-
1
-
-
0042474227
-
Modeling the spread of active worms
-
Miami, FL, April
-
Chen, Z., Gao, L. and Kwiat, K. (2003) ‘Modeling the spread of active worms’, Proceedings of the 22nd IEEE Conference on Computer Communications (INFOCOM), Miami, FL, April, Vol. III, pp.1890–1900.
-
(2003)
Proceedings of the 22nd IEEE Conference on Computer Communications (INFOCOM)
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
2
-
-
84952959601
-
-
F-secure website (2004) Available at: http://www.f-secure.com/v-descs/cabir.shtml.
-
(2004)
-
-
F-secure website1
-
3
-
-
25844439630
-
The effect of network topology on the spread of epidemics
-
Miami, FL, March
-
Ganesh, A., Massoulie, L. and Towsley, D. (2005) ‘The effect of network topology on the spread of epidemics’, Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM), Miami, FL, March, Vol. II, pp.1455–1466.
-
(2005)
Proceedings of the 24th IEEE Conference on Computer Communications (INFOCOM)
, vol.2
, pp. 1455-1466
-
-
Ganesh, A.1
Massoulie, L.2
Towsley, D.3
-
4
-
-
25844514251
-
Monotone percolation and the topology control of wireless networks
-
Miami, FL, March
-
Jiang, A. and Bruck, J. (2005) ‘Monotone percolation and the topology control of wireless networks’, Proceedings of the 24th 1EEE Conference on Computer Communications (INFOCOM), Miami, FL, March, Vol. I, pp.327–338.
-
(2005)
Proceedings of the 24th 1EEE Conference on Computer Communications (INFOCOM)
, vol.1
, pp. 327-338
-
-
Jiang, A.1
Bruck, J.2
-
5
-
-
34547370413
-
-
Master’s Thesis, School of Engineering & Applied Sciences, University of Pennsylvania, Philadelphia, PA, August
-
Karyotis, V.A. (2005) ‘A base case study of the worm propagation problem in the framework of topology control in wireless ad-hoc networks’, Master’s Thesis, School of Engineering & Applied Sciences, University of Pennsylvania, Philadelphia, PA, August.
-
(2005)
A base case study of the worm propagation problem in the framework of topology control in wireless ad-hoc networks
-
-
Karyotis, V.A.1
-
8
-
-
25644450392
-
Perfect simulation and stationarity of a class of mobility models
-
Miami, FL, March
-
Le Boudec, J-Y. and Vojnovic, M. (2005) ‘Perfect simulation and stationarity of a class of mobility models’, Proceedings of the 24th 1EEE Conference on Computer Communications (INFOCOM), Miami, FL, March, Vol. IV, pp.2743–2754.
-
(2005)
Proceedings of the 24th 1EEE Conference on Computer Communications (INFOCOM)
, vol.4
, pp. 2743-2754
-
-
Le Boudec, J.-Y.1
Vojnovic, M.2
-
9
-
-
0037297684
-
Sexual networks: implications for the transmission of sexually transmitted infections
-
Liljeros, F., Edling, C.R. and Amaral, L.A.N. (2003) ‘Sexual networks: implications for the transmission of sexually transmitted infections’, Microbes and Infection, June, pp.189–196.
-
(2003)
Microbes and Infection
, vol.June
, pp. 189-196
-
-
Liljeros, F.1
Edling, C.R.2
Amaral, L.A.N.3
-
11
-
-
0345851235
-
Wireless integrated network sensors
-
Pottie, G.J. and Kaiser, W.J. (2000) ‘Wireless integrated network sensors’, Communications of the ACM, Vol. 43, No. 5, pp.51–58.
-
(2000)
Communications of the ACM
, vol.43
, Issue.5
, pp. 51-58
-
-
Pottie, G.J.1
Kaiser, W.J.2
-
13
-
-
33748372756
-
Stochastic behavior of random constant scanning worms
-
October, San Diego, CA
-
Rohloff, K.R. and Basar, T. (2005) ‘Stochastic behavior of random constant scanning worms’, Proceedings of the 14th 1nternational Conference on Computer Communications and Networks (1CCCN), October, San Diego, CA, pp.339–344.
-
(2005)
Proceedings of the 14th 1nternational Conference on Computer Communications and Networks (1CCCN)
, pp. 339-344
-
-
Rohloff, K.R.1
Basar, T.2
-
14
-
-
80053647353
-
VACCINE: war of the worms in wired and wireless networks
-
University of Southern California, Los Angeles, USA, July
-
Tanachaiwiwat, S. and Helmy, A. (2005) ‘VACCINE: war of the worms in wired and wireless networks’, Technical Report, University of Southern California, Los Angeles, USA, July.
-
(2005)
Technical Report
-
-
Tanachaiwiwat, S.1
Helmy, A.2
-
15
-
-
27644462218
-
Epidemic spreading in real networks: an eigenvalue approach
-
Florence, Italy, October
-
Wang, Y., Chakrabarti, D., Wang, C. and Faloutsos, C. (2003) ‘Epidemic spreading in real networks: an eigenvalue approach’, Proceedings of the 22nd Symposium on Reliable Distributed Computing, Florence, Italy, October.
-
(2003)
Proceedings of the 22nd Symposium on Reliable Distributed Computing
-
-
Wang, Y.1
Chakrabarti, D.2
Wang, C.3
Faloutsos, C.4
-
16
-
-
0035009294
-
Distributed topology control for power efficient operation in multihop wireless ad hoc networks
-
Anchorage, AL, April
-
Wattenhofer, R., Li, L., Bahl, P. and Wang, Y-M. (2001) ‘Distributed topology control for power efficient operation in multihop wireless ad hoc networks’, Proceedings of 20th 1EEE Conference on Computer Communications (INFOCOM), Anchorage, AL, April, Vol. III, pp.1388–1397.
-
(2001)
Proceedings of 20th 1EEE Conference on Computer Communications (INFOCOM)
, vol.3
, pp. 1388-1397
-
-
Wattenhofer, R.1
Li, L.2
Bahl, P.3
Wang, Y.-M.4
-
17
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Washington, DC
-
Zou, C.C., Gong, W. and Towsley, D. (2002) ‘Code red worm propagation modeling and analysis’, Proceedings of the Ninth ACM Conference on Computer and Communications (ACM CCS), Washington, DC, pp.138–147.
-
(2002)
Proceedings of the Ninth ACM Conference on Computer and Communications (ACM CCS)
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
18
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
Washington, DC
-
Zou, C.C., Gong, W. and Towsley, D. (2003) ‘Worm propagation modeling and analysis under dynamic quarantine defense’, First ACM Workshop on Rapid Malcode (WORM), Washington, DC.
-
(2003)
First ACM Workshop on Rapid Malcode (WORM)
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
19
-
-
14944350556
-
Email virus propagation modeling and analysis
-
University of Massachusetts, Amherst, MA
-
Zou, C.C., Towsley, D. and Gong, W. (2004) ‘Email virus propagation modeling and analysis’, Technical Report TR-CSE-03-04, University of Massachusetts, Amherst, MA.
-
(2004)
Technical Report TR-CSE-03-04
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
20
-
-
84952963988
-
-
In addition, this justifies the fact that a malicious node usually has a higher probability to infect other network nodes compared to the infection capability of already infected network nodes
-
In addition, this justifies the fact that a malicious node usually has a higher probability to infect other network nodes compared to the infection capability of already infected network nodes.
-
-
-
-
21
-
-
84952960224
-
-
Since the deployment region is fixed, the node density is proportional to the number of network nodes
-
Since the deployment region is fixed, the node density is proportional to the number of network nodes.
-
-
-
|