메뉴 건너뛰기




Volumn , Issue , 2011, Pages

Why mobile-to-mobile wireless malware won’t cause a storm

Author keywords

[No Author keywords available]

Indexed keywords

BOTNET; COMPUTER VIRUSES; SMARTPHONES; WIRELESS LOCAL AREA NETWORKS (WLAN);

EID: 85084096782     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (36)
  • 4
    • 85080732032 scopus 로고    scopus 로고
    • Worm:SymbOS/Mabir.A. http://www.f-secure.com/v-descs/mabir.shtml.
    • Worm:SymbOS/Mabir.A
  • 6
    • 78651329896 scopus 로고    scopus 로고
    • July
    • LandScan. http://www.ornl.gov/sci/landscan/ (July 2010).
    • (2010) LandScan
  • 8
    • 78650018195 scopus 로고    scopus 로고
    • July
    • UDel Models. http://www.udelmodels.eecis.udel.edu/ (July 2010).
    • (2010) UDel Models
  • 11
    • 34047180005 scopus 로고    scopus 로고
    • Studying bluetooth malware propagation: The bluebag project
    • CARETTONI, L., MERLONI, C., AND ZANERO, S. Studying bluetooth malware propagation: The bluebag project. IEEE Security and Privacy 5, 2 (2007), 17–25.
    • (2007) IEEE Security and Privacy , vol.5 , Issue.2 , pp. 17-25
    • Carettoni, L.1    Merloni, C.2    Zanero, S.3
  • 12
    • 84922876220 scopus 로고    scopus 로고
    • Epinet: A simulation framework to study the spread of malware in wireless networks
    • ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
    • CHANNAKESHAVA, K., CHAFEKAR, D., BISSET, K., KUMAR, V., AND MARATHE, M. EpiNet: a simulation framework to study the spread of malware in wireless networks. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques (2009), ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–10.
    • (2009) Proceedings of the 2nd International Conference on Simulation Tools and Techniques , pp. 1-10
    • Channakeshava, K.1    Chafekar, D.2    Bisset, K.3    Kumar, V.4    Marathe, M.5
  • 13
    • 85080779234 scopus 로고    scopus 로고
    • I-Jetty turns android cellphone into mobile web-server
    • Mar
    • DAVIES, C. i-Jetty turns Android cellphone into mobile web-server. phonemag (Mar. 2008).
    • (2008) Phonemag
    • Davies, C.1
  • 17
    • 33750733586 scopus 로고    scopus 로고
    • Malware goes mobile
    • HYPPONEN, M. Malware goes mobile. Scientific American 295, 5 (2006), 70–77.
    • (2006) Scientific American , vol.295 , Issue.5 , pp. 70-77
    • Hypponen, M.1
  • 20
    • 55049136478 scopus 로고    scopus 로고
    • Realistic mobility simulation of urban mesh networks
    • KIM, J., SRIDHARA, V., AND BOHACEK, S. Realistic mobility simulation of urban mesh networks. Ad Hoc Networks 7, 2 (2009), 411–430.
    • (2009) Ad Hoc Networks , vol.7 , Issue.2 , pp. 411-430
    • Kim, J.1    Sridhara, V.2    Bohacek, S.3
  • 22
    • 0023997770 scopus 로고
    • The application of epidemiology to computer viruses
    • MURRAY, W. The application of epidemiology to computer viruses. Computers & Security 7, 2 (1988), 139–145.
    • (1988) Computers & Security , vol.7 , Issue.2 , pp. 139-145
    • Murray, W.1
  • 23
    • 0035794256 scopus 로고    scopus 로고
    • Epidemic spreading in scale-free networks
    • PASTOR-SATORRAS, R., AND VESPIGNANI, A. Epidemic spreading in scale-free networks. Physical review letters 86, 14 (2001), 3200–3203.
    • (2001) Physical Review Letters , vol.86 , Issue.14 , pp. 3200-3203
    • Pastor-Satorras, R.1    Vespignani, A.2
  • 29
    • 85080788037 scopus 로고    scopus 로고
    • Worm propagation dynamics in wireless sensor networks
    • SUN, B., YAN, G., AND XIAO, Y. Worm Propagation Dynamics in Wireless Sensor Networks. Communications (2008), 19–23.
    • (2008) Communications , pp. 19-23
    • Sun, B.1    Yan, G.2    Xiao, Y.3
  • 30
    • 85080711161 scopus 로고    scopus 로고
    • Exploiting temporal complex network metrics in mobile malware containment
    • TANG, J., MASCOLO, C., MUSOLESI, M., AND LATORA, V. Exploiting Temporal Complex Network Metrics in Mobile Malware Containment. Sat 9, 10–11.
    • Sat , vol.9 , pp. 10-11
    • Tang, J.1    Mascolo, C.2    Musolesi, M.3    Latora, V.4
  • 32
    • 66349131932 scopus 로고    scopus 로고
    • Understanding the spreading patterns of mobile phone viruses
    • WANG, P., GONZALEZ, M., HIDALGO, C., AND BARABASI, A. Understanding the spreading patterns of mobile phone viruses. Science 324, 5930 (2009), 1071.
    • (2009) Science , vol.324 , Issue.5930 , pp. 1071
    • Wang, P.1    Gonzalez, M.2    Hidalgo, C.3    Barabasi, A.4
  • 34
    • 58849141571 scopus 로고    scopus 로고
    • Modeling propagation dynamics of bluetooth worms (extended version)
    • YAN, G., AND EIDENBENZ, S. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). IEEE transactions on mobile computing (2008), 353–368.
    • (2008) IEEE Transactions on Mobile Computing , pp. 353-368
    • Yan, G.1    Eidenbenz, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.