-
1
-
-
81055140711
-
A semi-Markov evaluation model for the survivability of real time database with intrusion tolerance
-
[in Chinese]
-
C. Chen, X. Pei, H. Zhou, and Y. Liu A semi-Markov evaluation model for the survivability of real time database with intrusion tolerance Chin J Comput 34 10 2011 1907 1916 [in Chinese]
-
(2011)
Chin J Comput
, vol.34
, Issue.10
, pp. 1907-1916
-
-
Chen, C.1
Pei, X.2
Zhou, H.3
Liu, Y.4
-
2
-
-
21244442700
-
Numerical treatment of homogeneous semi-Markov processes in transient case-A straightforward approach
-
G. Corradi, J. Janssen, and R. Manca Numerical treatment of homogeneous semi-Markov processes in transient case-a straightforward approach Methodol Comput Appl Probab 6 2004 233 246
-
(2004)
Methodol Comput Appl Probab
, vol.6
, pp. 233-246
-
-
Corradi, G.1
Janssen, J.2
Manca, R.3
-
4
-
-
80755181021
-
A survey of mobile malware in the wild
-
A.P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner A survey of mobile malware in the wild 1st ACM workshop on Security and privacy in smartphones and mobile devices (SPSM 2011). Chicago, Illinois, USA 2011 3 14
-
(2011)
1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM 2011). Chicago, Illinois, USA
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
5
-
-
57349123036
-
Can you infect me now? Malware propagation in mobile phone networks
-
C. Fleizach, M. Liljenstam, P. Johansson, G.M. Voelkery, and A. Mhes Can you infect me now? Malware propagation in mobile phone networks 4th ACM workshop on Recurring Malcode. Alexandria, VA, USA 2007 61 68
-
(2007)
4th ACM Workshop on Recurring Malcode. Alexandria, VA, USA
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelkery, G.M.4
Mhes, A.5
-
7
-
-
79959621174
-
An anonymous node state transition model based on semi-Markov process
-
[in Chinese]
-
J. Hao, W. Liu, and Y. Dai An anonymous node state transition model based on semi-Markov process Acta Electron Sin 39 5 2011 1082 1086 [in Chinese]
-
(2011)
Acta Electron Sin
, vol.39
, Issue.5
, pp. 1082-1086
-
-
Hao, J.1
Liu, W.2
Dai, Y.3
-
8
-
-
33747288780
-
Stochastic stability of linear systems with semi-markovian jump parameters
-
DOI 10.1017/S1446181100008294
-
Z. Hou, J. Luo, and P. Shi Stochastic stability of linear systems with semi-Markovian jump parameters ANZIAM J 46 2005 331 340 (Pubitemid 44238539)
-
(2005)
ANZIAM Journal
, vol.46
, Issue.3
, pp. 331-340
-
-
Hou, Z.1
Luo, J.2
Shi, P.3
-
10
-
-
77953295152
-
CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks
-
F. Li, Y. Yang, and J. Wu CPMC: an efficient proximity malware coping scheme in smartphone-based mobile networks 29th IEEE Conference on Computer Communications (INFOCOM 2010). San Diego, CA, USA 2010 1 9
-
(2010)
29th IEEE Conference on Computer Communications (INFOCOM 2010). San Diego, CA, USA
, pp. 1-9
-
-
Li, F.1
Yang, Y.2
Wu, J.3
-
11
-
-
84864262276
-
Modelling the spread of mobile malware
-
J.C. Martin, L.L. Burge III, J.I. Gill, A.N. Washington, and M. Alfred Modelling the spread of mobile malware Int J Comput Aided Eng Technol 2 1 2010 3 14
-
(2010)
Int J Comput Aided Eng Technol
, vol.2
, Issue.1
, pp. 3-14
-
-
Martin, J.C.1
Burge III, L.L.2
Gill, J.I.3
Washington, A.N.4
Alfred, M.5
-
13
-
-
80053431681
-
Survivability modeling and analysis on 3D mobile ad-hoc networks
-
S. Peng, G. Wang, Z. Hu, and J. Chen Survivability modeling and analysis on 3D mobile ad-hoc networks J Central South Univ Technol 18 4 2011 1144 1152
-
(2011)
J Central South Univ Technol
, vol.18
, Issue.4
, pp. 1144-1152
-
-
Peng, S.1
Wang, G.2
Hu, Z.3
Chen, J.4
-
14
-
-
84872465806
-
A survey on malware containment models in smartphones
-
S. Peng A survey on malware containment models in smartphones Appl Mech Mater 263-266 2013 3005 3011
-
(2013)
Appl Mech Mater
, vol.263-266
, pp. 3005-3011
-
-
Peng, S.1
-
15
-
-
84893445922
-
Modeling malware propagation in smartphone social networks
-
S. Peng, G. Wang, and S. Yu Modeling malware propagation in smartphone social networks 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), Australia 2013 196 201
-
(2013)
12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), Australia
