-
1
-
-
0002058575
-
Connecting the physical world with pervasive networks
-
Jan./Mar.
-
D. Estrin, D. Culler,K. Pister, and G. Sukhatme, "Connecting the physical world with pervasive networks," IEEE Pervasive Comp., vol. 1, no. 1, pp. 59-69, Jan./Mar. 2002.
-
(2002)
IEEE Pervasive Comp.
, vol.1
, Issue.1
, pp. 59-69
-
-
Estrin, D.1
Cullerk. Pister, D.2
Sukhatme, G.3
-
2
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D.Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Netw., vol. 1, no. 2-3, pp. 293-315, 2003.
-
(2003)
Ad Hoc Netw.
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
4
-
-
85001799494
-
An ontology of information security
-
A. Herzog, N. Shahmehri, and C. Duma, "An ontology of information security," Int. J. Inform. Security Privacy, vol. 1, no. 4, pp. 1-23, 2007.
-
(2007)
Int. J. Inform. Security Privacy
, vol.1
, Issue.4
, pp. 1-23
-
-
Herzog, A.1
Shahmehri, N.2
Duma, C.3
-
5
-
-
33746896615
-
Open problems in computer virology
-
E. Filiol, M. Helenius, and S. Zanero, "Open problems in computer virology," J. Comp. Virology, vol. 1, no. 3, pp. 55-66, 2006.
-
(2006)
J. Comp. Virology
, vol.1
, Issue.3
, pp. 55-66
-
-
Filiol, E.1
Helenius, M.2
Zanero, S.3
-
6
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
San Francisco, CA, Apr.
-
Y. Hu, A. Perrig, and D. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks," in Proc. IEEE INFOCOM 2003. 22nd Annu. Joint Conf. IEEE Comp. Commun. Soc., San Francisco, CA, Apr. 2003, vol. 3, pp. 1-12.
-
(2003)
Proc. IEEE INFOCOM 2003. 22nd Annu. Joint Conf. IEEE Comp. Commun. Soc.
, vol.3
, pp. 1-12
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
7
-
-
84947273682
-
The sybil attack
-
Cambridge, MA, Mar. 7-8
-
J. Douceur, "The sybil attack," in Proc. Peer-to-Peer Syst., 1st Int. Workshop (IPTPS'02), Cambridge, MA,Mar. 7-8, 2002, pp. 251-260.
-
(2002)
Proc. Peer-to-Peer Syst., 1st Int. Workshop (IPTPS'02)
, pp. 251-260
-
-
Douceur, J.1
-
8
-
-
85037175440
-
Wireless sensor network security: A survey
-
J. Walters, Z. Liang, W. Shi, and V. Chaudhary, "Wireless sensor network security: A survey," in Proc. Security Distrib., Grid, Mobile, Pervasive Comp., 2007, pp. 367-367.
-
(2007)
Proc. Security Distrib., Grid, Mobile, Pervasive Comp.
, pp. 367-367
-
-
Walters, J.1
Liang, Z.2
Shi, W.3
Chaudhary, V.4
-
10
-
-
70349986523
-
-
Berlin, Germany: Springer-Verlag
-
D. Grass, A. Vienna, J. Caulkins, and P. Rand, Optimal Control of Nonlinear Processes. Berlin, Germany: Springer-Verlag, 2008.
-
(2008)
Optimal Control of Nonlinear Processes
-
-
Grass, D.1
Vienna, A.2
Caulkins, J.3
Rand, P.4
-
11
-
-
34547345829
-
On the characterization and evaluation of mobile attack strategies in wireless ad hoc networks
-
V. Karyotis, S. Papavassiliou, M. Grammatikou, and B. Maglaris, "On the characterization and evaluation of mobile attack strategies in wireless ad hoc networks," in Proc. 11th IEEE Symp. Comp. Commun. (ISCC'06), 2006, pp. 29-34.
-
(2006)
Proc. 11th IEEE Symp. Comp. Commun. (ISCC'06)
, pp. 29-34
-
-
Karyotis, V.1
Papavassiliou, S.2
Grammatikou, M.3
Maglaris, B.4
-
12
-
-
42149094983
-
On the malware spreading over nonpropagative wireless ad hoc networks: The attacker's perspective
-
Chania, Crete, Greece, Oct.
-
V. Karyotis and S. Papavassiliou, "On the malware spreading over nonpropagative wireless ad hoc networks: The attacker's perspective," in Proc. 3rd ACM Int.Workshop QoS Security Wireless Mobile Networks, Chania, Crete, Greece, Oct. 2007, pp. 156-159.
