-
4
-
-
85080732032
-
-
Worm:SymbOS/Mabir.A. http://www.f-secure.com/v-descs/mabir.shtml.
-
Worm:SymbOS/Mabir.A
-
-
-
6
-
-
78651329896
-
-
July
-
LandScan. http://www.ornl.gov/sci/landscan/ (July 2010).
-
(2010)
LandScan
-
-
-
8
-
-
78650018195
-
-
July
-
UDel Models. http://www.udelmodels.eecis.udel.edu/ (July 2010).
-
(2010)
UDel Models
-
-
-
11
-
-
34047180005
-
Studying bluetooth malware propagation: The bluebag project
-
CARETTONI, L., MERLONI, C., AND ZANERO, S. Studying bluetooth malware propagation: The bluebag project. IEEE Security and Privacy 5, 2 (2007), 17–25.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 17-25
-
-
Carettoni, L.1
Merloni, C.2
Zanero, S.3
-
12
-
-
84922876220
-
Epinet: A simulation framework to study the spread of malware in wireless networks
-
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
-
CHANNAKESHAVA, K., CHAFEKAR, D., BISSET, K., KUMAR, V., AND MARATHE, M. EpiNet: a simulation framework to study the spread of malware in wireless networks. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques (2009), ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), pp. 1–10.
-
(2009)
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
, pp. 1-10
-
-
Channakeshava, K.1
Chafekar, D.2
Bisset, K.3
Kumar, V.4
Marathe, M.5
-
13
-
-
85080779234
-
I-Jetty turns android cellphone into mobile web-server
-
Mar
-
DAVIES, C. i-Jetty turns Android cellphone into mobile web-server. phonemag (Mar. 2008).
-
(2008)
Phonemag
-
-
Davies, C.1
-
15
-
-
85080702535
-
The threat of mobile worms
-
FOUQUET, M., AFSHAR, E., AND CARLE, G. The Threat of Mobile Worms. In THIRD ERCIM WORKSHOP ON EMOBILITY, p. 89.
-
THIRD ERCIM WORKSHOP on EMOBILITY
, pp. 89
-
-
Fouquet, M.1
Afshar, E.2
Carle, G.3
-
17
-
-
33750733586
-
Malware goes mobile
-
HYPPONEN, M. Malware goes mobile. Scientific American 295, 5 (2006), 70–77.
-
(2006)
Scientific American
, vol.295
, Issue.5
, pp. 70-77
-
-
Hypponen, M.1
-
20
-
-
55049136478
-
Realistic mobility simulation of urban mesh networks
-
KIM, J., SRIDHARA, V., AND BOHACEK, S. Realistic mobility simulation of urban mesh networks. Ad Hoc Networks 7, 2 (2009), 411–430.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.2
, pp. 411-430
-
-
Kim, J.1
Sridhara, V.2
Bohacek, S.3
-
21
-
-
0742276097
-
Inside the slammer worm
-
MOORE, D., PAXSON, V., SAVAGE, S., SHANNON, C., STANIFORD, S., AND WEAVER, N. Inside the slammer worm. Security & Privacy, IEEE 1, 4 (2003), 33–39.
-
(2003)
Security & Privacy, IEEE
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
22
-
-
0023997770
-
The application of epidemiology to computer viruses
-
MURRAY, W. The application of epidemiology to computer viruses. Computers & Security 7, 2 (1988), 139–145.
-
(1988)
Computers & Security
, vol.7
, Issue.2
, pp. 139-145
-
-
Murray, W.1
-
23
-
-
0035794256
-
Epidemic spreading in scale-free networks
-
PASTOR-SATORRAS, R., AND VESPIGNANI, A. Epidemic spreading in scale-free networks. Physical review letters 86, 14 (2001), 3200–3203.
-
(2001)
Physical Review Letters
, vol.86
, Issue.14
, pp. 3200-3203
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
24
-
-
55649121612
-
Dynamic models for computer viruses
-
PIQUEIRA, J., DE VASCONCELOS, A., GABRIEL, C., AND ARAUJO, V. Dynamic models for computer viruses. Computers & Security 27, 7-8 (2008), 355–359.
