Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks
暂无分享,去创建一个
[1] Eitan Altman,et al. Optimal Quarantining of Wireless Malware Through Reception Gain Control , 2012, IEEE Transactions on Automatic Control.
[2] Guo Jiajia. Modeling the SARS Epidemic Considering Self-cure , 2003 .
[3] Jie Wu,et al. CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[4] Kang G. Shin,et al. On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.
[5] Maziar Nekovee,et al. Worm epidemics in wireless ad hoc networks , 2007, ArXiv.
[6] Maziar Nekovee,et al. The Opportunistic Transmission of Wireless Worms between Mobile Devices , 2008, ArXiv.
[7] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[9] Gao Bao-jun. A Heterogeneous Cellular Automata Model for SARS Transmission , 2006 .
[10] Vasileios Karyotis,et al. Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis , 2008, Journal of Computer Science and Technology.
[11] Guanhua Yan,et al. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.
[12] Brian L. Mark,et al. Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.
[13] K. Abbas,et al. MODELING INFECTIOUS DISEASES USING GLOBAL STOCHASTIC CELLULAR AUTOMATA , 2005 .
[14] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[15] Wang Suo-ping. A Discrete Probabilistic Model of Malware Propagation , 2010 .
[16] Jiang Guoping,et al. Research of malware propagation in complex networks based on 1-D cellular automata , 2009 .
[17] Margaret Tan,et al. An Investigation of Bluetooth Security Threats , 2011, 2011 International Conference on Information Science and Applications.
[18] Ángel Martín del Rey,et al. Modeling epidemics using cellular automata , 2006, Applied Mathematics and Computation.