-
3
-
-
62449182319
-
Dynamic epidemic model of smart phone virus propagated through bluetooth and MMS
-
W. Xia, Z. Li, Z. Chen, and Z. Yuan, "Dynamic Epidemic Model of Smart Phone Virus Propagated through Bluetooth and MMS," Proc. IET Conf. Wireless, Mobile and Sensor Networks, pp. 948-953, 2007.
-
(2007)
Proc. IET Conf. Wireless, Mobile and Sensor Networks
, pp. 948-953
-
-
Xia, W.1
Li, Z.2
Chen, Z.3
Yuan, Z.4
-
4
-
-
84866631560
-
-
"Bluetooth Special Interest Group," http://www.bluetooth.com, 2012.
-
(2012)
-
-
-
6
-
-
34047180005
-
Studying Bluetooth malware propagation: The BlueBag project
-
DOI 10.1109/MSP.2007.43
-
L. Carettoni, C. Merloni, and S. Zanero, "Studying Bluetooth Malware Propagation: The BlueBag Project," IEEE Security and Privacy, vol. 5, no. 2, pp. 17-25, Mar. 2007. (Pubitemid 46527384)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 17-25
-
-
Carettoni, L.1
Merloni, C.2
Zanero, S.3
-
9
-
-
38649083121
-
An epidemic model of mobile phone virus
-
H. Zheng, D. Li, and Z. Gao, "An Epidemic Model of Mobile Phone Virus," Proc. Symp. Pervasive Computing and Applications, pp. 1-5, 2006.
-
(2006)
Proc. Symp. Pervasive Computing and Applications
, pp. 1-5
-
-
Zheng, H.1
Li, D.2
Gao, Z.3
-
12
-
-
34748827408
-
Bluetooth worm propagation: Mobility pattern matters!
-
DOI 10.1145/1229285.1229294, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
G. Yan, L. Cuellar, S. Eidenbenz, H.D. Flores, N. Hengartner, and V. Vu, "Bluetooth Worm Propagation: Mobility Pattern Matters!" Proc. ACM Symp. Information, Computer and Comm. Security, pp. 32- 44, 2007. (Pubitemid 47479225)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 32-44
-
-
Yan, G.1
Flores, H.D.2
Cuellar, L.3
Hengartner, N.4
Eidenbenz, S.5
Vu, V.6
-
14
-
-
66349131932
-
Understanding the spreading patterns of mobile phone viruses
-
May
-
P. Wang, M.C. Gonzalez, C.A. Hidalgo, and A.-L. Barabasi, "Understanding the Spreading Patterns of Mobile Phone Viruses," Science, vol. 324, no. 22, pp. 1071-1076, May 2009.
-
(2009)
Science
, vol.324
, Issue.22
, pp. 1071-1076
-
-
Wang, P.1
Gonzalez, M.C.2
Hidalgo, C.A.3
Barabasi, A.-L.4
-
15
-
-
50049087364
-
On mobile viruses exploiting messaging and bluetooth services
-
A. Bose and K.G. Shin, "On Mobile Viruses Exploiting Messaging and Bluetooth Services," Proc. Conf. Securecomm and Workshops, pp. 1-10, 2006.
-
(2006)
Proc. Conf. Securecomm and Workshops
, pp. 1-10
-
-
Bose, A.1
Shin, K.G.2
-
20
-
-
84866624517
-
AV-test release latest results
-
"AV-Test Release Latest Results,"Virus Bull., http://www.virusbtn.com/news/2008/09-02, 2012.
-
(2012)
Virus Bull.
-
-
-
22
-
-
84866631561
-
-
"A Nation Addicted to Smartphones," http://media.ofcom.org.uk/ 2011/08/04/a-nation-addicted-to-smartphones/, 2012.
-
(2012)
A Nation Addicted to Smartphones
-
-
-
24
-
-
84866616614
-
-
"Orders of Magnitude (Speed)," http://en.wikipedia.org/wiki/ Orders-of-magnitude-(speed), 2012.
-
(2012)
-
-
-
25
-
-
32044460132
-
Perspectives on the basic reproductive ratio
-
Sept
-
J.M. Heffernan, R.J. Smith, and L.M. Wahl, "Perspectives on the Basic Reproductive Ratio," J. Royal Soc. Interface, vol. 2, no. 4, pp. 281-293, Sept. 2005.
-
(2005)
J. Royal Soc. Interface
, vol.2
, Issue.4
, pp. 281-293
-
-
Heffernan, J.M.1
Smith, R.J.2
Wahl, L.M.3
-
26
-
-
0742276097
-
Inside the slammer worm
-
July/Aug
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm," IEEE Security & Privacy, vol. 1, no. 4, pp. 33-39, July/Aug. 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
|