CJ Rhodes, M Nekovee - Physica A: Statistical Mechanics and Its …, 2008 - Elsevier
The ubiquity of portable wireless-enabled computing and communications devices has stimulated the emergence of malicious codes (wireless worms) that are capable of …
We describe a modeling framework to study the spread of malware over realistic wireless networks. We develop (i) methods for generating synthetic, yet realistic wireless networks …
J Leveille - Hpl-2002-287, School of Cognitive and Computing …, 2002 - Citeseer
Lately, computer worms have become a major problem for large computer networks, causing considerable amounts of resources and time to be spent recovering from large …
Y Wang, S Wen, Y Xiang, W Zhou - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
There are the two common means for propagating worms: scanning vulnerable computers in the network and spreading through topological neighbors. Modeling the propagation of …
CC Zou, D Towsley, W Gong - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
As many people rely on e-mail communications for business and everyday life, Internet e- mail worms constitute one of the major security threats for our society. Unlike scanning …
S Tanachaiwiwat, A Helmy - IEEE INFOCOM, 2006 - Citeseer
The highlight of worm outbreaks in 2004 was a new phenomenon called 'War of the Worms' between NetSky, Bagle and MyDoom worm variants. Their aftermaths caused the record …
T Vogt - SecuriTeam. com review 23rd Oct, 2003 - infocon.org
This paper describes a series of simulations run to estimate various worm growth patterns and their corresponding propagation algorithms. It also tests and verifies the impact of …
S Tanachaiwiwat, A Helmy - Ad Hoc Networks, 2009 - Elsevier
An encounter-based network is a frequently disconnected wireless ad hoc network requiring immediate neighbors to store and forward aggregated data for information disseminations …
Z Lu, W Wang, C Wang - IEEE Transactions on Mobile …, 2015 - ieeexplore.ieee.org
A botnet in mobile networks is a collection of compromised nodes due to mobile malware, which are able to perform coordinated attacks. Different from Internet botnets, mobile botnets …