker,et al. Can you infect me now?: malware propagation in mobile phone networks , 2007, WORM '07.
[10] P. Coulton,et al. Mobile phone vulnerabilities: a new generation of malware , 2004, IEEE International Symposium on Consumer Electronics, 2004.
[11] Weijia Jia,et al. Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[12] Jingyu Zhou,et al. Preference-based mining of top-K influential nodes in social networks , 2014, Future Gener. Comput. Syst..
[13] Dong Li,et al. An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.
[14] Sancheng Peng,et al. Modeling Malware Propagation in Smartphone Social Networks , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[15] Jingyu Zhou,et al. Preference-Based Top-K Influential Nodes Mining in Social Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[16] William H. Sanders,et al. Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[17] Ning Zhong,et al. Network Immunization with Distributed Autonomy-Oriented Entities , 2011, IEEE Transactions on Parallel and Distributed Systems.
[18] Florian Probst,et al. Who will lead and who will follow: Identifying Influential Users in Online Social Networks , 2013, Business & Information Systems Engineering.
[19] Xiaodong Liu,et al. IMGPU: GPU-Accelerated Influence Maximization in Large-Scale Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[20] Y. Narahari,et al. A Shapley Value-Based Approach to Discover Influential Nodes in Social Networks , 2011, IEEE Transactions on Automation Science and Engineering.
[21] Jiming Liu,et al. Modeling and predicting the dynamics of mobile virus spread affected by human behavior , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[22] Michael R. Lyu,et al. Mining social networks using heat diffusion processes for marketing candidates selection , 2008, CIKM '08.
[23] Binshan Lin,et al. Security aspects of mobile phone virus: a critical survey , 2008, Ind. Manag. Data Syst..
[24] Jiming Liu,et al. Modeling and Restraining Mobile Virus Propagation , 2013, IEEE Transactions on Mobile Computing.
[25] Geoffrey M. Voelker,et al. Defending Mobile Phones from Proximity Malware , 2009, IEEE INFOCOM 2009.
[26] Masahiro Kimura,et al. Extracting Influential Nodes for Information Diffusion on a Social Network , 2007, AAAI.
[27] Matthew Richardson,et al. Mining the network value of customers , 2001, KDD '01.
[28] Sancheng Peng,et al. Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones , 2013, J. Comput. Syst. Sci..
[29] Sancheng Peng,et al. Smartphone Malware and Its Propagation Modeling: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[30] Yitong Wang,et al. A Potential-Based Node Selection Strategy for Influence Maximization in a Social Network , 2009, ADMA.
[31] Min Wu,et al. Propagation model of smartphone worms based on semi-Markov process and social relationship graph , 2014, Comput. Secur..
[32] Cecilia Mascolo,et al. Exploiting temporal complex network metrics in mobile malware containment , 2010, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[33] Jie Wu,et al. CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[34] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[35] San Cheng Peng. A Survey on Malware Containment Models in Smartphones , 2012 .
[36] Wei Chen,et al. Efficient influence maximization in social networks , 2009, KDD.
[37] Sancheng Peng,et al. Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[38] Cecilia Mascolo,et al. STOP: Socio-Temporal Opportunistic Patching of short range mobile malware , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[39] Yu Wang,et al. Community-based greedy algorithm for mining top-K influential nodes in mobile social networks , 2010, KDD.
[40] Kang G. Shin,et al. Proactive security for mobile messaging networks , 2006, WiSe '06.