-
2
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
New York
-
C. Zou, W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in Proc. 9th ACM Conf. Comput. Commun. Security, New York, 2002, pp. 138-147.
-
(2002)
Proc. 9th ACM Conf. Comput. Commun. Security
, pp. 138-147
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
4
-
-
43649100273
-
Modeling and automated containment of worms
-
DOI 10.1109/TDSC.2007.70230, 4358715
-
S. Sellke, N. Shroff, and S. Bagchi, "Modeling and automated containment of worms," IEEE Trans. Depend. Secure Comput., vol. 5, no. 2, pp. 71-86, Apr-Jun. 2008. (Pubitemid 351681550)
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.2
, pp. 71-86
-
-
Sellke, S.H.1
Shroff, N.B.2
Bagchi, S.3
-
5
-
-
43149085067
-
Deterministic and stochastic models for the detection of random constant scanning worms
-
K. Rohloff and T. Bacşar, "Deterministic and stochastic models for the detection of random constant scanning worms," ACM Trans. Model. Comput. Simulat. (TOMACS), vol. 18, no. 2, pp. 1-24, 2008.
-
(2008)
ACM Trans. Model. Comput. Simulat. (TOMACS)
, vol.18
, Issue.2
, pp. 1-24
-
-
Rohloff, K.1
Bacşar, T.2
-
6
-
-
33750733586
-
Malware goes mobile
-
M. Hypponen, "Malware goes mobile," Sci. Amer., vol. 295, no. 5, pp. 70-77, 2006.
-
(2006)
Sci. Amer.
, vol.295
, Issue.5
, pp. 70-77
-
-
Hypponen, M.1
-
7
-
-
43949084058
-
Malware in IEEE 802.11 wireless networks
-
B. Stone-Gross, C.Wilson, K. Almeroth, E. Belding, H. Zheng, and K. Papagiannaki, "Malware in IEEE 802.11 wireless networks," Lecture Notes Comput. Sci., vol. 4979, p. 222, 2008.
-
(2008)
Lecture Notes Comput. Sci.
, vol.4979
, pp. 222
-
-
Stone-Gross, B.1
Wilson, C.2
Almeroth, K.3
Belding, E.4
Zheng, H.5
Papagiannaki, K.6
-
8
-
-
21744437964
-
Public health law and ethics: Lessons from SARS and quarantine
-
N. Ries, "Public health law and ethics: Lessons from SARS and quarantine," Health Law Rev., vol. 13, no. 1, pp. 3-6, 2004.
-
(2004)
Health Law Rev.
, vol.13
, Issue.1
, pp. 3-6
-
-
Ries, N.1
-
10
-
-
84943680959
-
Computers and epidemiology
-
May
-
J. Kephart and S. White, "Computers and epidemiology," IEEE Spectrum, vol. 30, no. 5, pp. 20-26, May 1993.
-
(1993)
IEEE Spectrum
, vol.30
, Issue.5
, pp. 20-26
-
-
Kephart, J.1
White, S.2
-
13
-
-
24144441166
-
Coupled Kermack-McKendrick models for randomly scanning and bandwidth-saturating internet worms
-
Quality of Service in Multiservice IP Networks - Third International Workshop, QoS-IP 2005
-
G. Kesidis, I. Hamadeh, and S. Jiwasurat, "Coupled Kermack-Mckendrick models for randomly scanning and bandwidth saturating Internet worms," in Proc. 3rd Int. Workshop QoS in Multiservice IP Networks (QoS-IP), 2005, pp. 101-109. (Pubitemid 41231233)
-
(2005)
Lecture Notes in Computer Science
, vol.3375
, pp. 101-109
-
-
Kesidis, G.1
Hamadeh, I.2
Jiwasurat, S.3
-
14
-
-
18844395616
-
Experiences with worm propagation simulations
-
WORM'03 - Proceedings of the 2003 ACM Workshop on Rapid Malcode
-
A.Wagner, T. Dübendorfer, B. Plattner, and R. Hiestand, "Experiences with worm propagation simulations," in Proc. ACM Workshop Rapid Malcode, New York, 2003, pp. 34-41. (Pubitemid 40681808)
-
(2003)
WORM'03 - Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 34-41
-
-
Wagner, A.1
Plattner, B.2
Dubendorfer, T.3
Hiestand, R.4
-
15
-
-
64549103812
-
Dynamic network security deployment under partial information
-
G. Theodorakopoulos, J. Baras, and J.-Y. Le Boudec, "Dynamic network security deployment under partial information," in 46th Annu. Allerton Conf. Commun., Control, Comput., 2008, pp. 261-267.
