메뉴 건너뛰기




Volumn 58, Issue , 2012, Pages 505-533

A social network based patching scheme forworm containment in cellular networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84978790779     PISSN: 19316828     EISSN: 19316836     Source Type: Book Series    
DOI: 10.1007/978-1-4614-0857-4_17     Document Type: Chapter
Times cited : (28)

References (39)
  • 12
    • 0003603813 scopus 로고
    • Computers and intractability. A guide to the theory of NPcompleteness
    • WH Freeman and Company, San Francisco, Calif
    • M.R. Garey and D.S. Johnson. Computers and intractability. A guide to the theory of NPcompleteness. A Series of Books in the Mathematical Sciences. WH Freeman and Company, San Francisco, Calif, 1979.
    • (1979) A Series of Books in the Mathematical Sciences
    • Garey, M.R.1    Johnson, D.S.2
  • 15
    • 0001108827 scopus 로고    scopus 로고
    • Graph partitioning models for parallel computing* 1
    • B. Hendrickson and T.G. Kolda. Graph partitioning models for parallel computing* 1. Parallel Computing, 26(12):1519–1534, 2000.
    • (2000) Parallel Computing , vol.26 , Issue.12 , pp. 1519-1534
    • Hendrickson, B.1    Kolda, T.G.2
  • 16
    • 0032131147 scopus 로고    scopus 로고
    • A fast and high quality multilevel scheme for partitioning irregular graphs
    • G. Karypis and V. Kumar. A fast and high quality multilevel scheme for partitioning irregular graphs. SIAM Journal on Scientific Computing, 20(1):359, 1999.
    • (1999) SIAM Journal on Scientific Computing , vol.20 , Issue.1 , pp. 359
    • Karypis, G.1    Kumar, V.2
  • 18
    • 84990479742 scopus 로고
    • An efficient heuristic procedure for partitioning graphs
    • B.W. Kernighan and S. Lin. An efficient heuristic procedure for partitioning graphs. Bell System Technical Journal, 49(2):291–307, 1970.
    • (1970) Bell System Technical Journal , vol.49 , Issue.2 , pp. 291-307
    • Kernighan, B.W.1    Lin, S.2
  • 19
    • 77953320145 scopus 로고    scopus 로고
    • Maximum Damage Malware Attack in Mobile Wireless Networks
    • Twenty-Nine Annual Joint Conference of the IEEE Computer and Communications
    • M. Khouzani, S. Sarkar, and E. Altman. Maximum Damage Malware Attack in Mobile Wireless Networks. In IEEE Societies INFOCOM 2010. Twenty-Nine Annual Joint Conference of the IEEE Computer and Communications.
    • (2010) IEEE Societies INFOCOM
    • Khouzani, M.1    Sarkar, S.2    Altman, E.3
  • 21
    • 77953295152 scopus 로고    scopus 로고
    • An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks
    • Twenty-Nine Annual Joint Conference of the IEEE Computer and Communications
    • F. Li, Y. Yang, and J. Wu. CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks. In IEEE Societies INFOCOM 2010. Twenty-Nine Annual Joint Conference of the IEEE Computer and Communications.
    • (2010) IEEE Societies INFOCOM
    • Li, F.1    Yang, Y.2    Cpmc, J.W.3
  • 22
    • 34548364116 scopus 로고    scopus 로고
    • Analysis of the reliability of a nationwide short message service
    • 26th IEEE International Conference on Computer Communications
    • X. Meng, P. Zerfos, V. Samanta, S.H.Y. Wong, and S. Lu. Analysis of the reliability of a nationwide short message service. In IEEE INFOCOM 2007. 26th IEEE International Conference on Computer Communications, pages 1811–1819, 2007.
    • (2007) IEEE INFOCOM 2007 , pp. 1811-1819
    • Meng, X.1    Zerfos, P.2    Samanta, V.3    Wong, S.H.Y.4    Lu, S.5
  • 26
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • Twenty-Second Annual Joint Conference of the IEEE Computer and Communications
    • D. Moore, C. Shannon, G.M. Voelker, and S. Savage. Internet quarantine: Requirements for containing self-propagating code. In IEEE Societies INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, pages 1901–1910.
    • IEEE Societies INFOCOM 2003 , pp. 1901-1910
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 30
    • 0001514750 scopus 로고    scopus 로고
    • Parallel optimisation algorithms for multilevel mesh partitioning
    • C. Walshaw and M. Cross. Parallel optimisation algorithms for multilevel mesh partitioning. Parallel Computing, 26(12):1635–1660, 2000.
    • (2000) Parallel Computing , vol.26 , Issue.12 , pp. 1635-1660
    • Walshaw, C.1    Cross, M.2
  • 31
    • 66349131932 scopus 로고    scopus 로고
    • Understanding the spreading patterns of mobile phone viruses
    • P. Wang, M.C. Gonzalez, C.A. Hidalgo, and A.L. Barabasi. Understanding the spreading patterns of mobile phone viruses. Science, 324(5930):1071, 2009.
    • (2009) Science , vol.324 , Issue.5930 , pp. 1071
    • Wang, P.1    Gonzalez, M.C.2    Hidalgo, C.A.3    Barabasi, A.L.4
  • 32
    • 70349721171 scopus 로고    scopus 로고
    • White worms don’t work
    • N. Weaver and D. Ellis. White worms don’t work. Login, 31:33–38, 2006.
    • (2006) Login , vol.31 , pp. 33-38
    • Weaver, N.1    Ellis, D.2
  • 35
    • 70349686596 scopus 로고    scopus 로고
    • A chain reaction DoS attack on 3G networks: Analysis and defenses
    • Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications
    • B. Zhao, C. Chi, W. Gao, S. Zhu, and G. Cao. A chain reaction DoS attack on 3G networks: analysis and defenses. In IEEE Societies INFOCOM 2009. Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications.
    • IEEE Societies INFOCOM 2009
    • Zhao, B.1    Chi, C.2    Gao, W.3    Zhu, S.4    Cao, G.5
  • 36
    • 84978869862 scopus 로고    scopus 로고
    • Book Chapter in Encyclopedia of cryptography and security (2nd Ed.). Springer Verlag
    • Z. Zhu and G. Cao. Worms in Cellular Networks. Book Chapter in Encyclopedia of cryptography and security (2nd Ed.). Springer Verlag, 2010.
    • (2010) Worms in Cellular Networks
    • Zhu, Z.1    Cao, G.2
  • 37
    • 70349659420 scopus 로고    scopus 로고
    • A Social Network Based Patching Scheme for Worm Containment in Cellular Networks
    • Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications
    • Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. In IEEE Societies INFOCOM 2009. Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications, pages 1476–1484.
    • IEEE Societies INFOCOM 2009 , pp. 1476-1484
    • Zhu, Z.1    Cao, G.2    Zhu, S.3    Ranjan, S.4    Nucci, A.5
  • 39
    • 70349663942 scopus 로고    scopus 로고
    • Defending mobile phones from proximity malware
    • Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications
    • G. Zyba, G.M. Voelker, M. Liljenstam, A. Méhes, and P. Johansson. Defending mobile phones from proximity malware. In IEEE Societies INFOCOM 2009. Twenty-Eight Annual Joint Conference of the IEEE Computer and Communications, 2009.
    • (2009) IEEE Societies INFOCOM 2009
    • Zyba, G.1    Voelker, G.M.2    Liljenstam, M.3    Méhes, A.4    Johansson, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.