-
(2008)
Computers & Security
, vol.27
, Issue.7-8
, pp. 355-359
-
-
Piqueira, J.1
de Vasconcelos, A.2
Gabriel, C.3
Araujo, V.4
-
25
-
-
49649085629
-
On using mobility to propagate malware
-
Citeseer
-
SARAT, S., AND TERZIS, A. On using mobility to propagate malware. In Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Network (WiOpt) (2007), Citeseer.
-
(2007)
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Network (WiOpt)
-
-
Sarat, S.1
Terzis, A.2
-
28
-
-
34547218865
-
A preliminary investigation of worm infections in a bluetooth environment
-
ACM
-
SU, J., CHAN, K., MIKLAS, A., PO, K., AKHAVAN, A., SAROIU, S., DE LARA, E., AND GOEL, A. A preliminary investigation of worm infections in a bluetooth environment. In Proceedings of the 4th ACM workshop on Recurring malcode (2006), ACM, p. 16.
-
(2006)
Proceedings of the 4th ACM Workshop on Recurring Malcode
, pp. 16
-
-
Su, J.1
Chan, K.2
Miklas, A.3
Po, K.4
Akhavan, A.5
Saroiu, S.6
de Lara, E.7
Goel, A.8
-
29
-
-
85080788037
-
Worm propagation dynamics in wireless sensor networks
-
SUN, B., YAN, G., AND XIAO, Y. Worm Propagation Dynamics in Wireless Sensor Networks. Communications (2008), 19–23.
-
(2008)
Communications
, pp. 19-23
-
-
Sun, B.1
Yan, G.2
Xiao, Y.3
-
30
-
-
85080711161
-
Exploiting temporal complex network metrics in mobile malware containment
-
TANG, J., MASCOLO, C., MUSOLESI, M., AND LATORA, V. Exploiting Temporal Complex Network Metrics in Mobile Malware Containment. Sat 9, 10–11.
-
Sat
, vol.9
, pp. 10-11
-
-
Tang, J.1
Mascolo, C.2
Musolesi, M.3
Latora, V.4
-
32
-
-
66349131932
-
Understanding the spreading patterns of mobile phone viruses
-
WANG, P., GONZALEZ, M., HIDALGO, C., AND BARABASI, A. Understanding the spreading patterns of mobile phone viruses. Science 324, 5930 (2009), 1071.
-
(2009)
Science
, vol.324
, Issue.5930
, pp. 1071
-
-
Wang, P.1
Gonzalez, M.2
Hidalgo, C.3
Barabasi, A.4
-
34
-
-
58849141571
-
Modeling propagation dynamics of bluetooth worms (extended version)
-
YAN, G., AND EIDENBENZ, S. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). IEEE transactions on mobile computing (2008), 353–368.
-
(2008)
IEEE Transactions on Mobile Computing
, pp. 353-368
-
-
Yan, G.1
Eidenbenz, S.2
-
35
-
-
34748827408
-
Bluetooth worm propagation: Mobility pattern matters!
-
New York, NY, USA, ACM
-
YAN, G., FLORES, H. D., CUELLAR, L., HENGARTNER, N., EIDENBENZ, S., AND VU, V. Bluetooth worm propagation: mobility pattern matters! In ASIACCS’07: Proceedings of the 2nd ACM symposium on Information, computer and communications security (New York, NY, USA, 2007), ACM, pp. 32–44.
-
(2007)
ASIACCS’07: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 32-44
-
-
Yan, G.1
Flores, H.D.2
Cuellar, L.3
Hengartner, N.4
Eidenbenz, S.5
Vu, V.6
-
36
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
ACM
-
ZOU, C., GONG, W., AND TOWSLEY, D. Code red worm propagation modeling and analysis. In Proceedings of the 9th ACM conference on Computer and communications security (2002), ACM, pp. 138–147.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 138-147
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
|