-
1
-
-
80755181021
-
A survey of mobile malware in the wild
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proc. of ACM workshop on Security and Privacy in Smartphones and Mobile Devices, 2011.
-
(2011)
Proc. of ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
2
-
-
74049108559
-
On cellular botnets: Measuring the impact of malicious devices on a cellular network core
-
P. Traynor, M. Lin, M. Ongtang, V. Rao, T. Jaeger, P. McDaniel, and T. L. Porta, "On cellular botnets: Measuring the impact of malicious devices on a cellular network core," in Proc. of ACM Conference on Computer and Communications Security (CCS), 2009.
-
(2009)
Proc. of ACM Conference on Computer and Communications Security (CCS)
-
-
Traynor, P.1
Lin, M.2
Ongtang, M.3
Rao, V.4
Jaeger, T.5
McDaniel, P.6
Porta, T.L.7
-
5
-
-
70349659420
-
A social network based patching scheme for worm containment in cellular networks
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjany, and A. Nucciy, "A social network based patching scheme for worm containment in cellular networks," in Proc. of IEEE INFOCOM, 2009.
-
(2009)
Proc. of IEEE INFOCOM
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjany, S.4
Nucciy, A.5
-
6
-
-
77953295152
-
CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks
-
F. Li, Y. Yang, and J. Wu, "CPMC: An efficient proximity malware coping scheme in smartphone-based mobile networks," in Proc. of IEEE INFOCOM, 2010.
-
(2010)
Proc. of IEEE INFOCOM
-
-
Li, F.1
Yang, Y.2
Wu, J.3
-
7
-
-
17444402134
-
Measurement and analysis of worm propagation on internet network topology
-
J. Kim, S. Radhakrishnan, and S. K. Dhall, "Measurement and analysis of worm propagation on internet network topology," in Proc. of IEEE ICCCN, 2004.
-
(2004)
Proc. of IEEE ICCCN
-
-
Kim, J.1
Radhakrishnan, S.2
Dhall, S.K.3
-
8
-
-
61449222889
-
Virus spread in networks
-
P. V. Mieghem, J. Omic, and R. Kooij, "Virus spread in networks," IEEE/ACM Trans. Networking, vol. 17, 2009.
-
(2009)
IEEE/ACM Trans. Networking
, vol.17
-
-
Mieghem, P.V.1
Omic, J.2
Kooij, R.3
-
9
-
-
66349131932
-
Understanding the spreading patterns of mobile phone viruses
-
P. Wang, M. Gonzalez, C. Hidalgo, and A. Barabasi, "Understanding the spreading patterns of mobile phone viruses," Science, 2009.
-
(2009)
Science
-
-
Wang, P.1
Gonzalez, M.2
Hidalgo, C.3
Barabasi, A.4
-
10
-
-
58849141571
-
Modeling propagation dynamics of bluetooth worms (extended version)
-
Mar.
-
G. Yan and S. Eidenbenz, "Modeling propagation dynamics of bluetooth worms (extended version)," IEEE Trans. Mobile Computing, Mar. 2009.
-
(2009)
IEEE Trans. Mobile Computing
-
-
Yan, G.1
Eidenbenz, S.2
-
11
-
-
34547218865
-
A preliminary investigation of worm infections in a bluetooth environment
-
J. Su, K. Chan, A. Miklas, K. Po, A. Akhvan, S. Saroiu, E. De Lara, and A. Goel, "A preliminary investigation of worm infections in a bluetooth environment," in Proc. of ACM WORM, 2006.
-
(2006)
Proc. of ACM WORM
-
-
Su, J.1
Chan, K.2
Miklas, A.3
Po, K.4
Akhvan, A.5
Saroiu, S.6
De Lara, E.7
Goel, A.8
-
13
-
-
34748827408
-
Bluetooth worm propagation: Mobility pattern matters!
-
G. Yan, H. D. Flores, L. Cuellar, N. Hengartner, S. Eidenbenz, and V. Vu, "Bluetooth worm propagation: mobility pattern matters!" in Proc. of ACM AsiaCCS, 2007.
-
(2007)
Proc. of ACM AsiaCCS
-
-
Yan, G.1
Flores, H.D.2
Cuellar, L.3
Hengartner, N.4
Eidenbenz, S.5
Vu, V.6
-
14
-
-
85084096782
-
Why mobile-to-mobile wireless malware won't cause a storm
-
N. Husted and S. Myers, "Why mobile-to-mobile wireless malware won't cause a storm," in Proc. of USENIX LEET, 2011.
-
(2011)
Proc. of USENIX LEET
-
-
Husted, N.1
Myers, S.2
-
15
-
-
37849002138
-
Capacity scaling in delay tolerant networks with heterogeneous mobile nodes
-
M. Garetto, P. Giaccone, and E. Leonardi, "Capacity scaling in delay tolerant networks with heterogeneous mobile nodes," in Proc. of ACM MobiHoc, 2007.
-
(2007)
Proc. of ACM MobiHoc
-
-
Garetto, M.1
Giaccone, P.2
Leonardi, E.3
-
16
-
-
84861609451
-
On latency distribution and scaling: From finite to large cognitive radio networks under general mobility
-
L. Sun and W. Wang, "On latency distribution and scaling: From finite to large cognitive radio networks under general mobility," in Proc. of IEEE INFOCOM, 2012.
-
(2012)
Proc. of IEEE INFOCOM
-
-
Sun, L.1
Wang, W.2
-
20
-
-
79960865158
-
On distribution and limits of information dissemination latency and speed in mobile cognitive radio networks
-
L. Sun and W. Wang, "On distribution and limits of information dissemination latency and speed in mobile cognitive radio networks," in Proc. of IEEE INFOCOM, 2011.
-
(2011)
Proc. of IEEE INFOCOM
-
-
Sun, L.1
Wang, W.2
-
22
-
-
84904422081
-
-
UDelModels, http://www.udelmodels.eecis.udel.edu/.
-
-
-
-
24
-
-
84861624840
-
Performance analysis of coupling scheduler for MapReduce/Hadoop
-
J. Tan, X. Meng, and L. Zhang, "Performance analysis of coupling scheduler for MapReduce/Hadoop," in Proc. of INFOCOM '12, 2012.
-
(2012)
Proc. of INFOCOM '12
-
-
Tan, J.1
Meng, X.2
Zhang, L.3
-
26
-
-
84904422075
-
-
Hadoop, http://hadoop.apache.org/.
-
-
-
-
27
-
-
84904422076
-
-
Storm, http://storm-project.net/.
-
-
-
-
28
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy
-
K. Kumar and Y.-H. Lu, "Cloud computing for mobile users: Can offloading computation save energy" Computer, 2010.
-
(2010)
Computer
-
-
Kumar, K.1
Lu, Y.-H.2
-
30
-
-
37749044359
-
Crossing over the bounded domain: From exponential to power-law inter-meeting time in MANET
-
H. Cai and D. Y. Eun, "Crossing over the bounded domain: From exponential to power-law inter-meeting time in MANET," in Proc. of ACM Mobicom, 2007.
-
(2007)
Proc. of ACM Mobicom
-
-
Cai, H.1
Eun, D.Y.2
|