-
1
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
ACM
-
A. Bose, X. Hu, K.G. Shin, and T. Park. Behavioral detection of malware on mobile handsets. In Proceeding of the 6th international conference on Mobile systems, applications, and services, pages 225–238. ACM, 2008.
-
(2008)
Proceeding of the 6Th International Conference on Mobile Systems, Applications, and Services
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
3
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
ACM
-
J. Cheng, S.H.Y. Wong, H. Yang, and S. Lu. SmartSiren: virus detection and alert for smartphones. In Proceedings of the 5th international conference on Mobile systems, applications and services, page 271. ACM, 2007.
-
(2007)
Proceedings of the 5Th International Conference on Mobile Systems, Applications and Services
, pp. 271
-
-
Cheng, J.1
Wong, S.H.Y.2
Yang, H.3
Lu, S.4
-
5
-
-
33745796561
-
Exploiting open functionality in SMScapable cellular networks
-
ACM
-
W. Enck, P. Traynor, P. McDaniel, and T. La Porta. Exploiting open functionality in SMScapable cellular networks. In Proceedings of the 12th ACM conference on Computer and communications security, page 404. ACM, 2005.
-
(2005)
Proceedings of the 12Th ACM Conference on Computer and Communications Security
, pp. 404
-
-
Enck, W.1
Traynor, P.2
McDaniel, P.3
La Porta, T.4
-
11
-
-
57349123036
-
Can you infect me now?: Malware propagation in mobile phone networks
-
ACM
-
C. Fleizach, M. Liljenstam, P. Johansson, G.M. Voelker, and A. Mehes. Can you infect me now?: malware propagation in mobile phone networks. In Proceedings of the 2007 ACM workshop on Recurring malcode, page 68. ACM, 2007.
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode
, pp. 68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.M.4
Mehes, A.5
-
12
-
-
0003603813
-
Computers and intractability. A guide to the theory of NPcompleteness
-
WH Freeman and Company, San Francisco, Calif
-
M.R. Garey and D.S. Johnson. Computers and intractability. A guide to the theory of NPcompleteness. A Series of Books in the Mathematical Sciences. WH Freeman and Company, San Francisco, Calif, 1979.
-
(1979)
A Series of Books in the Mathematical Sciences
-
-
Garey, M.R.1
Johnson, D.S.2
-
14
-
-
0033888722
-
The Bluetooth radio system
-
J.C. Haartsen, E.R.S. BV, and N. Emmen. The Bluetooth radio system. IEEE Personal Communications, 7(1):28–36, 2000.
-
(2000)
IEEE Personal Communications
, vol.7
, Issue.1
, pp. 28-36
-
-
Haartsen, J.C.1
Bv, E.R.S.2
Emmen, N.3
-
15
-
-
0001108827
-
Graph partitioning models for parallel computing* 1
-
B. Hendrickson and T.G. Kolda. Graph partitioning models for parallel computing* 1. Parallel Computing, 26(12):1519–1534, 2000.
-
(2000)
Parallel Computing
, vol.26
, Issue.12
, pp. 1519-1534
-
-
Hendrickson, B.1
Kolda, T.G.2
-
16
-
-
0032131147
-
A fast and high quality multilevel scheme for partitioning irregular graphs
-
G. Karypis and V. Kumar. A fast and high quality multilevel scheme for partitioning irregular graphs. SIAM Journal on Scientific Computing, 20(1):359, 1999.
-
(1999)
SIAM Journal on Scientific Computing
, vol.20
, Issue.1
, pp. 359
-
-
Karypis, G.1
Kumar, V.2
-
18
-
-
84990479742
-
An efficient heuristic procedure for partitioning graphs
-
B.W. Kernighan and S. Lin. An efficient heuristic procedure for partitioning graphs. Bell System Technical Journal, 49(2):291–307, 1970.
-
(1970)
Bell System Technical Journal
, vol.49
, Issue.2
, pp. 291-307
-
-
Kernighan, B.W.1
Lin, S.2
-
19
-
-
77953320145
-
Maximum Damage Malware Attack in Mobile Wireless Networks
-
Twenty-Nine Annual Joint Conference of the IEEE Computer and Communications
-
M. Khouzani, S. Sarkar, and E. Altman. Maximum Damage Malware Attack in Mobile Wireless Networks. In IEEE Societies INFOCOM 2010. Twenty-Nine Annual Joint Conference of the IEEE Computer and Communications.
-
(2010)
IEEE Societies INFOCOM
-
-
Khouzani, M.1
Sarkar, S.2
Altman, E.3
-
20
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
ACM
-
H. Kim, J. Smith, and K.G. Shin. Detecting energy-greedy anomalies and mobile malware variants. In Proceeding of the 6th international conference on Mobile systems, applications, 0and services, pages 239–252. ACM, 2008.
-
(2008)
Proceeding of the 6Th International Conference on Mobile Systems, Applications, 0And Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
21
-
-
77953295152
-
An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks
-
Twenty-Nine Annual Joint Conference of the IEEE Computer and Communications
-
F. Li, Y. Yang, and J. Wu. CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks. In IEEE Societies INFOCOM 2010. Twenty-Nine Annual Joint Conference of the IEEE Computer and Communications.
-
(2010)
IEEE Societies INFOCOM
-
-
Li, F.1
Yang, Y.2
Cpmc, J.W.3
-
22
-
-
34548364116
-
Analysis of the reliability of a nationwide short message service
-
26th IEEE International Conference on Computer Communications
-
X. Meng, P. Zerfos, V. Samanta, S.H.Y. Wong, and S. Lu. Analysis of the reliability of a nationwide short message service. In IEEE INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pages 1811–1819, 2007.