-
(2007)
Proc. 3rd ACM Int.Workshop QoS Security Wireless Mobile Networks
, pp. 156-159
-
-
Karyotis, V.1
Papavassiliou, S.2
-
13
-
-
67049128150
-
Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery
-
[Online]
-
R. Racic, D. Ma, and H. Chen, "Exploiting MMS vulnerabilities to stealthily exhaust mobile phone's battery," IEEE SecureComm pp. 1-10, 2006 [Online]. Available: http://www.docstoc.com/docs/74584714/Exploiting-MMS- Vulnerabilities-to-Stealthily-Exhaust-Mobile-pdf
-
(2006)
IEEE SecureComm
, pp. 1-10
-
-
Racic, R.1
Ma, D.2
Chen, H.3
-
14
-
-
33745468784
-
Wireless sensor network denial of sleep attack
-
M. Brownfield, Y. Gupta, and N. Davis, "Wireless sensor network denial of sleep attack," in Proc. 6th Annu. IEEE SMC Inform. Assurance Workshop (Iaw'05), 2005, pp. 356-364.
-
(2005)
Proc. 6th Annu. IEEE SMC Inform. Assurance Workshop (Iaw'05)
, pp. 356-364
-
-
Brownfield, M.1
Gupta, Y.2
Davis, N.3
-
15
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
H. Kim, J. Smith, and K. Shin, "Detecting energy-greedy anomalies and mobile malware variants," in Proc. 6th Int. Conf. Mobile Syst., Appl., Services, 2008, pp. 239-252.
-
(2008)
Proc. 6th Int. Conf. Mobile Syst., Appl., Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.3
-
16
-
-
18144404261
-
Battery-based intrusion detection
-
Dallas, TX, Nov.
-
G. Jacoby and N. Davis, "Battery-based intrusion detection," in Proc. IEEE Global Telecommun. Conf. (GLOBECOM'04), Dallas, TX, Nov. 2004, vol. 4, pp. 2250-2255.
-
(2004)
Proc. IEEE Global Telecommun. Conf. (GLOBECOM'04)
, vol.4
, pp. 2250-2255
-
-
Jacoby, G.1
Davis, N.2
-
17
-
-
84934300624
-
Battery exhaustion attack detection with small handheld mobile computers
-
T. Buennemeyer,M. Gora, R. Marchany, and J. Tront, "Battery exhaustion attack detection with small handheld mobile computers," in Proc. IEEE Int. Conf. Portable Inform. Devices (PORTABLE'07), 2007, pp. 1-5.
-
(2007)
Proc. IEEE Int. Conf. Portable Inform. Devices (PORTABLE'07)
, pp. 1-5
-
-
Buennemeyer, T.1
Gora, M.2
Marchany, R.3
Tront, J.4
-
18
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," in Proc. ACM Workshop Rapid Malcode, 2003, pp. 51-60.
-
(2003)
Proc. ACM Workshop Rapid Malcode
, pp. 51-60
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
19
-
-
34247478945
-
Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework
-
V. Karyotis and S. Papavassiliou, "Risk-based attack strategies for mobile ad hoc networks under probabilistic attack modeling framework," Comp. Netw., vol. 51, no. 9, pp. 2397-2410, 2007.
-
(2007)
Comp. Netw.
, vol.51
, Issue.9
, pp. 2397-2410
-
-
Karyotis, V.1
Papavassiliou, S.2
-
20
-
-
39449122187
-
Optimal internet worm treatment strategy based on the two-factor model
-
X. Yan and Y. Zou, "Optimal internet worm treatment strategy based on the two-factor model," ETRI J., vol. 30, no. 1, pp. 81-81, 2008.
-
(2008)
ETRI J.
, vol.30
, Issue.1
, pp. 81-81
-
-
Yan, X.1
Zou, Y.2
-
21
-
-
80053654839
-
Optimal quarantining of wireless malware through power control
-
San Diego, CA
-
M. Khouzani, E. Altman, and S. Sarkar, "Optimal quarantining of wireless malware through power control," in Proc. 4rth Symp. Inform. Theory Appl., San Diego, CA, 2009, pp. 301-310.
-
(2009)
Proc. 4rth Symp. Inform. Theory Appl.
, pp. 301-310
-
-
Khouzani, M.1
Altman, E.2
Sarkar, S.3
-
22
-
-
77953320145
-
Maximum damage malware attack in mobile wireless networks
-
Mar.
-
M. Khouzani, S. Sarkar, and E. Altman, "Maximum damage malware attack in mobile wireless networks," in Proc. Infocom, San Diego, Mar. 2010, pp. 1-9.
-
(2010)
Proc. Infocom, San Diego
, pp. 1-9
-
-
Khouzani, M.1
Sarkar, S.2
Altman, E.3
-
23
-
-
79953154031
-
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
-
Atlanta, GA, Dec.
-
M. Khouzani, S. Sarkar, and E. Altman, "Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks," in Proc. 49th IEEE CDC, Atlanta, GA, Dec. 2010, pp. 1-8.
-
(2010)
Proc. 49th IEEE CDC
, pp. 1-8
-
-
Khouzani, M.1
Sarkar, S.2
Altman, E.3
-
24
-
-
79960856823
-
Optimal control of epidemic evolution
-
Shanghai, China, Apr.
