-
1
-
-
42549166924
-
Security aspects of mobile phone virus: A critical survey
-
DOI 10.1108/02635570810868344
-
D.-H. Shi, B. Lin, H.-S. Chiang, and M.-H. Shih, "Security aspects of mobile phone virus: A critical survey," Industrial Management and Data System, 2008, 108(4): 478-494. (Pubitemid 351590943)
-
(2008)
Industrial Management and Data Systems
, vol.108
, Issue.4
, pp. 478-494
-
-
Shih, D.-H.1
Lin, B.2
Chiang, H.-S.3
Shih, M.-H.4
-
2
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
H. Kim, J. Smith, and K. G. Shin, "Detecting energy-greedy anomalies and mobile malware variants," in Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys08), 2008: 239-252.
-
(2008)
Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys08)
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
3
-
-
57349173904
-
A systematic approach for cell-phone worm containment
-
L. Xie, H. Song, T. Jaeger, and S. Zhu, "A systematic approach for cell-phone worm containment," in Proceedings of the 17th International World Wide Web Conference (WWW08), 2008: 1083-1084.
-
(2008)
Proceedings of the 17th International World Wide Web Conference (WWW08)
, pp. 1083-1084
-
-
Xie, L.1
Song, H.2
Jaeger, T.3
Zhu, S.4
-
4
-
-
70349263625
-
Stealthy VIdeo capturer a new video-based spyware in 3G smartphones
-
N. Xu, F. Zhang, Y. Luo, W. Jia, D. Xuan, and J. Teng, "Stealthy VIdeo capturer a new video-based spyware in 3G smartphones," in Proceedings of the 2nd ACM conference on Wireless Network Security (WiSec09), 2009: 69-78.
-
(2009)
Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec09)
, pp. 69-78
-
-
Xu, N.1
Zhang, F.2
Luo, Y.3
Jia, W.4
Xuan, D.5
Teng, J.6
-
5
-
-
8644273520
-
An environment for controlled worm replication and analysis
-
I. Whalley, B. Arnold, D. Chess, J. Morar, A. Segal, and M. Swimmer, "An environment for controlled worm replication and analysis," Virus Bulletin, 2000: 1-20.
-
(2000)
Virus Bulletin
, pp. 1-20
-
-
Whalley, I.1
Arnold, B.2
Chess, D.3
Morar, J.4
Segal, A.5
Swimmer, M.6
-
6
-
-
79955073428
-
Network immunization and virus propagation in email networks: Experimental evaluation and analysis
-
C. Gao, J. Liu, and N. Zhong, "Network immunization and virus propagation in email networks: Experimental evaluation and analysis," Knowledge and Information Systems, 2011, 27(2): 253-279.
-
(2011)
Knowledge and Information Systems
, vol.27
, Issue.2
, pp. 253-279
-
-
Gao, C.1
Liu, J.2
Zhong, N.3
-
7
-
-
58849089560
-
An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks
-
P. De, Y. Liu, and S. K. Das, "An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks," IEEE Transactions on Mobile Computing, 2009, 8(3): 413-425.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.3
, pp. 413-425
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
8
-
-
67651048997
-
Deployment aware modeling of node compromise spread in wireless sensor networks using epidemic theory
-
Article 23
-
P. De, Y. Liu, and S. K. Das, "Deployment aware modeling of node compromise spread in wireless sensor networks using epidemic theory," ACM Transactions on Sensor Networks, 2009, 5(3): Article 23, 1-33.
-
(2009)
ACM Transactions on Sensor Networks
, vol.5
, Issue.3
, pp. 1-33
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
9
-
-
33845945205
-
Modeling node compromise spread in wireless sensor networks using epidemic theory
-
P. De, Y. Liu, and S. K. Das, "Modeling node compromise spread in wireless sensor networks using epidemic theory," in Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM06), 2006: 237-243.
-
(2006)
Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM06)
, pp. 237-243
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
10
-
-
58849141571
-
Modeling propagation dynamics of bluetooth worms (extended version)
-
G. Van and S. Eidenbenz, "Modeling propagation dynamics of bluetooth worms (extended version)," IEEE Transactions on Mobile Computing, 2009, 8(3): 353-367.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, Issue.3
, pp. 353-367
-
-
Van, G.1
Eidenbenz, S.2
-
11
-
-
66349131932
-
Understanding the spreading patterns of mobile phone viruses
-
P. Wang, M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, "Understanding the spreading patterns of mobile phone viruses," Science, 2009, 324(5930): 1071-1076.
-
(2009)
Science
, vol.324
, Issue.5930
, pp. 1071-1076
-
-
Wang, P.1
Gonzalez, M.C.2
Hidalgo, C.A.3
Barabasi, A.-L.4
-
12
-
-
44849122540
-
Understanding individual human mobility patterns
-
M. C. Gonzalez, C. A. Hidalgo, and A. L. Barabasi, "Understanding individual human mobility patterns," Nature, 2008, 453(7196): 779-782.