, pp. 196-201
-
-
Peng, S.1
Wang, G.2
Yu, S.3
-
16
-
-
84875215204
-
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones
-
S. Peng, G. Wang, and S. Yu Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones J Comput Syst Sci 79 5 2013 586 595
-
(2013)
J Comput Syst Sci
, vol.79
, Issue.5
, pp. 586-595
-
-
Peng, S.1
Wang, G.2
Yu, S.3
-
17
-
-
84901190797
-
Smartphone malware and its propagation modeling: A survey
-
S. Peng, S. Yu, and A. Yang Smartphone malware and its propagation modeling: a survey IEEE Commun Surveys and Tut 16 2 2014 925 941
-
(2014)
IEEE Commun Surveys and Tut
, vol.16
, Issue.2
, pp. 925-941
-
-
Peng, S.1
Yu, S.2
Yang, A.3
-
19
-
-
53949105871
-
The opportunistic transmission of wireless worms between mobile devices
-
C.J. Rhodes, and M. Nekovee The opportunistic transmission of wireless worms between mobile devices Phys Stat Mech Its Appl 387 27 2008 6837 6844
-
(2008)
Phys Stat Mech Its Appl
, vol.387
, Issue.27
, pp. 6837-6844
-
-
Rhodes, C.J.1
Nekovee, M.2
-
20
-
-
42549166924
-
Security aspects of mobile phone virus: A critical survey
-
DOI 10.1108/02635570810868344
-
D. Shih, B. Lin, H. Chiang, and M. Shih Security aspects of mobile phone virus: a critical survey Ind Manag Data Syst 108 4 2008 478 494 (Pubitemid 351590943)
-
(2008)
Industrial Management and Data Systems
, vol.108
, Issue.4
, pp. 478-494
-
-
Shih, D.-H.1
Lin, B.2
Chiang, H.-S.3
Shih, M.-H.4
-
21
-
-
34547218865
-
A preliminary investigation of worm infections in a bluetooth environment
-
DOI 10.1145/1179542.1179545, Proceedings of the 4th ACM Workshop on Recurring Malcode, WORM'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
J. Su, K. Chan, A. Miklas, K. Po, A. Akhavan, and S. Saroiu et al. A preliminary investigation of worm infections in a bluetooth environment 4th ACM Workshop on Recurring Malcode (WORM 2006) 2006 9 16 (Pubitemid 47117518)
-
(2006)
Proceedings of the 4th ACM Workshop on Recurring Malcode, WORM'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 9-16
-
-
Su, J.1
Miklas, A.G.2
Po, K.3
Akhavan, A.4
Saroiu, S.5
De Lara, E.6
Goel, A.7
-
22
-
-
36049030713
-
Quantifying the effectiveness of mobile phone virus response mechanisms
-
E. Van Ruitenbeek, T. Courtney, W.H. Sanders, and F. Stevens Quantifying the effectiveness of mobile phone virus response mechanisms 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007). Edinburgh, UK June 2007 791 800
-
(2007)
37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007). Edinburgh, UK
, pp. 791-800
-
-
Van Ruitenbeek, E.1
Courtney, T.2
Sanders, W.H.3
Stevens, F.4
-
23
-
-
46149108320
-
Commwarrior worm propagation model for smart phone networks
-
W. Xia, Z. Li, Z. Chen, and Z. Yuan Commwarrior worm propagation model for smart phone networks J China Univ Posts Telecommun 15 2 2008 60 66
-
(2008)
J China Univ Posts Telecommun
, vol.15
, Issue.2
, pp. 60-66
-
-
Xia, W.1
Li, Z.2
Chen, Z.3
Yuan, Z.4
-
24
-
-
77956220270
-
On the survivability of wireless ad hoc networks with node misbehaviors and failures
-
F. Xing, and W. Wang On the survivability of wireless ad hoc networks with node misbehaviors and failures IEEE Trans Dependable Secure Comput 7 3 2008 284 299
-
(2008)
IEEE Trans Dependable Secure Comput
, vol.7
, Issue.3
, pp. 284-299
-
-
Xing, F.1
Wang, W.2
-
25
-
-
58849141571
-
Modeling propagation dynamics of bluetooth worms (extended version)
-
G. Yan, and S. Eidenbenz Modeling propagation dynamics of bluetooth worms (extended version) IEEE Trans Mob Comput 8 3 2009 353 367
-
(2009)
IEEE Trans Mob Comput
, vol.8
, Issue.3
, pp. 353-367
-
-
Yan, G.1
Eidenbenz, S.2
-
27
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjany, and A. Nucciy A social network based patching scheme for worm containment in cellular networks 28th IEEE International Conference on Computer Communications (INFOCOM 2009). Rio de Janeiro, Brazil 2009 1476 1484
-
(2009)
28th IEEE International Conference on Computer Communications (INFOCOM 2009). Rio de Janeiro, Brazil
, pp. 1476-1484
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjany, S.4
Nucciy, A.5
|