-
M. H. R. Khouzani, S. Sarkar, and E. Altman, "Optimal control of epidemic evolution," in Proc. Infocom, Shanghai, China, Apr. 2011, pp. 1683-1691.
-
(2011)
Proc. Infocom
, pp. 1683-1691
-
-
Khouzani, M.H.R.1
Sarkar, S.2
Altman, E.3
-
27
-
-
80053647353
-
VACCINE: War of the worms in wired and wireless networks
-
Barcelona, Spain, Apr.
-
S. Tanachaiwiwat and A. Helmy, "VACCINE: War of the worms in wired and wireless networks," in Proc. IEEE INFOCOM, Barcelona, Spain, Apr. 2006, pp. 805-859.
-
(2006)
Proc. IEEE INFOCOM
, pp. 805-859
-
-
Tanachaiwiwat, S.1
Helmy, A.2
-
28
-
-
67349110460
-
Encounter-based worms: Analysis and defense
-
S. Tanachaiwiwat and A. Helmy, "Encounter-based worms: Analysis and defense," Ad Hoc Netw., vol. 7, no. 7, pp. 1414-1430, 2009.
-
(2009)
Ad Hoc Netw.
, vol.7
, Issue.7
, pp. 1414-1430
-
-
Tanachaiwiwat, S.1
Helmy, A.2
-
29
-
-
0003259121
-
Mobility modeling in wireless networks: Categorization, smooth movement, and border effects
-
C. Bettstetter, "Mobility modeling in wireless networks: Categorization, smooth movement, and border effects," ACM SIGMOBILE Mobile Comp. Commun. Rev., vol. 5, no. 3, pp. 55-66, 2001.
-
(2001)
ACM SIGMOBILE Mobile Comp. Commun. Rev.
, vol.5
, Issue.3
, pp. 55-66
-
-
Bettstetter, C.1
-
30
-
-
24144497473
-
The message delay in mobile ad hoc networks
-
R. Groenevelt, P. Nain, and G. Koole, "The message delay in mobile ad hoc networks," Performance Eval., vol. 62, no. 1-4, pp. 210-228, 2005.
-
(2005)
Performance Eval.
, vol.62
, Issue.1-4
, pp. 210-228
-
-
Groenevelt, R.1
Nain, P.2
Koole, G.3
-
31
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
A. Bose, X. Hu, K. Shin, and T. Park, "Behavioral detection of malware on mobile handsets," in Proc. 6th Int. Conf. Mobile Syst., Appl., Services, 2008, pp. 225-238.
-
(2008)
Proc. 6th Int. Conf. Mobile Syst., Appl., Services
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.3
Park, T.4
-
32
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, TX
-
C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks," in Proc. 7th USENIX Security Conf., San Antonio, TX, 1998, vol. 78.
-
(1998)
Proc. 7th USENIX Security Conf.
, vol.78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
33
-
-
0742276097
-
Inside the slammer worm
-
Jul./Aug.
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm," IEEE Security Privacy, vol. 1, no. 4, pp. 33-39, Jul./Aug. 2003.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
34
-
-
77952737301
-
-
Symantec, Feb. 13
-
Symantec, "W32.sqlexp.worm," Feb. 13, 2007.
-
(2007)
W32.sqlexp.worm
-
-
-
35
-
-
0002232633
-
Solutions of ordinary differential equations as limits of pure jump Markov processes
-
T. Kurtz, "Solutions of ordinary differential equations as limits of pure jump Markov processes," J. Appl. Prob., pp. 49-58, 1970.
-
(1970)
J. Appl. Prob.
, pp. 49-58
-
-
Kurtz, T.1
-
37
-
-
84885799779
-
Pocket switched networks and human mobility in conference environments
-
P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot, "Pocket switched networks and human mobility in conference environments," in Proc. ACMSIGCOMMWorkshop Delay-Tolerant Netw., 2005, pp. 251-251.
-
(2005)
Proc. ACMSIGCOMMWorkshop Delay-Tolerant Netw.
, pp. 251-251
-
-
Hui, P.1
Chaintreau, A.2
Scott, J.3
Gass, R.4
Crowcroft, J.5
Diot, C.6
-
38
-
-
50249169440
-
On the asymptotic behavior of malware-propagative mobile ad hoc networks
-
Pisa, Italy, Oct.
-
V. Karyotis, M. Grammatikou, and S. Papavassiliou, "On the asymptotic behavior of malware-propagative mobile ad hoc networks," in Proc. 4th IEEE Int. Conf. Mobile Ad-Hoc Sensor Syst., Pisa, Italy, Oct. 2007, pp. 1-9.
-
(2007)
Proc. 4th IEEE Int. Conf. Mobile Ad-Hoc Sensor Syst.
, pp. 1-9
-
-
Karyotis, V.1
Grammatikou, M.2
Papavassiliou, S.3
|