-
(2008)
Nature
, vol.453
, Issue.7196
, pp. 779-782
-
-
Gonzalez, M.C.1
Hidalgo, C.A.2
Barabasi, A.L.3
-
14
-
-
70349663942
-
Defending mobile phones from proximity malware
-
G. Zyba, G. M. Voelker, M. Liljenstam, A. Mehes, and P. Johansson, "Defending mobile phones from proximity malware," in Proceedings of the 28th IEEE International Conference on Computer Communication (INFOCOM09), 2009: 1503-1511.
-
(2009)
Proceedings of the 28th IEEE International Conference on Computer Communication (INFOCOM09)
, pp. 1503-1511
-
-
Zyba, G.1
Voelker, G.M.2
Liljenstam, M.3
Mehes, A.4
Johansson, P.5
-
15
-
-
41349106348
-
The spread of epidemic disease on networks
-
M. E. J. Newman, "The spread of epidemic disease on networks," Physical Review E, 2002, 66(1): 016128.
-
(2002)
Physical Review e
, vol.66
, Issue.1
, pp. 016128
-
-
Newman, M.E.J.1
-
16
-
-
77956581464
-
Modelling the influence of human behaviour on the spread of infectious diseases: A review
-
S. Funk, M. Salath, and V. A. A. Jansen, "Modelling the influence of human behaviour on the spread of infectious diseases: A review," Journal of The Royal Society Interface, 2010, 7(50): 1247-1256.
-
(2010)
Journal of the Royal Society Interface
, vol.7
, Issue.50
, pp. 1247-1256
-
-
Funk, S.1
Salath, M.2
Jansen, V.A.A.3
-
18
-
-
70349659583
-
SL AW: A mobility model for human walks
-
K. Lee, S. Hong, S. J. Kim, I. Rhee, and S. Chong, "SL AW: A mobility model for human walks," in Proceedings of the 28th IEEE International Conference on Computer Communication (INFOCOM09), 2009: 855-863.
-
(2009)
Proceedings of the 28th IEEE International Conference on Computer Communication (INFOCOM09)
, pp. 855-863
-
-
Lee, K.1
Hong, S.2
Kim, S.J.3
Rhee, I.4
Chong, S.5
-
19
-
-
51349144836
-
On the levy walk nature of human mobility
-
I. Rhee, M. Shin, S. Hong, K. Lee, and S. Chong, "On the levy walk nature of human mobility," in Proceedings of the 27th IEEE International Conference on Computer Communication (INFOCOM08), 2008: 924-932.
-
(2008)
Proceedings of the 27th IEEE International Conference on Computer Communication (INFOCOM08)
, pp. 924-932
-
-
Rhee, I.1
Shin, M.2
Hong, S.3
Lee, K.4
Chong, S.5
-
21
-
-
34548359387
-
Modeling time-variant user mobility in wireless mobile networks
-
W. Hsu, T. Spyropoulos, K. Psounis, and A. Helmy, "Modeling time-variant user mobility in wireless mobile networks," in Proceedings of the 26th IEEE International Conference on Computer Communication (INFOCOM07), 2007: 758-766.
-
(2007)
Proceedings of the 26th IEEE International Conference on Computer Communication (INFOCOM07)
, pp. 758-766
-
-
Hsu, W.1
Spyropoulos, T.2
Psounis, K.3
Helmy, A.4
-
22
-
-
34248995311
-
Modeling and simulation study of the propagation and defense of internet email worms
-
C. C. Zou, D. Towsley, and W. Gong, "Modeling and simulation study of the propagation and defense of internet email worms," IEEE Transaction on dependable and secure computing, 2007, 4(2): 105-118.
-
(2007)
IEEE Transaction on Dependable and Secure Computing
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
25
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, "A social network based patching scheme for worm containment in cellular networks," in Proceedings of the 28th IEEE International Conference on Computer Communication (INFOCOM09), 2009: 1476-1484.
-
(2009)
Proceedings of the 28th IEEE International Conference on Computer Communication (INFOCOM09)
, pp. 1476-1484
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjan, S.4
Nucci, A.5
-
26
-
-
65449186691
-
Mobile call graphs: Beyond power-law and lognormal distributions
-
M. Seshadri, S. Machiraju, A. Sridharan, J. Bolot, C. Faloutsos, and J. Leskovec, "Mobile call graphs: Beyond power-law and lognormal distributions," in Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD08), 2008: 596-604.
