Smartphone malware and its propagation modeling: A survey

S Peng, S Yu, A Yang - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
Smartphones are pervasively used in society, and have been both the target and victim of
malware writers. Motivated by the significant threat that presents to legitimate users, we …

Scalable molecular dynamics with NAMD

JC Phillips, R Braun, W Wang… - Journal of …, 2005 - Wiley Online Library
NAMD is a parallel molecular dynamics code designed for high‐performance simulation of
large biomolecular systems. NAMD scales to hundreds of processors on high‐end parallel …

Modeling, analysis, and mitigation of dynamic botnet formation in wireless IoT networks

MJ Farooq, Q Zhu - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) relies heavily on wireless communication devices that are able
to discover and interact with other wireless devices in their vicinity. The communication …

[图书][B] Parallel science and engineering applications: The Charm++ approach

LV Kale, A Bhatele - 2016 - books.google.com
This book highlights the use of Charm++ in a wide variety of scientific and engineering
fields. It emphasizes the adaptivity, asynchrony, and message-driven execution of Charm++ …

Modeling interaction between individuals, social networks and public policy to support public health epidemiology

KR Bisset, X Feng, M Marathe… - Proceedings of the 2009 …, 2009 - ieeexplore.ieee.org
Human behavior, social networks, and civil infrastructure are closely intertwined.
Understanding their co-evolution is critical for designing public policies. Human behaviors …

On the evolution and impact of mobile botnets in wireless networks

Z Lu, W Wang, C Wang - IEEE Transactions on Mobile …, 2015 - ieeexplore.ieee.org
A botnet in mobile networks is a collection of compromised nodes due to mobile malware,
which are able to perform coordinated attacks. Different from Internet botnets, mobile botnets …

Discovering obscure sightseeing spots by analysis of geo-tagged social images

C Zhuang, Q Ma, X Liang, M Yoshikawa - Proceedings of the 2015 IEEE …, 2015 - dl.acm.org
In contrast to conventional studies of discovering hot spots, by analyzing geo-tagged images
on Flickr, we introduce novel methods to discover obscure sightseeing spots that are less …

Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental study

A Sanatinia, S Narain, G Noubir - 2013 IEEE Conference on …, 2013 - ieeexplore.ieee.org
WiFi Access Points (APs) are ideal targets of attack. They have access to home internal
networks which allows an adversary to easily carry out man-in-the-middle attacks and …

An agent-based modeling framework for cybersecurity in mobile tactical networks

B Thompson, J Morris-King - The Journal of Defense …, 2018 - journals.sagepub.com
Mobile tactical networks facilitate communication, coordination, and information
dissemination between soldiers in the field. Their increasing use provides important …

A study on formal methods to generalize heterogeneous mobile malware propagation and their impacts

A Mahboubi, S Camtepe, H Morarji - IEEE Access, 2017 - ieeexplore.ieee.org
Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are
becoming essential elements of our modern lives. Their large-scale pervasive deployment …