메뉴 건너뛰기




Volumn , Issue , 2010, Pages 408-418

Dynamic malware attack in energy-constrained mobile wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

ATTACK STRATEGIES; CONSTRAINED RESOURCES; ENERGY-CONSTRAINED; MALWARE ATTACKS; MALWARES; MOBILE WIRELESS NETWORK; OPTIMAL CONTROL PROBLEM; OPTIMAL SOLUTIONS; OPTIMUM SOLUTION; PONTRYAGIN'S MAXIMUM PRINCIPLE; SCANNING RATE; SECURITY MEASURE; TRANSMISSION RANGES; WIRELESS TECHNOLOGIES;

EID: 77952698946     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITA.2010.5454093     Document Type: Conference Paper
Times cited : (14)

References (48)
  • 1
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003.
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 2
    • 33644591555 scopus 로고    scopus 로고
    • Wireless security threat taxonomy
    • IEEE Systems, Man and Cybernetics Society
    • D. Welch and S. Lathrop, "Wireless security threat taxonomy," in Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 76-83, 2003.
    • (2003) Information Assurance Workshop, 2003 , pp. 76-83
    • Welch, D.1    Lathrop, S.2
  • 12
    • 77952737301 scopus 로고    scopus 로고
    • Symantec, 02.13
    • Symantec, "W32.sqlexp.worm," (02.13.2007).
    • (2007) W32.sqlexp.worm
  • 19
    • 67650642299 scopus 로고    scopus 로고
    • Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications
    • B. Sun, G. Yan, Y. Xiao, and T. Andrew Yang, "Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications," Ad Hoc Networks, 2009.
    • (2009) Ad Hoc Networks
    • Sun, B.1    Yan, G.2    Xiao, Y.3    Andrew Yang, T.4
  • 21
    • 1842815887 scopus 로고    scopus 로고
    • Security in mobile ad hoc networks: Challenges and solutions
    • H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile ad hoc networks: challenges and solutions," IEEE Wireless Communications, vol. 11, no. 1, pp. 38-47, 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 32
    • 14944368398 scopus 로고    scopus 로고
    • Worm propagation modeling and analysis under dynamic quarantine defense
    • ACM New York, NY, USA
    • C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," in Proceedings of the 2003 ACM workshop on rapid malcode, pp. 51-60, ACM New York, NY, USA, 2003.
    • (2003) Proceedings of the 2003 ACM Workshop on Rapid Malcode , pp. 51-60
    • Zou, C.1    Gong, W.2    Towsley, D.3
  • 36
    • 14944368398 scopus 로고    scopus 로고
    • Worm propagation modeling and analysis under dynamic quarantine defense
    • ACM New York, NY, USA
    • C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," in Proceedings of the 2003 ACM workshop on Rapid Malcode, pp. 51-60, ACM New York, NY, USA, 2003.
    • (2003) Proceedings of the 2003 ACM Workshop on Rapid Malcode , pp. 51-60
    • Zou, C.1    Gong, W.2    Towsley, D.3
  • 37
    • 34247478945 scopus 로고    scopus 로고
    • Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework
    • V. Karyotis and S. Papavassiliou, "Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework," Computer Networks, vol. 51, no. 9, pp. 2397-2410, 2007.
    • (2007) Computer Networks , vol.51 , Issue.9 , pp. 2397-2410
    • Karyotis, V.1    Papavassiliou, S.2
  • 38
    • 39449122187 scopus 로고    scopus 로고
    • Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model
    • X. Yan and Y. Zou, "Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model," ETRI JOURNAL, vol. 30, no. 1, p. 81, 2008.
    • (2008) ETRI JOURNAL , vol.30 , Issue.1 , pp. 81
    • Yan, X.1    Zou, Y.2
  • 40
    • 77953320145 scopus 로고    scopus 로고
    • Maximum Damage Malware Attack in Mobile Wireless Networks
    • To appear in
    • M. Khouzani, S. Sarkar, and E. Altman, "Maximum Damage Malware Attack in Mobile Wireless Networks," To appear in Infocom 2010.
    • (2010) Infocom
    • Khouzani, M.1    Sarkar, S.2    Altman, E.3
  • 41
    • 0003259121 scopus 로고    scopus 로고
    • Mobility modeling in wireless networks: Categorization, smooth movement, and border effects
    • C. Bettstetter, "Mobility modeling in wireless networks: categorization, smooth movement, and border effects," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 5, no. 3, pp. 55-66, 2001.
    • (2001) ACM SIGMOBILE Mobile Computing and Communications Review , vol.5 , Issue.3 , pp. 55-66
    • Bettstetter, C.1
  • 42
    • 24144497473 scopus 로고    scopus 로고
    • The message delay in mobile ad hoc networks
    • R. Groenevelt, P. Nain, and G. Koole, "The message delay in mobile ad hoc networks," Performance Evaluation, vol. 62, no. 1-4, pp. 210-228, 2005.
    • (2005) Performance Evaluation , vol.62 , Issue.1-4 , pp. 210-228
    • Groenevelt, R.1    Nain, P.2    Koole, G.3
  • 45
    • 0002232633 scopus 로고
    • Solutions of ordinary differential equations as limits of pure jump Markov processes
    • T. Kurtz, "Solutions of ordinary differential equations as limits of pure jump Markov processes," Journal of Applied Probability, pp. 49-58, 1970.
    • (1970) Journal of Applied Probability , pp. 49-58
    • Kurtz, T.1
  • 47
    • 80053647353 scopus 로고    scopus 로고
    • VACCINE: War of the worms in wired and wireless networks
    • S. Tanachaiwiwat and A. Helmy, "VACCINE: War of the worms in wired and wireless networks," in IEEE INFOCOM, pp. 05-859, 2006.
    • (2006) IEEE INFOCOM , pp. 05-859
    • Tanachaiwiwat, S.1    Helmy, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.