-
1
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
2
-
-
33644591555
-
Wireless security threat taxonomy
-
IEEE Systems, Man and Cybernetics Society
-
D. Welch and S. Lathrop, "Wireless security threat taxonomy," in Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 76-83, 2003.
-
(2003)
Information Assurance Workshop, 2003
, pp. 76-83
-
-
Welch, D.1
Lathrop, S.2
-
3
-
-
85001799494
-
An ontology of information security
-
A. Herzog, N. Shahmehri, and C. Duma, "An ontology of information security," International Journal of Information Security and Privacy, vol. 1, no. 4, pp. 1-23, 2007.
-
(2007)
International Journal of Information Security and Privacy
, vol.1
, Issue.4
, pp. 1-23
-
-
Herzog, A.1
Shahmehri, N.2
Duma, C.3
-
4
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm," IEEE Security & Privacy, vol. 1, no. 4, pp. 33-39, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
5
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
ACM New York, NY, USA
-
C. Zou, W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in Proceedings of the 9th ACM conference on Computer and communications security, pp. 138-147, ACM New York, NY, USA, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 138-147
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
6
-
-
33746896615
-
Open problems in computer virology
-
E. Filiol, M. Helenius, and S. Zanero, "Open problems in computer virology," Journal in Computer Virology, vol. 1, no. 3, pp. 55-66, 2006.
-
(2006)
Journal in Computer Virology
, vol.1
, Issue.3
, pp. 55-66
-
-
Filiol, E.1
Helenius, M.2
Zanero, S.3
-
8
-
-
84947273682
-
The sybil attack
-
Revised Papers
-
J. Douceur, "The sybil attack," in Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers, pp. 251-260.
-
Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002
, pp. 251-260
-
-
Douceur, J.1
-
9
-
-
85037175440
-
Wireless sensor network security: A survey
-
J. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey," Security in Distributed, Grid, Mobile, and Pervasive Computing, p. 367, 2007.
-
(2007)
Security in Distributed, Grid, Mobile, and Pervasive Computing
, pp. 367
-
-
Walters, J.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
10
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm," IEEE Security & Privacy, vol. 1, no. 4, pp. 33-39, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
11
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio: USENIX Press
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks," in Proceedings of the 7th USENIX Security Conference, vol. 78, San Antonio: USENIX Press, 1998.
-
(1998)
Proceedings of the 7th USENIX Security Conference
, vol.78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
12
-
-
77952737301
-
-
Symantec, 02.13
-
Symantec, "W32.sqlexp.worm," (02.13.2007).
-
(2007)
W32.sqlexp.worm
-
-
-
17
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, "A social network based patching scheme for worm containment in cellular networks," IEEE INFOCOM, Rio de Janeiro, Brazil, 2009.
-
IEEE INFOCOM, Rio de Janeiro, Brazil, 2009
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjan, S.4
Nucci, A.5
-
18
-
-
57349091683
-
Improving sensor network immunity under worm attacks: A software diversity approach
-
ACM New York, NY, USA
-
Y. Yang, S. Zhu, and G. Cao, "Improving sensor network immunity under worm attacks: a software diversity approach," in Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, pp. 149-158, ACM New York, NY, USA, 2008.
-
(2008)
Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 149-158
-
-
Yang, Y.1
Zhu, S.2
Cao, G.3
-
19
-
-
67650642299
-
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications
-
B. Sun, G. Yan, Y. Xiao, and T. Andrew Yang, "Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications," Ad Hoc Networks, 2009.
-
(2009)
Ad Hoc Networks
-
-
Sun, B.1
Yan, G.2
Xiao, Y.3
Andrew Yang, T.4
-
20
-
-
57349123036
-
Can you infect me now?: Malware propagation in mobile phone networks
-
ACM New York, NY, USA
-
C. Fleizach, M. Liljenstam, P. Johansson, G. Voelker, and A. Mehes, "Can you infect me now?: malware propagation in mobile phone networks," in Proceedings of the 2007 ACM workshop on Recurring malcode, pp. 61-68, ACM New York, NY, USA, 2007.
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.4
Mehes, A.5
-
21
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," IEEE Wireless Communications, vol. 11, no. 1, pp. 38-47, 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
22
-
-
34247390110
-
Proactive security for mobile messaging networks
-
ACM New York, NY, USA
-
A. Bose and K. Shin, "Proactive security for mobile messaging networks," in Proceedings of the 5th ACM workshop on Wireless security, pp. 95-104, ACM New York, NY, USA, 2006.
-
(2006)
Proceedings of the 5th ACM Workshop on Wireless Security
, pp. 95-104
-
-
Bose, A.1
Shin, K.2
-
24
-
-
47749123301
-
Vulnerabilities in epidemic forwarding
-
A. El Fawal, J. Le Boudec, and K. Salamatian, "Vulnerabilities in epidemic forwarding," in IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007, pp. 1-6, 2007.
-
(2007)
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007
, pp. 1-6
-
-
El Fawal, A.1
Le Boudec, J.2
Salamatian, K.3
-
26
-
-
0026156688
-
Directed-graph epidemiological models of computer viruses
-
J. Kephart, S. White, I. Center, and Y. Heights, "Directed-graph epidemiological models of computer viruses," in Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on, pp. 343-359, 1991.
-
(1991)
Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on
, pp. 343-359
-
-
Kephart, J.1
White, S.2
Center, I.3
Heights, Y.4
-
27
-
-
0027150413
-
Measuring and modeling computer virus prevalence
-
J. Kephart, S. White, I. Center, and Y. Heights, "Measuring and modeling computer virus prevalence," in Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer Society Symposium on, pp. 2-15, 1993.
