-
2
-
-
78650130497
-
-
Georgia Tech Information Security Center, "Emerging Cyber Threats Report for 2009," http://www.gtiscsecuritysummit.com/pdf/ CyberThreatsReport2009.pdf.
-
Emerging Cyber Threats Report for 2009
-
-
-
3
-
-
60849108674
-
WiFi networks and malware epidemiology
-
H. Hu, S. Myers, V. Colizza, and A. Vespignani, "WiFi networks and malware epidemiology," PNAS, vol. 106, no. 5, pp. 1318-1323, 2009.
-
(2009)
PNAS
, vol.106
, Issue.5
, pp. 1318-1323
-
-
Hu, H.1
Myers, S.2
Colizza, V.3
Vespignani, A.4
-
4
-
-
66349131932
-
Understanding the Spreading Patterns of Mobile Phone Viruses
-
April
-
P. Wang, M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, "Understanding the Spreading Patterns of Mobile Phone Viruses," Science, pp. 1 167 053-, April 2009.
-
(2009)
Science
, pp. 1167053
-
-
Wang, P.1
Gonzalez, M.C.2
Hidalgo, C.A.3
Barabasi, A.-L.4
-
5
-
-
34548853976
-
Computing: The Wireless Epidemic
-
September
-
J. Kleinberg, "Computing: The Wireless Epidemic," Nature, vol. 449, pp. 287-288, September 2007.
-
(2007)
Nature
, vol.449
, pp. 287-288
-
-
Kleinberg, J.1
-
8
-
-
84922876220
-
EpiNet: A Simulation Framework to Study the Spread of Malware in Wireless Networks
-
K. Channakeshava, D. Chafekar, K. R. Bisset, V. S. A. Kumar, and M. V. Marathe, "EpiNet: A Simulation Framework to Study the Spread of Malware in Wireless Networks," in SIMUtools '09, 2009, pp. 1-10.
-
SIMUtools '09, 2009
, pp. 1-10
-
-
Channakeshava, K.1
Chafekar, D.2
Bisset, K.R.3
Kumar, V.S.A.4
Marathe, M.V.5
-
9
-
-
33750449673
-
Complexity of reachability problems for finite discrete dynamical systems
-
C. L. Barrett, H. B. H. III, M. V. Marathe, S. S. Ravi, D. J. Rosenkrantz, and R. E. Stearns, "Complexity of reachability problems for finite discrete dynamical systems," J. Comput. Syst. Sci., vol. 72, no. 8, pp. 1317-1345, 2006.
-
(2006)
J. Comput. Syst. Sci.
, vol.72
, Issue.8
, pp. 1317-1345
-
-
Barrett, C.L.1
H III, H.B.2
Marathe, M.V.3
Ravi, S.S.4
Rosenkrantz, D.J.5
Stearns, R.E.6
-
10
-
-
77958028567
-
Analysing information flows and key mediators through temporal centrality metrics
-
J. Tang, M. Musolesi, C. Mascolo, V. Latora, and V. Nicosia, "Analysing information flows and key mediators through temporal centrality metrics," in SNS '10. ACM, 2010, pp. 1-6.
-
SNS '10. ACM, 2010
, pp. 1-6
-
-
Tang, J.1
Musolesi, M.2
Mascolo, C.3
Latora, V.4
Nicosia, V.5
-
11
-
-
80053263131
-
-
Virginia Tech, Tech. Rep., October
-
K. Channakeshava, K. Bisset, V. Kumar, M. Marathe, and S. Yardi, "High performance scalable and expressive modeling environments to study mobile malware in large temporal networks," Virginia Tech, Tech. Rep., October 2010, http://ndssl.vbi.vt.edu/Publications/EpiCure-PDPS2011.pdf.
-
(2010)
High Performance Scalable and Expressive Modeling Environments to Study Mobile Malware in Large Temporal Networks
-
-
Channakeshava, K.1
Bisset, K.2
Kumar, V.3
Marathe, M.4
Yardi, S.5
-
12
-
-
44849122540
-
Understanding individual human mobility patterns
-
DOI 10.1038/nature06958, PII NATURE06958
-
M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, "Understanding Individual Human Mobility Patterns," Nature, vol. 453, no. 7196, pp. 779-782, June 2008. (Pubitemid 351793783)
-
(2008)
Nature
, vol.453
, Issue.7196
, pp. 779-782
-
-
Gonzalez, M.C.1
Hidalgo, C.A.2
Barabasi, A.-L.3
-
13
-
-
77951616235
-
Generation and analysis of large synthetic social contact networks
-
C. Barrett, D. Beckman, M. Khan, V. A. Kumar, M. Marathe, P. Stretz, T. Dutta, and B. Lewis, "Generation and analysis of large synthetic social contact networks," in WSC '09, 2009.
-
WSC '09, 2009
-
-
Barrett, C.1
Beckman, D.2
Khan, M.3
Kumar, V.A.4
Marathe, M.5
Stretz, P.6
Dutta, T.7
Lewis, B.8
-
14
-
-
33749016105
-
-
Symantec Corporation, June
-
P. Ferrie, P. Szor, R. Stanev, and R. Mouritzen, "Security Responses: Symbos.cabir," Symantec Corporation, June 2004.
-
(2004)
Security Responses: Symbos.cabir
-
-
Ferrie, P.1
Szor, P.2
Stanev, R.3
Mouritzen, R.4
-
17
-
-
76349118508
-
-
AMS-DIMACS Special Issue on Epidemiology
-
S. Eubank, V. A. Kumar, M. Marathe, A. Srinivasan, and N. Wang, Structure of Social Contact Networks, and their impact on Epidemics. AMS-DIMACS Special Issue on Epidemiology, 2006.