-
(2008)
46th Annu. Allerton Conf. Commun., Control, Comput.
, pp. 261-267
-
-
Theodorakopoulos, G.1
Baras, J.2
Le Boudec, J.-Y.3
-
16
-
-
14844293542
-
Game strategies in network security
-
DOI 10.1007/s10207-004-0060-x
-
K. Lye and J. Wing, "Game strategies in network security," Int. J. Inf. Security, vol. 4, no. 1, pp. 71-86, 2005. (Pubitemid 40347202)
-
(2005)
International Journal of Information Security
, vol.4
, Issue.1-2
, pp. 71-86
-
-
Lye, K.-W.1
Wing, J.M.2
-
17
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
DOI 10.1145/1053283.1053288
-
P. Liu, W. Zang, and M. Yu, "Incentive-based modeling and inference of attacker intent, objectives, and strategies," ACM Trans. Inf. Sys. Security (TISSEC), vol. 8, no. 1, pp. 78-118, 2005. (Pubitemid 40479430)
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.1
, pp. 78-118
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
19
-
-
4544303625
-
Dynamic quarantine of internet worms
-
C. Wong, C. Wang, D. Song, S. Bielski, and G. Ganger, "Dynamic quarantine of internet worms," in Proc. Int. Conf. Depend. Syst. Netw. (DSN), 2004, pp. 62-71.
-
(2004)
Proc. Int. Conf. Depend. Syst. Netw. (DSN)
, pp. 62-71
-
-
Wong, C.1
Wang, C.2
Song, D.3
Bielski, S.4
Ganger, G.5
-
20
-
-
3042542433
-
Dynamic control of worm propagation
-
R. Dantu, J. Cangussu, and A. Yelimeli, "Dynamic control of worm propagation," in Proc. Int. Conf. Inf. Technol.: Coding Comput. (ITCC), 2004, vol. 1, pp. 419-423.
-
(2004)
Proc. Int. Conf. Inf. Technol.: Coding Comput. (ITCC)
, vol.1
, pp. 419-423
-
-
Dantu, R.1
Cangussu, J.2
Yelimeli, A.3
-
21
-
-
84855413802
-
Maximum damage malware attack in mobile wireless networks
-
M. Khouzani, S. Sarkar, and E. Altman, "Maximum damage malware attack in mobile wireless networks," in Proc. IEEE INFOCOM, 2005, vol. 5, pp. 1-9.
-
(2005)
Proc. IEEE INFOCOM
, vol.5
, pp. 1-9
-
-
Khouzani, M.1
Sarkar, S.2
Altman, E.3
-
23
-
-
62749086310
-
An optimal control approach to malware filtering
-
DOI 10.1109/CDC.2007.4434520, 4434520, Proceedings of the 46th IEEE Conference on Decision and Control 2007, CDC
-
M. Bloem, T. Alpcan, and T. Basar, "An optimal control approach to malware filtering," in Proc. 46th IEEE Conf. Decision Control, 2007, pp. 6059-6064. (Pubitemid 351278106)
-
(2007)
Proceedings of the IEEE Conference on Decision and Control
, pp. 6059-6064
-
-
Bloem, M.1
Alpcan, T.2
Basar, T.3
-
24
-
-
39449122187
-
Optimal internet worm treatment strategy based on the two-factor model
-
X. Yan and Y. Zou, "Optimal internet worm treatment strategy based on the two-factor model," ETRI J., vol. 30, no. 1, p. 81, 2008.
-
(2008)
ETRI J.
, vol.30
, Issue.1
, pp. 81
-
-
Yan, X.1
Zou, Y.2
-
26
-
-
84892036294
-
-
New York: Springer
-
G. Feichtinger, J. Caulkins, D. Grass, G. Tragler, and D. Behrens, Optimal Control of Nonlinear Processes: With Applications in Drugs, Corruption and Terror. New York: Springer, 2008.
-
(2008)
Optimal Control of Nonlinear Processes: With Applications in Drugs, Corruption and Terror
-
-
Feichtinger, G.1
Caulkins, J.2
Grass, D.3
Tragler, G.4
Behrens, D.5
-
27
-
-
0005467684
-
On the optimal control of a deterministic epidemic
-
R. Morton and K.Wickwire, "On the optimal control of a deterministic epidemic," Adv. Appl. Probab., vol. 6, no. 4, pp. 622-635, 1974.