-
(1993)
Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer Society Symposium on
, pp. 2-15
-
-
Kephart, J.1
White, S.2
Center, I.3
Heights, Y.4
-
28
-
-
84943680959
-
Computers and epidemiology
-
J. Kephart, S. White, D. Chess, I. Center, and N. Hawthorne, "Computers and epidemiology," Spectrum, IEEE, vol. 30, no. 5, pp. 20-26, 1993.
-
(1993)
Spectrum, IEEE
, vol.30
, Issue.5
, pp. 20-26
-
-
Kephart, J.1
White, S.2
Chess, D.3
Center, I.4
Hawthorne, N.5
-
29
-
-
85084162258
-
How to 0wn the Internet in Your Spare Time
-
C. Staniford, V. Paxson, and N. Weaver, "How to 0wn the Internet in Your Spare Time," in Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, 2002.
-
Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, 2002
-
-
Staniford, C.1
Paxson, V.2
Weaver, N.3
-
30
-
-
18844395616
-
Experiences with worm propagation simulations
-
ACM New York, NY, USA
-
A. Wagner, T. Dübendorfer, B. Plattner, and R. Hiestand, "Experiences with worm propagation simulations," in Proceedings of the 2003 ACM workshop on Rapid malcode, pp. 34-41, ACM New York, NY, USA, 2003.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 34-41
-
-
Wagner, A.1
Dübendorfer, T.2
Plattner, B.3
Hiestand, R.4
-
32
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
ACM New York, NY, USA
-
C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," in Proceedings of the 2003 ACM workshop on rapid malcode, pp. 51-60, ACM New York, NY, USA, 2003.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 51-60
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
34
-
-
24144441166
-
Coupled Kermack-Mckendrick models for randomly scanning and bandwidth saturating Internet worms
-
Springer
-
G. Kesidis, I. Hamadeh, and S. Jiwasurat, "Coupled Kermack-Mckendrick models for randomly scanning and bandwidth saturating Internet worms," in Proceedings of 3rd International Workshop on QoS in Multiservice IP Networks (QoS-IP, pp. 101-109, Springer, 2005.
-
(2005)
Proceedings of 3rd International Workshop on QoS in Multiservice IP Networks QoS-IP
, pp. 101-109
-
-
Kesidis, G.1
Hamadeh, I.2
Jiwasurat, S.3
-
36
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
ACM New York, NY, USA
-
C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," in Proceedings of the 2003 ACM workshop on Rapid Malcode, pp. 51-60, ACM New York, NY, USA, 2003.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 51-60
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
37
-
-
34247478945
-
Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework
-
V. Karyotis and S. Papavassiliou, "Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework," Computer Networks, vol. 51, no. 9, pp. 2397-2410, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.9
, pp. 2397-2410
-
-
Karyotis, V.1
Papavassiliou, S.2
-
38
-
-
39449122187
-
Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model
-
X. Yan and Y. Zou, "Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model," ETRI JOURNAL, vol. 30, no. 1, p. 81, 2008.
-
(2008)
ETRI JOURNAL
, vol.30
, Issue.1
, pp. 81
-
-
Yan, X.1
Zou, Y.2
-
40
-
-
77953320145
-
Maximum Damage Malware Attack in Mobile Wireless Networks
-
To appear in
-
M. Khouzani, S. Sarkar, and E. Altman, "Maximum Damage Malware Attack in Mobile Wireless Networks," To appear in Infocom 2010.
-
(2010)
Infocom
-
-
Khouzani, M.1
Sarkar, S.2
Altman, E.3
-
41
-
-
0003259121
-
Mobility modeling in wireless networks: Categorization, smooth movement, and border effects
-
C. Bettstetter, "Mobility modeling in wireless networks: categorization, smooth movement, and border effects," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 5, no. 3, pp. 55-66, 2001.
-
(2001)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.5
, Issue.3
, pp. 55-66
-
-
Bettstetter, C.1
-
42
-
-
24144497473
-
The message delay in mobile ad hoc networks
-
R. Groenevelt, P. Nain, and G. Koole, "The message delay in mobile ad hoc networks," Performance Evaluation, vol. 62, no. 1-4, pp. 210-228, 2005.
-
(2005)
Performance Evaluation
, vol.62
, Issue.1-4
, pp. 210-228
-
-
Groenevelt, R.1
Nain, P.2
Koole, G.3
-
43
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
ACM
-
H. Kim, J. Smith, and K. Shin, "Detecting energy-greedy anomalies and mobile malware variants," in Proceeding of the 6th international conference on Mobile systems, applications, and services, pp. 239-252, ACM, 2008.
-
(2008)
Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.3
-
44
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
ACM
-
A. Bose, X. Hu, K. Shin, and T. Park, "Behavioral detection of malware on mobile handsets," in Proceeding of the 6th international conference on Mobile systems, applications, and services, pp. 225-238, ACM, 2008.
-
(2008)
Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.3
Park, T.4
-
45
-
-
0002232633
-
Solutions of ordinary differential equations as limits of pure jump Markov processes
-
T. Kurtz, "Solutions of ordinary differential equations as limits of pure jump Markov processes," Journal of Applied Probability, pp. 49-58, 1970.
-
(1970)
Journal of Applied Probability
, pp. 49-58
-
-
Kurtz, T.1
-
47
-
-
80053647353
-
VACCINE: War of the worms in wired and wireless networks
-
S. Tanachaiwiwat and A. Helmy, "VACCINE: War of the worms in wired and wireless networks," in IEEE INFOCOM, pp. 05-859, 2006.
-
(2006)
IEEE INFOCOM
, pp. 05-859
-
-
Tanachaiwiwat, S.1
Helmy, A.2
|