메뉴 건너뛰기




Volumn 10, Issue , 2012, Pages 705-712

The early (tweeting) Bird spreads the worm: An assessment of twitter for malware propagation

Author keywords

Malware; Malware propagation; Model; Social networks; Twitter

Indexed keywords


EID: 84885396742     PISSN: 18770509     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.procs.2012.06.090     Document Type: Conference Paper
Times cited : (15)

References (19)
  • 4
    • 31844435712 scopus 로고    scopus 로고
    • A note on the spread of worms in scale-free networks
    • IEEE Transactions on
    • C. Griffin and R. Brooks, "A note on the spread of worms in scale-free networks," Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, Vol. 36, pp. 198-202, 2006.
    • (2006) Systems, Man, and Cybernetics, Part B: Cybernetics , vol.36 , pp. 198-202
    • Griffin, C.1    Brooks, R.2
  • 5
    • 58849089560 scopus 로고    scopus 로고
    • An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks
    • IEEE Transactions on
    • P. De, Y. Liu, and S. K. Das, "An Epidemic Theoretic Framework for Vulnerability Analysis of Broadcast Protocols in Wireless Sensor Networks," Mobile Computing, IEEE Transactions on, Vol. 8, pp. 413-425, 2009.
    • (2009) Mobile Computing , vol.8 , pp. 413-425
    • De, P.1    Liu, Y.2    Das, S.K.3
  • 6
    • 80052733700 scopus 로고    scopus 로고
    • Introducing epidemic models for data survivability in unattended wireless sensor networks
    • 2011 IEEE International Symposium on a
    • R. Di Pietro and N. V. Verde, "Introducing epidemic models for data survivability in Unattended Wireless Sensor Networks," in WoWMoM, 2011 IEEE International Symposium on a, 2011, pp. 1-6.
    • (2011) WoWMoM , pp. 1-6
    • Di Pietro, R.1    Verde, N.V.2
  • 7
    • 79551680433 scopus 로고    scopus 로고
    • On modeling malware propagation in generalized social networks
    • IEEE
    • S.M. Cheng, W. C. Ao, PY. Chen and K.C. Chen, "On Modeling Malware Propagation in Generalized Social Networks," Communications Letters, IEEE, Vol. 15, pp. 25-27, 2011.
    • (2011) Communications Letters , vol.15 , pp. 25-27
    • Cheng, S.M.1    Ao, W.C.2    Chen, P.Y.3    Chen, K.C.4
  • 9
    • 17444378633 scopus 로고    scopus 로고
    • Email worm modeling and defense
    • ICCCN 2004. Proceedings. 13th International Conference on
    • C.C Zou, D. Towsley and W. Gong, "Email worm modeling and defense," in Computer Communications and Networks, 2004. ICCCN 2004. Proceedings. 13th International Conference on, 2004, pp. 409-414.
    • (2004) Computer Communications and Networks, 2004 , pp. 409-414
    • Zou, C.C.1    Towsley, D.2    Gong, W.3
  • 10
    • 77950163259 scopus 로고    scopus 로고
    • Malware propagation in online social networks
    • M. R. Faghani and H. Saidi, "Malware propagation in Online Social Networks," in MALWARE, 2009 pp. 8-14.
    • (2009) MALWARE , pp. 8-14
    • Faghani, M.R.1    Saidi, H.2
  • 16
    • 78651408354 scopus 로고    scopus 로고
    • The koobface botnet and the rise of social malware
    • Piscataway, NJ
    • K. Thomas and D. M. Nicol, "The Koobface Botnet and the Rise of Social Malware," in MALWARE 2010, Piscataway, NJ.
    • MALWARE 2010
    • Thomas, K.1    Nicol, D.M.2
  • 18
    • 85030965371 scopus 로고    scopus 로고
    • Phishing for twitter security
    • "Phishing for Twitter security," Communications News, Vol. 46, pp. 6-6, 2009.
    • (2009) Communications News , vol.46 , pp. 6-6
  • 19
    • 79961225562 scopus 로고    scopus 로고
    • Real-time geo influence in social networks
    • 2011 3rd International Conference on
    • T. Rao and S. Nagpal, "Real-time geo influence in social networks," in Electronics Computer Technology (ICECT), 2011 3rd International Conference on, 2011, pp. 246-250.
    • (2011) Electronics Computer Technology (ICECT) , pp. 246-250
    • Rao, T.1    Nagpal, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.