-
(1974)
Adv. Appl. Probab.
, vol.6
, Issue.4
, pp. 622-635
-
-
Morton, R.1
Wickwire, K.2
-
28
-
-
84974873238
-
Optimal control of some simple deterministic epidemic models
-
S. Sethi and P. Staats, "Optimal control of some simple deterministic epidemic models," J. Operat. Res. Soc., vol. 29, no. 2, pp. 129-36, 1978.
-
(1978)
J. Operat. Res. Soc.
, vol.29
, Issue.2
, pp. 129-36
-
-
Sethi, S.1
Staats, P.2
-
31
-
-
0003259121
-
Mobility Modeling in wireless networks: Categorization, smooth movement, and border effects
-
C. Bettstetter, "Mobility Modeling in wireless networks: Categorization, smooth movement, and border effects," ACM SIGMOBILE Mobile Comput. Commun. Rev., pp. 55-66, 2001.
-
(2001)
ACM SIGMOBILE Mobile Comput. Commun. Rev.
, pp. 55-66
-
-
Bettstetter, C.1
-
32
-
-
24144497473
-
The message delay in mobile ad hoc networks
-
DOI 10.1016/j.peva.2005.07.018, PII S0166531605000970, Performance 2005
-
G. K. R. Groenevelt and P. Nain, "The message delay in mobile ad hoc networks," Perf. Eval., Elsevier, pp. 210-228, 2005. (Pubitemid 41240561)
-
(2005)
Performance Evaluation
, vol.62
, Issue.1-4
, pp. 210-228
-
-
Groenevelt, R.1
Nain, P.2
Koole, G.3
-
33
-
-
0002232633
-
Solutions of ordinary differential equations as limits of pure jump Markov processes
-
T. G. Kurtz, "Solutions of ordinary differential equations as limits of pure jump Markov processes," J. Appl. Probab., pp. 49-58, 1970.
-
(1970)
J. Appl. Probab.
, pp. 49-58
-
-
Kurtz, T.G.1
-
35
-
-
0028493631
-
Capacity improvement with base-station antenna arrays in cellular CDMA
-
Aug
-
A. Naguib, A. Paulraj, and T. Kailath, "Capacity improvement with base-station antenna arrays in cellular CDMA," IEEE Trans. Veh. Technol., vol. 43, no. 3, pp. 691-698, Aug. 1994.
-
(1994)
IEEE Trans. Veh. Technol.
, vol.43
, Issue.3
, pp. 691-698
-
-
Naguib, A.1
Paulraj, A.2
Kailath, T.3
-
36
-
-
0032180780
-
Joint optimal power control and beamforming in wireless networks using antenna arrays
-
PII S0090677898077666
-
F. Rashid-Farrokhi, L. Tassiulas, and K. Liu, "Joint optimal power control and beamforming in wireless networks using antenna arrays," IEEE Trans. Commun., vol. 46, no. 10, pp. 1313-1324, Oct. 2002. (Pubitemid 128739477)
-
(1998)
IEEE Transactions on Communications
, vol.46
, Issue.10
, pp. 1313-1324
-
-
Rashid-Farrokhi, F.1
-
37
-
-
0030688581
-
An adaptive antenna integrated with automatic gain control for receiver front end
-
J. Dawson and J. Lin, "An adaptive antenna integrated with automatic gain control for receiver front end," in IEEE MTT-S Int. Microw. Symp. Dig., 2002, vol. 3, pp. 1747-1750.
-
(2002)
IEEE MTT-S Int. Microw. Symp. Dig.
, vol.3
, pp. 1747-1750
-
-
Dawson, J.1
Lin, J.2
-
38
-
-
0030698452
-
Ericsson/Mannesmann GSM field-trials with adaptive antennas
-
S. Anderson, U. Forssen, J. Karlsson, T. Witzschel, P. Fischer, and A. Krug, "Ericsson/Mannesmann GSM field-trials with adaptive antennas," in Proc. 47th IEEE Veh. Technol. Conf., 2002, vol. 3, pp. 1587-1591.
-
(2002)
Proc. 47th IEEE Veh. Technol. Conf.
, vol.3
, pp. 1587-1591
-
-
Anderson, S.1
Forssen, U.2
Karlsson, J.3
Witzschel, T.4
Fischer, P.5
Krug, A.6
|