-
(2008)
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD08)
, pp. 596-604
-
-
Seshadri, M.1
Machiraju, S.2
Sridharan, A.3
Bolot, J.4
Faloutsos, C.5
Leskovec, J.6
-
27
-
-
58149112477
-
Analyzing the structure and evolution of massive telecom graphs
-
A. A. Nanavati, R. Singh, D. Chakraborty, K. Dasgupta, S. Mukherjea, G. Das, S. Gurumurthy, and A. Joshi, "Analyzing the structure and evolution of massive telecom graphs," IEEE Transactions on Knowledge and Data Engineering, 2008, 20(5): 703-718.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.5
, pp. 703-718
-
-
Nanavati, A.A.1
Singh, R.2
Chakraborty, D.3
Dasgupta, K.4
Mukherjea, S.5
Das, G.6
Gurumurthy, S.7
Joshi, A.8
-
28
-
-
34250628484
-
Structure and tie strengths in mobile communication networks
-
DOI 10.1073/pnas.0610245104
-
J. P. Onnela, J. Saramaki, J. Hyvonen, G. Szabo, D. Lazer, K. Kaski, J. Kertesz, and A. L. Barabasi, "Structure and tie strengths in mobile communication networks," Proceedings of the National Academy of Sciences of the United States of America, 2007, 104(18): 7332-7336. (Pubitemid 47185905)
-
(2007)
Proceedings of the National Academy of Sciences of the United States of America
, vol.104
, Issue.18
, pp. 7332-7336
-
-
Onnela, J.-P.1
Saramaki, J.2
Hyvonen, J.3
Szabo, G.4
Lazer, D.5
Kaski, K.6
Kertesz, J.7
Barabasi, A.-L.8
-
30
-
-
6344221308
-
Forecast and control of epidemics in a globalized world
-
DOI 10.1073/pnas.0308344101
-
L. Hufnagel, D. Brockmann and T. Geisel, "Forecast and control of epidemics in a globalized world," Proceedings of the National Academy of Sciences of the United States of America, 2004, 101(42): 15124-15129. (Pubitemid 39391729)
-
(2004)
Proceedings of the National Academy of Sciences of the United States of America
, vol.101
, Issue.42
, pp. 15124-15129
-
-
Hufnagel, L.1
Brockmann, D.2
Geisel, T.3
-
31
-
-
33144474437
-
The role of the airline transportation network in the prediction and predictability of global epidemics
-
DOI 10.1073/pnas.0510525103
-
V. Colizza, A. Barrat, M. Barthelemy and A. Vespignani, "The role of the airline transportation network in the prediction and predictability of global epidemics," Proceedings of the National Academy of Sciences of the United States of America, 2006, 103(7): 2015-2020. (Pubitemid 43271615)
-
(2006)
Proceedings of the National Academy of Sciences of the United States of America
, vol.103
, Issue.7
, pp. 2015-2020
-
-
Colizza, V.1
Barrat, A.2
Barthelemy, M.3
Vespignani, A.4
-
32
-
-
31444431866
-
The scaling laws of human travel
-
D. Brockmann, L. Hufnagel, and T. Geisel, "The scaling laws of human travel," Natue, 2006, 439(7075): 462-465.
-
(2006)
Natue
, vol.439
, Issue.7075
, pp. 462-465
-
-
Brockmann, D.1
Hufnagel, L.2
Geisel, T.3
-
33
-
-
39049095674
-
Impact of human mobility on the design of opportunistic forwarding algorithms
-
A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, "Impact of human mobility on the design of opportunistic forwarding algorithms," in Proceedings of the 26th IEEE International Conference on Computer Communication (INFOCOM06), 2006: 606-620.
-
(2006)
Proceedings of the 26th IEEE International Conference on Computer Communication (INFOCOM06)
, pp. 606-620
-
-
Chaintreau, A.1
Hui, P.2
Crowcroft, J.3
Diot, C.4
Gass, R.5
Scott, J.6
-
34
-
-
34548364116
-
Analysis of the reliability of a nationwide short message service
-
X. Meng, P. Zerfos, V. Samanta, S. H. Wong, and S. Lu, "Analysis of the reliability of a nationwide short message service," in Proceedings of the 26th IEEE International Conference on Computer Communication (INFOCOM07), 2007: 1811-1819.
-
(2007)
Proceedings of the 26th IEEE International Conference on Computer Communication (INFOCOM07)
, pp. 1811-1819
-
-
Meng, X.1
Zerfos, P.2
Samanta, V.3
Wong, S.H.4
Lu, S.5
-
35
-
-
2142758072
-
Technological Networks and the Spread of Computer Viruses
-
DOI 10.1126/science.1095845
-
J. Balthrop, S. Forrest, M. E. J. Newman, and M. M. Williamson, "Technological networks and the spread of computer viruses," Science, 2004, 304(5670): 527-529. (Pubitemid 38541898)
-
(2004)
Science
, vol.304
, Issue.5670
, pp. 527-529
-
-
Balthrop, J.1
Forrest, S.2
Newman, M.E.J.3
Williamson, M.M.4
|