-
(2007)
IEEE INFOCOM 2007
, pp. 1811-1819
-
-
Meng, X.1
Zerfos, P.2
Samanta, V.3
Wong, S.H.Y.4
Lu, S.5
-
24
-
-
38349017073
-
Exploiting social interactions in mobile systems
-
Springer-Verlag
-
A.G. Miklas, K.K. Gollu, K.K.W. Chan, S. Saroiu, K.P. Gummadi, and E. De Lara. Exploiting social interactions in mobile systems. In Proceedings of the 9th international conference on Ubiquitous computing, pages 409–428. Springer-Verlag, 2007.
-
(2007)
Proceedings of the 9Th International Conference on Ubiquitous Computing
, pp. 409-428
-
-
Miklas, A.G.1
Gollu, K.K.2
Chan, K.K.W.3
Saroiu, S.4
Gummadi, K.P.5
De Lara, E.6
-
25
-
-
0242314805
-
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. The spread of the sapphire/slammer worm, http://www.caida.org/publications/papers/2003/sapphire/sapphire. html, 2003.
-
(2003)
The Spread of the Sapphire/Slammer Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
26
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
Twenty-Second Annual Joint Conference of the IEEE Computer and Communications
-
D. Moore, C. Shannon, G.M. Voelker, and S. Savage. Internet quarantine: Requirements for containing self-propagating code. In IEEE Societies INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, pages 1901–1910.
-
IEEE Societies INFOCOM 2003
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
28
-
-
36049030713
-
Quantifying the effectiveness of mobile phone virus response mechanisms
-
E. Van Ruitenbeek, T. Courtney, W.H. Sanders, and F. Stevens. Quantifying the effectiveness of mobile phone virus response mechanisms. In 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007. DSN’07, pages 790–800, 2007.
-
(2007)
37Th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007. DSN’07
, pp. 790-800
-
-
Van Ruitenbeek, E.1
Courtney, T.2
Sanders, W.H.3
Stevens, F.4
-
30
-
-
0001514750
-
Parallel optimisation algorithms for multilevel mesh partitioning
-
C. Walshaw and M. Cross. Parallel optimisation algorithms for multilevel mesh partitioning. Parallel Computing, 26(12):1635–1660, 2000.
-
(2000)
Parallel Computing
, vol.26
, Issue.12
, pp. 1635-1660
-
-
Walshaw, C.1
Cross, M.2
-
31
-
-
66349131932
-
Understanding the spreading patterns of mobile phone viruses
-
P. Wang, M.C. Gonzalez, C.A. Hidalgo, and A.L. Barabasi. Understanding the spreading patterns of mobile phone viruses. Science, 324(5930):1071, 2009.
-
(2009)
Science
, vol.324
, Issue.5930
, pp. 1071
-
-
Wang, P.1
Gonzalez, M.C.2
Hidalgo, C.A.3
Barabasi, A.L.4
-
32
-
-
70349721171
-
White worms don’t work
-
N. Weaver and D. Ellis. White worms don’t work. Login, 31:33–38, 2006.
-
(2006)
Login
, vol.31
, pp. 33-38
-
-
Weaver, N.1
Ellis, D.2
-
33
-
-
33745667977
-
Empirical analysis of rate limiting mechanisms
-
Springer
-
C. Wong, S. Bielski, A. Studer, and C. Wang. Empirical analysis of rate limiting mechanisms. In Recent Advances in Intrusion Detection, pages 22–42. Springer, 2006.
-
(2006)
Recent Advances in Intrusion Detection
, pp. 22-42
-
-
Wong, C.1
Bielski, S.2
Studer, A.3
Wang, C.4
-
35
-
-
70349686596
-
A chain reaction DoS attack on 3G networks: Analysis and defenses
-
Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications
-
B. Zhao, C. Chi, W. Gao, S. Zhu, and G. Cao. A chain reaction DoS attack on 3G networks: analysis and defenses. In IEEE Societies INFOCOM 2009. Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications.
-
IEEE Societies INFOCOM 2009
-
-
Zhao, B.1
Chi, C.2
Gao, W.3
Zhu, S.4
Cao, G.5
-
36
-
-
84978869862
-
-
Book Chapter in Encyclopedia of cryptography and security (2nd Ed.). Springer Verlag
-
Z. Zhu and G. Cao. Worms in Cellular Networks. Book Chapter in Encyclopedia of cryptography and security (2nd Ed.). Springer Verlag, 2010.
-
(2010)
Worms in Cellular Networks
-
-
Zhu, Z.1
Cao, G.2
-
37
-
-
70349659420
-
A Social Network Based Patching Scheme for Worm Containment in Cellular Networks
-
Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications
-
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. In IEEE Societies INFOCOM 2009. Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications, pages 1476–1484.
-
IEEE Societies INFOCOM 2009
, pp. 1476-1484
-
-
Zhu, Z.1
Cao, G.2
Zhu, S.3
Ranjan, S.4
Nucci, A.5
-
38
-
-
16344396406
-
Monitoring and early warning for internet worms
-
ACM
-
C.C. Zou, L. Gao, W. Gong, and D. Towsley. Monitoring and early warning for internet worms. In Proceedings of the 10th ACM conference on Computer and communications security, pages 190–199. ACM, 2003.
-
(2003)
Proceedings of the 10Th ACM Conference on Computer and Communications Security
, pp. 190-199
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
39
-
-
70349663942
-
Defending mobile phones from proximity malware
-
Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications
-
G. Zyba, G.M. Voelker, M. Liljenstam, A. Méhes, and P. Johansson. Defending mobile phones from proximity malware. In IEEE Societies INFOCOM 2009. Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications, 2009.
-
(2009)
IEEE Societies INFOCOM 2009
-
-
Zyba, G.1
Voelker, G.M.2
Liljenstam, M.3
Méhes, A.4
Johansson, P.5
|