-
1
-
-
3042632320
-
Epidemic information dissemination in distributed systems
-
May
-
P. Eugster, R. Guerraoui, A.-M. Kermarrec, and L. Massoulie, "Epidemic information dissemination in distributed systems," IEEE Computer, vol. 37, no. 5, pp. 60-67, May 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.5
, pp. 60-67
-
-
Eugster, P.1
Guerraoui, R.2
Kermarrec, A.-M.3
Massoulie, L.4
-
2
-
-
79551625887
-
Information epidemics in complex networks with opportunistic links and dynamic topology
-
P.-Y. Chen and K.-C. Chen, "Information epidemics in complex networks with opportunistic links and dynamic topology," in IEEE GLOBECOM '10, Dec. 2010, pp. 1-6.
-
IEEE GLOBECOM '10, Dec. 2010
, pp. 1-6
-
-
Chen, P.-Y.1
Chen, K.-C.2
-
4
-
-
34247602959
-
Performance modeling of epidemic routing
-
July
-
X. Zhang, G. Negli, J. Kurose, and D. Towsley, "Performance modeling of epidemic routing," Comput. Netw., vol. 51, no. 8, pp. 2867-2891, July 2007.
-
(2007)
Comput. Netw.
, vol.51
, Issue.8
, pp. 2867-2891
-
-
Zhang, X.1
Negli, G.2
Kurose, J.3
Towsley, D.4
-
5
-
-
33144472554
-
A new networking model for biological applications of ad hoc sensor networks
-
DOI 10.1109/TNET.2005.863461
-
Z. J. Haas and T. Small, "A new networking model for biological applications of ad hoc sensor networks," IEEE/ACM Trans. Netw., vol. 14, no. 1, pp. 27-40, Feb. 2006. (Pubitemid 43264667)
-
(2006)
IEEE/ACM Transactions on Networking
, vol.14
, Issue.1
, pp. 27-40
-
-
Haas, Z.J.1
Small, T.2
-
6
-
-
60849108674
-
WiFi networks and malware epidemiology
-
Feb.
-
H. Hu, S. Myers, V. Colizza, and A. Vespignani, "WiFi networks and malware epidemiology," Proceedings of the National Academy of Sciences, vol. 106, no. 5, pp. 1318-1323, Feb. 2009.
-
(2009)
Proceedings of the National Academy of Sciences
, vol.106
, Issue.5
, pp. 1318-1323
-
-
Hu, H.1
Myers, S.2
Colizza, V.3
Vespignani, A.4
-
7
-
-
58849089560
-
An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks
-
Mar.
-
P. De, Y. Liu, and S. Das, "An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks,"IEEE Trans. Mobile Comput., vol. 8, no. 3, pp. 413-425, Mar. 2009.
-
(2009)
IEEE Trans. Mobile Comput.
, vol.8
, Issue.3
, pp. 413-425
-
-
De, P.1
Liu, Y.2
Das, S.3
-
8
-
-
85084162258
-
How to own the Internet in your spare time
-
S. Staniford, V. Paxson, and N.Weaver, "How to own the Internet in your spare time," in Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA, 2002, pp. 149-167.
-
Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA, 2002
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
9
-
-
28044469549
-
The monitoring and early detection of internet worms
-
DOI 10.1109/TNET.2005.857113
-
C. Zou, W. Gong, D. Towsley, and L. Gao, "The monitoring and early detection of Internet worms," IEEE/ACM Trans. Netw., vol. 13, no. 5, pp. 961-974, Oct. 2005. (Pubitemid 41685008)
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
Gao, L.4
-
10
-
-
34248995311
-
Modeling and simulation study of the propagation and defense of Internet e-mail worms
-
Apr.-Jun.
-
C. Zou, D. Towsley, and W. Gong, "Modeling and simulation study of the propagation and defense of Internet e-mail worms," IEEE Trans. Dependable Secure Comput., vol. 4, no. 2, pp. 105-118, Apr.-Jun. 2007.
-
(2007)
IEEE Trans. Dependable Secure Comput.
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
-
11
-
-
43649100273
-
Modeling and automated containment of worms
-
Apr.-Jun.
-
S. Sellke, N. Shroff, and S. Bagchi, "Modeling and automated containment of worms," IEEE Trans. Dependable Secure Comput., vol. 5, no. 2, pp. 71-86, Apr.-Jun. 2008.
-
(2008)
IEEE Trans. Dependable Secure Comput.
, vol.5
, Issue.2
, pp. 71-86
-
-
Sellke, S.1
Shroff, N.2
Bagchi, S.3
-
12
-
-
79551680433
-
On modeling malware propagation in generalized social networks
-
Jan.
-
S.-M. Cheng, W. C. Ao, P.-Y. Chen, and K.-C. Chen, "On modeling malware propagation in generalized social networks," IEEE Commun. Lett., vol. 15, no. 1, pp. 25-27, Jan. 2011.
-
(2011)
IEEE Commun. Lett.
, vol.15
, Issue.1
, pp. 25-27
-
-
Cheng, S.-M.1
Ao, W.C.2
Chen, P.-Y.3
Chen, K.-C.4
-
14
-
-
84878989879
-
Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: Overview and challenges
-
Jan./Mar.
-
Z. Zhang, "Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges," IEEE Commun. Surveys Tuts., vol. 8, no. 1, pp. 24-37, Jan./Mar. 2006.
-
(2006)
IEEE Commun. Surveys Tuts.
, vol.8
, Issue.1
, pp. 24-37
-
-
Zhang, Z.1
-
15
-
-
67349110460
-
Encounter-based worms: Analysis and defense
-
Sept.
-
S. Tanachaiwiwat and A. Helmy, "Encounter-based worms: analysis and defense," Ad Hoc Netw., vol. 7, pp. 1414-1430, Sept. 2009.
-
(2009)
Ad Hoc Netw.
, vol.7
, pp. 1414-1430
-
-
Tanachaiwiwat, S.1
Helmy, A.2
-
16
-
-
0036670170
-
Mobility increases the capacity of ad hoc wireless networks
-
DOI 10.1109/TNET.2002.801403, PII 1011092002801403
-
M. Grossglauser and D. Tse, "Mobility increases the capacity of ad hoc wireless networks," IEEE/ACM Trans. Netw., vol. 10, no. 4, pp. 477-486, Aug. 2002. (Pubitemid 35000391)
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.4
, pp. 477-486
-
-
Grossglauser, M.1
Tse, D.N.C.2
-
19
-
-
85028106250
-
On the Levy-walk nature of human mobility
-
June
-
I. Rhee, M. Shin, S. Hong, K. Lee, S. J. Kim, and S. Chong, "On the Levy-walk nature of human mobility," IEEE/ACM Trans. Netw., vol. 19, no. 3, pp. 630-643, June 2011.
-
(2011)
IEEE/ACM Trans. Netw.
, vol.19
, Issue.3
, pp. 630-643
-
-
Rhee, I.1
Shin, M.2
Hong, S.3
Lee, K.4
Kim, S.J.5
Chong, S.6
-
20
-
-
73949149885
-
Superdiffusive behavior of mobile nodes and its impact on routing protocol performance
-
Feb.
-
S. Kim, C.-H. Lee, and D. Y. Eun, "Superdiffusive behavior of mobile nodes and its impact on routing protocol performance," IEEE Trans. Mobile Comput., vol. 9, no. 2, pp. 288-304, Feb. 2010.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.9
, Issue.2
, pp. 288-304
-
-
Kim, S.1
Lee, C.-H.2
Eun, D.Y.3
|