메뉴 건너뛰기




Volumn 58, Issue 7, 2012, Pages 4714-4732

Optimal dissemination of security patches in mobile wireless networks

Author keywords

Communications security; nonlinear equations; optimal control

Indexed keywords

BANDWIDTH CONSUMPTION; BANG-BANG; COMMUNICATIONS SECURITY; CONTROL STRATEGIES; DYNAMIC CONTROLS; MALWARES; MINIMUM VALUE; MOBILE WIRELESS NETWORK; NETWORK COSTS; NUMERICAL COMPUTATIONS; OPTIMAL CONTROL PROBLEM; OPTIMAL CONTROLS; PACKET TRANSMISSIONS; SECURITY PATCHES; SECURITY RISKS; SECURITY THREATS; SIMPLE STRUCTURES; STATIC CONTROL; STRICTLY CONVEXES;

EID: 84862543010     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2012.2195295     Document Type: Article
Times cited : (17)

References (25)
  • 1
    • 77954950109 scopus 로고    scopus 로고
    • Optimal propagation of security patches in mobile wireless networks: Extended abstract
    • M. Khouzani, S. Sarkar, and E. Altman, "Optimal propagation of security patches in mobile wireless networks: Extended abstract," in Proc. ACM SIGMETRICS, 2010, pp. 355-356.
    • (2010) Proc. ACM SIGMETRICS , pp. 355-356
    • Khouzani, M.1    Sarkar, S.2    Altman, E.3
  • 2
    • 79953154031 scopus 로고    scopus 로고
    • Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks
    • M. Khouzani, S. Sarkar, and E. Altman, "Dispatch then stop: Optimal dissemination of security patches in mobile wireless networks," in Proc. 49th IEEE Conf. Decision Control, 2010, pp. 2354-2359.
    • (2010) Proc. 49th IEEE Conf. Decision Control , pp. 2354-2359
    • Khouzani, M.1    Sarkar, S.2    Altman, E.3
  • 4
    • 14944367812 scopus 로고    scopus 로고
    • WORM vs. WORM: Preliminary study of an active counter-attack mechanism
    • New York
    • F. Castaneda, E. Sezer, and J. Xu, "WORM vs. WORM: Preliminary study of an active counter-attack mechanism," in Proc. ACMWorkshop Rapid Malcode, New York, 2004, pp. 83-93.
    • (2004) Proc. ACMWorkshop Rapid Malcode , pp. 83-93
    • Castaneda, F.1    Sezer, E.2    Xu, J.3
  • 8
    • 84862509934 scopus 로고    scopus 로고
    • Maximum damage malware attack in mobile wireless networks
    • San Diego, CA
    • M. Khouzani, S. Sarkar, and E. Altman, "Maximum damage malware attack in mobile wireless networks," in Proc. 29th Conf. Inform. Commun., San Diego, CA, 2010, pp. 749-757.
    • (2010) Proc. 29th Conf. Inform. Commun. , pp. 749-757
    • Khouzani, M.1    Sarkar, S.2    Altman, E.3
  • 9
    • 80053630581 scopus 로고    scopus 로고
    • Maximum damage battery depletion attack in mobile sensor networks
    • Oct
    • M. Khouzani and S. Sarkar, "Maximum damage battery depletion attack in mobile sensor networks," IEEE Trans. Automat. Control, vol. 56, no. 10, pp. 2358-2368, Oct. 2011.
    • (2011) IEEE Trans. Automat. Control , vol.56 , Issue.10 , pp. 2358-2368
    • Khouzani, M.1    Sarkar, S.2
  • 12
    • 84855393987 scopus 로고    scopus 로고
    • Optimal quarantining of wireless malware through reception gain control
    • Jan
    • M. Khouzani, E. Altman, and S. Sarkar, "Optimal quarantining of wireless malware through reception gain control," IEEE Trans. Automat. Control, vol. 50, no. 1, pp. 49-61, Jan. 2012.
    • (2012) IEEE Trans. Automat. Control , vol.50 , Issue.1 , pp. 49-61
    • Khouzani, M.1    Altman, E.2    Sarkar, S.3
  • 13
    • 63149130716 scopus 로고    scopus 로고
    • Optimal and robust epidemic response for multiple networks
    • M. Bloem, T. Alpcan, and T. Basar, "Optimal and robust epidemic response for multiple networks," Control Eng. Practice, vol. 17, no. 5, pp. 525-533, 2009.
    • (2009) Control Eng. Practice , vol.17 , Issue.5 , pp. 525-533
    • Bloem, M.1    Alpcan, T.2    Basar, T.3
  • 14
    • 39449122187 scopus 로고    scopus 로고
    • Optimal internet worm treatment strategy based on the two-factor model
    • X. Yan and Y. Zou, "Optimal internet worm treatment strategy based on the two-factor model," ETRI J., vol. 30, no. 1, pp. 81-88, 2008.
    • (2008) ETRI J. , vol.30 , Issue.1 , pp. 81-88
    • Yan, X.1    Zou, Y.2
  • 15
    • 77953297660 scopus 로고    scopus 로고
    • Optimal activation and transmission control in delay tolerant networks
    • San Diego, CA
    • E. Altman, A. Azad, T. Basar, and F. De Pellegrini, "Optimal activation and transmission control in delay tolerant networks," in Proc. IEEE INFOCOM, San Diego, CA, 2010, pp. 1-5.
    • (2010) Proc. IEEE INFOCOM , pp. 1-5
    • Altman, E.1    Azad, A.2    Basar, T.3    De Pellegrini, F.4
  • 19
    • 0003259121 scopus 로고    scopus 로고
    • Mobility modeling in wireless networks: Categorization, smooth movement, and border effects
    • C. Bettstetter, "Mobility modeling in wireless networks: Categorization, smooth movement, and border effects," Mobile Comput. Commun. Rev., vol. 5, no. 3, pp. 55-66, 2001.
    • (2001) Mobile Comput. Commun. Rev. , vol.5 , Issue.3 , pp. 55-66
    • Bettstetter, C.1
  • 20
    • 24144497473 scopus 로고    scopus 로고
    • The message delay in mobile ad hoc networks
    • R. Groenevelt, P. Nain, and G. Koole, "The message delay in mobile ad hoc networks," Perform. Eval., vol. 62, no. 1-4, pp. 210-228, 2005.
    • (2005) Perform. Eval. , vol.62 , Issue.1-4 , pp. 210-228
    • Groenevelt, R.1    Nain, P.2    Koole, G.3
  • 21
    • 0002232633 scopus 로고
    • Solutions of ordinary differential equations as limits of pure jump Markov processes
    • T. Kurtz, "Solutions of ordinary differential equations as limits of pure jump Markov processes," J. Appl. Probabil., pp. 49-58, 1970.
    • (1970) J. Appl. Probabil. , pp. 49-58
    • Kurtz, T.1
  • 25
    • 84855430196 scopus 로고    scopus 로고
    • Saddle-point strategies in Malware attack
    • Jan
    • M. Khouzani, S. Sarkar, and E. Altman, "Saddle-point strategies in Malware attack," IEEE J. Sel. Areas Commun., vol. 30, no. 1, pp. 31-43, Jan. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.1 , pp. 31-43
    • Khouzani, M.1    Sarkar, S.2    Altman, E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.