-
1
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Networks, vol. 1, no. 2-3, pp. 293-315, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
2
-
-
33644591555
-
Wireless security threat taxonomy
-
D. Welch and S. Lathrop, "Wireless security threat taxonomy," in Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 76-83, 2003.
-
(2003)
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
, pp. 76-83
-
-
Welch, D.1
Lathrop, S.2
-
3
-
-
85001799494
-
An ontology of information security
-
A. Herzog, N. Shahmehri, and C. Duma, "An ontology of information security," International Journal of Information Security and Privacy, vol. 1, no. 4, pp. 1-23, 2007.
-
(2007)
International Journal of Information Security and Privacy
, vol.1
, Issue.4
, pp. 1-23
-
-
Herzog, A.1
Shahmehri, N.2
Duma, C.3
-
4
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm," IEEE Security & Privacy, vol. 1, no. 4, pp. 33-39, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
5
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
ACM New York, NY, USA
-
C. Zou, W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in Proceedings of the 9th ACM conference on Computer and communications security, pp. 138-147, ACM New York, NY, USA, 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 138-147
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
6
-
-
33746896615
-
Open problems in computer virology
-
E. Filiol, M. Helenius, and S. Zanero, "Open problems in computer virology," Journal in Computer Virology, vol. 1, no. 3, pp. 55-66, 2006.
-
(2006)
Journal in Computer Virology
, vol.1
, Issue.3
, pp. 55-66
-
-
Filiol, E.1
Helenius, M.2
Zanero, S.3
-
8
-
-
84947273682
-
The sybil attack
-
Revised Papers
-
J. Douceur, "The sybil attack," in Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers, pp. 251-260.
-
Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002
, pp. 251-260
-
-
Douceur, J.1
-
9
-
-
85037175440
-
Wireless sensor network security: A survey
-
J.Walters, Z. Liang,W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey," Security in Distributed, Grid, Mobile, and Pervasive Computing, p. 367, 2007.
-
(2007)
Security in Distributed, Grid, Mobile, and Pervasive Computing
, pp. 367
-
-
Walters, J.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
11
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio: USENIX Press
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks," in Proceedings of the 7th USENIX Security Conference, vol. 78, San Antonio: USENIX Press, 1998.
-
(1998)
Proceedings of the 7th USENIX Security Conference
, vol.78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
12
-
-
77952737301
-
-
Symantec, 02.13
-
Symantec, "W32.sqlexp.worm," (02.13.2007).
-
(2007)
W32.sqlexp.worm
-
-
-
17
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, "A social network based patching scheme for worm containment in cellular networks," IEEE INFOCOM, Rio de Janeiro, Brazil, 2009.
-
(2009)
IEEE INFOCOM, Rio de Janeiro, Brazil
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjan, S.4
Nucci, A.5
-
18
-
-
67650642299
-
Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications
-
B. Sun, G. Yan, Y. Xiao, and T. Andrew Yang, "Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications," Ad Hoc Networks, 2009.
-
(2009)
Ad Hoc Networks
-
-
Sun, B.1
Yan, G.2
Xiao, Y.3
Andrew Yang, T.4
-
19
-
-
57349123036
-
Can you infect me now?: Malware propagation in mobile phone networks
-
ACM New York, NY, USA
-
C. Fleizach, M. Liljenstam, P. Johansson, G. Voelker, and A. Mehes, "Can you infect me now?: malware propagation in mobile phone networks," in Proceedings of the 2007 ACM workshop on Recurring malcode, pp. 61-68, ACM New York, NY, USA, 2007.
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.4
Mehes, A.5
-
21
-
-
47749123301
-
Vulnerabilities in epidemic forwarding
-
A. El Fawal, J. Le Boudec, and K. Salamatian, "Vulnerabilities in epidemic forwarding," in IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007, pp. 1-6, 2007.
-
(2007)
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007
, pp. 1-6
-
-
El Fawal, A.1
Le Boudec, J.2
Salamatian, K.3
-
23
-
-
0026156688
-
Directed-graph epidemiological models of computer viruses
-
J. Kephart, S. White, I. Center, and Y. Heights, "Directed-graph epidemiological models of computer viruses," in Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on, pp. 343-359, 1991.
-
(1991)
Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer Society Symposium on
, pp. 343-359
-
-
Kephart, J.1
White, S.2
Center, I.3
Heights, Y.4
-
24
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
ACM New York, NY, USA
-
C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," in Proceedings of the 2003 ACM workshop on rapid malcode, pp. 51-60, ACM New York, NY, USA, 2003.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 51-60
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
26
-
-
34247478945
-
Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework
-
V. Karyotis and S. Papavassiliou, "Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework," Computer Networks, vol. 51, no. 9, pp. 2397-2410, 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.9
, pp. 2397-2410
-
-
Karyotis, V.1
Papavassiliou, S.2
-
27
-
-
39449122187
-
Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model
-
X. Yan and Y. Zou, "Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model," ETRI JOURNAL, vol. 30, no. 1, p. 81, 2008.
-
(2008)
ETRI Journal
, vol.30
, Issue.1
, pp. 81
-
-
Yan, X.1
Zou, Y.2
-
28
-
-
77953297322
-
Optimal Quarantining of Wireless Malware Through Power Control
-
M. Khouzani, E. Altman, and S. Sarkar, "Optimal Quarantining of Wireless Malware Through Power Control," in Proceedings of the Fourth Symposium on Information Theory and Applications, University of California at San Diego, 2009.
-
Proceedings of the Fourth Symposium on Information Theory and Applications, University of California at San Diego, 2009
-
-
Khouzani, M.1
Altman, E.2
Sarkar, S.3
-
29
-
-
0003259121
-
Mobility modeling in wireless networks: Categorization, smooth movement, and border effects
-
C. Bettstetter, "Mobility modeling in wireless networks: categorization, smooth movement, and border effects," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 5, no. 3, pp. 55-66, 2001.
-
(2001)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.5
, Issue.3
, pp. 55-66
-
-
Bettstetter, C.1
-
30
-
-
24144497473
-
The message delay in mobile ad hoc networks
-
R. Groenevelt, P. Nain, and G. Koole, "The message delay in mobile ad hoc networks," Performance Evaluation, vol. 62, no. 1-4, pp. 210-228, 2005.
-
(2005)
Performance Evaluation
, vol.62
, Issue.1-4
, pp. 210-228
-
-
Groenevelt, R.1
Nain, P.2
Koole, G.3
-
31
-
-
0002232633
-
Solutions of ordinary differential equations as limits of pure jump Markov processes
-
T. Kurtz, "Solutions of ordinary differential equations as limits of pure jump Markov processes," Journal of Applied Probability, pp. 49-58, 1970.
-
(1970)
Journal of Applied Probability
, pp. 49-58
-
-
Kurtz, T.1
-
33
-
-
80053647353
-
VACCINE: War of the worms in wired and wireless networks
-
S. Tanachaiwiwat and A. Helmy, "VACCINE: War of the worms in wired and wireless networks," in IEEE INFOCOM, pp. 05-859, 2006.
-
(2006)
IEEE INFOCOM
, pp. 05-859
-
-
Tanachaiwiwat, S.1
Helmy, A.2
-
34
-
-
77953299449
-
-
tech. rep., 2009
-
M. Khouzani, S. Sarkar, and E. Altman, "Maximum Damage Malware Attack in Mobile Wireless Networks," tech. rep., http://www.seas.upenn.edu/ swati/publication.htm, 2009.
-
Maximum Damage Malware Attack in Mobile Wireless Networks
-
-
Khouzani, M.1
Sarkar, S.2
Altman, E.3
|