[PDF][PDF] Proximity Breeds Danger: Emerging Threats in Metro-area Wireless Networks.

P Akritidis, WY Chin, Vinh The Lam… - USENIX Security …, 2007 - usenix.org
The growing popularity of wireless networks and mobile devices is starting to attract
unwanted attention especially as potential targets for malicious activities reach critical mass …

Mathematical modeling of the propagation of malware: a review

AM del Rey - Security and Communication Networks, 2015 - Wiley Online Library
In the present work, we offer a critical review of the mathematical models that have been
proposed to date to simulate malware propagation in a network of computers or mobile …

A topologically-aware worm propagation model for wireless sensor networks

SA Khayam, H Radha - 25th IEEE international conference on …, 2005 - ieeexplore.ieee.org
Internet worms have repeatedly revealed the susceptibility of network hosts to malicious
intrusions. Recent studies have proposed to employ the underlying principles of worm …

Commwarrior worm propagation model for smart phone networks

XIA Wei, Z LI, Z CHEN, Z YUAN - The Journal of China Universities of Posts …, 2008 - Elsevier
Commwarrior worm is capable of spreading through both Bluetooth and multimedia
messaging service (MMS) in smart phone networks. According to the propagation …

Agent‐based modeling of malware dynamics in heterogeneous environments

A Bose, KG Shin - Security and Communication Networks, 2013 - Wiley Online Library
The increasing convergence of power‐law networks such as social networking and peer‐to‐
peer applications, web‐delivered applications, and mobile platforms makes today's users …

DAW: A distributed antiworm system

S Chen, Y Tang - IEEE Transactions on Parallel and Distributed …, 2007 - ieeexplore.ieee.org
A worm automatically replicates itself across networks and may infect millions of servers in a
short period of time. It is conceivable that the cyberterrorists may use a widespread worm to …