메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1503-1511

Defending mobile phones from proximity malware

Author keywords

[No Author keywords available]

Indexed keywords

AGGREGATED NETWORKS; ANOMALOUS BEHAVIOR; COMMUNICATION MECHANISMS; EPIDEMIC MODELS; GLOBAL DYNAMICS; MALWARE DETECTION; MALWARE PROPAGATION; MALWARES; MOBILITY MODEL; NETWORK DEFENSE; REAL-WORLD; UNIVERSITY CAMPUS;

EID: 70349663942     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062067     Document Type: Conference Paper
Times cited : (44)

References (22)
  • 2
    • 57349123036 scopus 로고    scopus 로고
    • Can you infect me now?: Malware propagation in mobile phone networks
    • C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, and A. Mehes, "Can you infect me now?: malware propagation in mobile phone networks," in WORM '07, 2007, pp. 61-68.
    • (2007) WORM '07 , pp. 61-68
    • Fleizach, C.1    Liljenstam, M.2    Johansson, P.3    Voelker, G.M.4    Mehes, A.5
  • 3
    • 70349716352 scopus 로고    scopus 로고
    • F-Secure, F-Secure Virus Information Pages: Cabir, http://www.f-secure.com/v-descs/cabir.shtml.
    • F-Secure, "F-Secure Virus Information Pages: Cabir," http://www.f-secure.com/v-descs/cabir.shtml.
  • 5
  • 11
    • 50049087364 scopus 로고    scopus 로고
    • On mobile viruses exploiting messaging and bluetooth services
    • Baltimore, MD, Aug
    • A. Bose and K. G. Shin, "On mobile viruses exploiting messaging and bluetooth services," in Securecomm, Baltimore, MD, Aug. 2006.
    • (2006) Securecomm
    • Bose, A.1    Shin, K.G.2
  • 14
    • 57349125651 scopus 로고    scopus 로고
    • Behavioral Detection of Malware on Mobile Handsets
    • Jun
    • A. Bose, X. Hu, K. G. Shin, and T. Park, "Behavioral Detection of Malware on Mobile Handsets," in Proc. of MobiSys, Jun. 2008.
    • (2008) Proc. of MobiSys
    • Bose, A.1    Hu, X.2    Shin, K.G.3    Park, T.4
  • 15
  • 17
    • 70349717795 scopus 로고    scopus 로고
    • C. J. Rhodes and M. Nekovee, The opportunistic transmission of wireless worms between mobile devices, http://arxiv.org/abs/0802.2685, Last accessed 2008-04-09, 2008.
    • C. J. Rhodes and M. Nekovee, "The opportunistic transmission of wireless worms between mobile devices," http://arxiv.org/abs/0802.2685, Last accessed 2008-04-09, 2008.
  • 18
    • 38649083121 scopus 로고    scopus 로고
    • An epidemic model of mobile phone virus
    • Jan
    • H. Zheng, D. Li, and Z. Gao, "An epidemic model of mobile phone virus," in Proc. of SPCA'06, Jan. 2006.
    • (2006) Proc. of SPCA'06
    • Zheng, H.1    Li, D.2    Gao, Z.3
  • 19
    • 44849122540 scopus 로고    scopus 로고
    • Understanding individual human mobility patterns
    • M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabási, "Understanding individual human mobility patterns," Nature, vol. 453, pp. 779-782, 2008.
    • (2008) Nature , vol.453 , pp. 779-782
    • Gonzalez, M.C.1    Hidalgo, C.A.2    Barabási, A.-L.3
  • 20
    • 70349711779 scopus 로고    scopus 로고
    • D. J. Daley and J. Gani, Epidemic Modelling: An Introduction. Cambridge University Press, Studies in Mathematical Biology, 1999.
    • D. J. Daley and J. Gani, Epidemic Modelling: An Introduction. Cambridge University Press, Studies in Mathematical Biology, 1999.
  • 21
    • 70349721171 scopus 로고    scopus 로고
    • White worms don't work
    • Dec
    • N. Weaver and D. Ellis, "White worms don't work,"; logim, Dec. 2006.
    • (2006) logim
    • Weaver, N.1    Ellis, D.2
  • 22
    • 70349725689 scopus 로고    scopus 로고
    • 3GPP, Multimedia Broadcast Multicast Service
    • 3GPP, "Multimedia Broadcast Multicast Service," http://www.3gpp.org/ftp/Specs/archive/23-series/23.246.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.