-
3
-
-
34748827408
-
Bluetooth worm propagation: Mobility pattern matters!
-
DOI 10.1145/1229285.1229294, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
G. Yan, H. Flores, L. Cuellar, N. Hengartner, S. Eidenbenz, and V. Vu, "Bluetooth worm propagation: mobility pattern matters!" in Proceedings of the 2nd ACM symposium on Information, computer and communications security. ACM, 2007, pp. 32-44. (Pubitemid 47479225)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 32-44
-
-
Yan, G.1
Flores, H.D.2
Cuellar, L.3
Hengartner, N.4
Eidenbenz, S.5
Vu, V.6
-
4
-
-
0000998185
-
A contribution to the mathematical theory of epidemics: I
-
W. Kermack and A. McKendrick, "A contribution to the mathematical theory of epidemics: I," Proc. Roy. Soc. A 1927.
-
(1927)
Proc. Roy. Soc. A
-
-
Kermack, W.1
McKendrick, A.2
-
9
-
-
67349110460
-
Encounter-based worms: Analysis and defense
-
S. Tanachaiwiwat and A. Helmy, "Encounter-based worms: Analysis and defense," Ad Hoc Networks, vol. 7, no. 7, pp. 1414-1430, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.7
, pp. 1414-1430
-
-
Tanachaiwiwat, S.1
Helmy, A.2
-
10
-
-
39449122187
-
Optimal internet worm treatment strategy based on the two-factor model
-
X. Yan and Y. Zou, "Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model," ETRI JOURNAL, 2008.
-
(2008)
ETRI Journal
-
-
Yan, X.1
Zou, Y.2
-
11
-
-
77954950109
-
Optimal propagation of security patches in mobile wireless networks: Extended abstract
-
M. H. R. Khouzani, S. Sarkar, and E. Altman, "Optimal propagation of security patches in mobile wireless networks: extended abstract," in SIGMETRICS, 2010, pp. 355-356.
-
(2010)
SIGMETRICS
, pp. 355-356
-
-
Khouzani, M.H.R.1
Sarkar, S.2
Altman, E.3
-
15
-
-
79953154031
-
Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
-
M. Khouzani, S. Sarkar, and E. Altman, "Dispatch then Stop: Optimal Dissemination of Security Patches in Mobile Wireless Networks," in 49th IEEE CDC, 2010.
-
(2010)
49th IEEE CDC
-
-
Khouzani, M.1
Sarkar, S.2
Altman, E.3
-
18
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
P. Liu, W. Zang, and M. Yu, "Incentive-based modeling and inference of attacker intent, objectives, and strategies," ACM Transactions on Information and System Security (TISSEC), vol. 8, no. 1, 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.1
-
-
Liu, P.1
Zang, W.2
Yu, M.3
-
19
-
-
48349108542
-
A game theoretic method for decision and analysis of the optimal active defense strategy
-
IEEE Computer Society
-
W. Jiang, H. Zhang, Z. Tian, and X. Song, "A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy," in Proceedings of the 2007 Intl. Conf. on Computational Intelligence and Security. IEEE Computer Society, 2007.
-
(2007)
Proceedings of the 2007 Intl. Conf. on Computational Intelligence and Security
-
-
Jiang, W.1
Zhang, H.2
Tian, Z.3
Song, X.4
-
20
-
-
79951501558
-
A game theoretical attack-defense model oriented to network security risk assessment
-
W. He, C. Xia, H. Wang, C. Zhang, and Y. Ji, "A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment," in Proc. ICCSSE-Vol.3, 2008.
-
(2008)
Proc. ICCSSE
, vol.3
-
-
He, W.1
Xia, C.2
Wang, H.3
Zhang, C.4
Ji, Y.5
-
21
-
-
67650416963
-
Protecting against network infections: A game theoretic perspective
-
IEEE
-
J. Omic, A. Orda, and P. Van Mieghem, "Protecting against network infections: A game theoretic perspective," in INFOCOM 2009, IEEE. IEEE, 2009, pp. 1485-1493.
-
(2009)
INFOCOM 2009, IEEE
, pp. 1485-1493
-
-
Omic, J.1
Orda, A.2
Van Mieghem, P.3
-
22
-
-
77955900410
-
Existence theorems and approximation algorithms for generalized network security games
-
IEEE
-
V. Kumar, R. Rajaraman, Z. Sun, and R. Sundaram, "Existence Theorems and Approximation Algorithms for Generalized Network Security Games," in 2010 International Conference on Distributed Computing Systems. IEEE, 2010, pp. 348-357.
-
(2010)
2010 International Conference on Distributed Computing Systems
, pp. 348-357
-
-
Kumar, V.1
Rajaraman, R.2
Sun, Z.3
Sundaram, R.4
-
23
-
-
50649117332
-
Scaling laws for file dissemination in P2P networks with random contacts
-
R. Nünez-Queija and B. Prabhu, "Scaling laws for file dissemination in P2P networks with random contacts," in Proc. IWQoS, 2008.
-
(2008)
Proc. IWQoS
-
-
Nünez-Queija, R.1
Prabhu, B.2
-
25
-
-
80053647353
-
VACCINE: War of the worms in wired and wireless networks
-
S. Tanachaiwiwat and A. Helmy, "VACCINE: War of the worms in wired and wireless networks," in IEEE INFOCOM, 2006.
-
(2006)
IEEE INFOCOM
-
-
Tanachaiwiwat, S.1
Helmy, A.2
-
26
-
-
0003259121
-
Mobility modeling in wireless networks: Categorization, smooth movement, and border effects
-
C. Bettstetter, "Mobility modeling in wireless networks: categorization, smooth movement, and border effects," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 5, no. 3, 2001.
-
(2001)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.5
, Issue.3
-
-
Bettstetter, C.1
-
28
-
-
0002232633
-
Solutions of ordinary differential equations as limits of pure jump Markov processes
-
T. Kurtz, "Solutions of ordinary differential equations as limits of pure jump Markov processes," Journal of Applied Probability, 1970.
-
(1970)
Journal of Applied Probability
-
-
Kurtz, T.1
-
29
-
-
70349977430
-
Mean field asymptotics of Markov decision evolutionary games and teams
-
H. Tembine, J. Le Boudec, R. El-Azouzi, and E. Altman, "Mean field asymptotics of Markov decision evolutionary games and teams," in IEEE International Conference on Game Theory for Networks (GameNets' 09), 2009.
-
(2009)
IEEE International Conference on Game Theory for Networks (GameNets' 09)
-
-
Tembine, H.1
Le Boudec, J.2
El-Azouzi, R.3
Altman, E.4
-
31
-
-
84885799779
-
Pocket switched networks and human mobility in conference environments
-
ACM
-
P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot, "Pocket switched networks and human mobility in conference environments," in Proc. 2005 ACM SIGCOMM workshop on Delay-tolerant networking. ACM, 2005.
-
(2005)
Proc. 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking
-
-
Hui, P.1
Chaintreau, A.2
Scott, J.3
Gass, R.4
Crowcroft, J.5
Diot, C.6
|