-
(2006)
Structure of Social Contact Networks, and Their Impact on Epidemics
-
-
Eubank, S.1
Kumar, V.A.2
Marathe, M.3
Srinivasan, A.4
Wang, N.5
-
18
-
-
0017030517
-
A General Method for Numerically Simulating the Stochastic Time Evolution of Coupled Chemical Reactions
-
D. T. Gillespie, "A General Method for Numerically Simulating the Stochastic Time Evolution of Coupled Chemical Reactions," Journal of Computational Physics, vol. 22, no. 4, pp. 403-434, 1976.
-
(1976)
Journal of Computational Physics
, vol.22
, Issue.4
, pp. 403-434
-
-
Gillespie, D.T.1
-
19
-
-
34848826863
-
Modeling Propagation Dynamics of Bluetooth Worms
-
IEEE Computer Society
-
G. Yan and S. Eidenbenz, "Modeling Propagation Dynamics of Bluetooth Worms," in ICDCS '07'. IEEE Computer Society, 2007, pp. 42-52.
-
(2007)
ICDCS '07'
, pp. 42-52
-
-
Yan, G.1
Eidenbenz, S.2
-
20
-
-
39049104692
-
Bluetooth Worms: Models, Dynamics, and Defense Implications
-
IEEE Computer Society
-
-, "Bluetooth Worms: Models, Dynamics, and Defense Implications," in ACSAC '06. IEEE Computer Society, 2006, pp. 245-256.
-
(2006)
ACSAC '06
, pp. 245-256
-
-
Yan, G.1
Eidenbenz, S.2
-
21
-
-
34748827408
-
Bluetooth Worm Propagation: Mobility Pattern Matters!
-
ACM
-
G. Yan, H. D. Flores, L. Cuellar, N. Hengartner, S. Eidenbenz, and V. Vu, "Bluetooth Worm Propagation: Mobility Pattern Matters!" in ASIACCS '07. ACM, 2007, pp. 32-44.
-
(2007)
ASIACCS '07
, pp. 32-44
-
-
Yan, G.1
Flores, H.D.2
Cuellar, L.3
Hengartner, N.4
Eidenbenz, S.5
Vu, V.6
-
22
-
-
34547218865
-
A Preliminary Investigation of Worm Infections in a Bluetooth Environment
-
J. Su, K. K. W. Chan, A. G. Miklas, K. Po, A. Akhavan, S. Saroiu, E. De Lara, and A. Goel, "A Preliminary Investigation of Worm Infections in a Bluetooth Environment," in WORM '06, 2006, pp. 9-16.
-
WORM '06, 2006
, pp. 9-16
-
-
Su, J.1
Chan, K.K.W.2
Miklas, A.G.3
Po, K.4
Akhavan, A.5
Saroiu, S.6
De Lara, E.7
Goel, A.8
-
23
-
-
57349123036
-
Can You Infect Me Nnow?: Malware Propagation in Mobile Phone Networks
-
C. Fleizach, M. Liljenstam, and et al., "Can You Infect Me Nnow?: Malware Propagation in Mobile Phone Networks," in WORM '07, 2007, pp. 61-68.
-
WORM '07, 2007
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
-
26
-
-
33847123551
-
Experience with DETER: A Testbed for Security Research
-
T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab, "Experience with DETER: a Testbed for Security Research," in TRIDENTCOM '06, 2006.
-
TRIDENTCOM '06, 2006
-
-
Benzel, T.1
Braden, R.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
Ostrenga, R.7
Schwab, S.8
-
27
-
-
80053264684
-
Tools for Worm Experimentation on the DETER Testbed
-
S. Wei, A. Hussain, J. Mirkovic, and C. Ko, "Tools for Worm Experimentation on the DETER Testbed," Int. J. Commun. Netw. Distrib. Syst., vol. 5, no. 1/2, pp. 151-171, 2010.
-
(2010)
Int. J. Commun. Netw. Distrib. Syst.
, vol.5
, Issue.1-2
, pp. 151-171
-
-
Wei, S.1
Hussain, A.2
Mirkovic, J.3
Ko, C.4
-
28
-
-
74849124474
-
Simulating malware with malsim
-
R. Leszczyna, I. Nai Fovino, and M. Masera, "Simulating malware with malsim," Journal in Computer Virology, vol. 6, pp. 65-75, 2010.
-
(2010)
Journal in Computer Virology
, vol.6
, pp. 65-75
-
-
Leszczyna, R.1
Nai Fovino, I.2
Masera, M.3
-
29
-
-
33748991180
-
Modeling Epidemic Spreading in Mobile Environments
-
ACM
-
J. W. Mickens and B. D. Noble, "Modeling Epidemic Spreading in Mobile Environments," in WiSe '05. ACM, 2005, pp. 77-86.
-
(2005)
WiSe '05
, pp. 77-86
-
-
Mickens, J.W.1
Noble, B.D.2
|