Worm epidemics in wireless ad hoc networks

M Nekovee - New Journal of Physics, 2007 - iopscience.iop.org
A dramatic increase in the number of computing devices with wireless communication
capability has resulted in the emergence of a new class of computer worms which …

The opportunistic transmission of wireless worms between mobile devices

CJ Rhodes, M Nekovee - Physica A: Statistical Mechanics and Its …, 2008 - Elsevier
The ubiquity of portable wireless-enabled computing and communications devices has
stimulated the emergence of malicious codes (wireless worms) that are capable of …

EpiNet: a simulation framework to study the spread of malware in wireless networks

K Channakeshava, D Chafekar, K Bisset… - 2nd International ICST …, 2010 - eudl.eu
We describe a modeling framework to study the spread of malware over realistic wireless
networks. We develop (i) methods for generating synthetic, yet realistic wireless networks …

[PDF][PDF] Epidemic spreading in technological networks

J Leveille - Hpl-2002-287, School of Cognitive and Computing …, 2002 - Citeseer
Lately, computer worms have become a major problem for large computer networks,
causing considerable amounts of resources and time to be spent recovering from large …

Modeling the propagation of worms in networks: A survey

Y Wang, S Wen, Y Xiang, W Zhou - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
There are the two common means for propagating worms: scanning vulnerable computers in
the network and spreading through topological neighbors. Modeling the propagation of …

Modeling and simulation study of the propagation and defense of internet e-mail worms

CC Zou, D Towsley, W Gong - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
As many people rely on e-mail communications for business and everyday life, Internet e-
mail worms constitute one of the major security threats for our society. Unlike scanning …

[PDF][PDF] VACCINE: War of the worms in wired and wireless networks

S Tanachaiwiwat, A Helmy - IEEE INFOCOM, 2006 - Citeseer
The highlight of worm outbreaks in 2004 was a new phenomenon called 'War of the Worms'
between NetSky, Bagle and MyDoom worm variants. Their aftermaths caused the record …

[PDF][PDF] Simulating and optimising worm propagation algorithms

T Vogt - SecuriTeam. com review 23rd Oct, 2003 - infocon.org
This paper describes a series of simulations run to estimate various worm growth patterns
and their corresponding propagation algorithms. It also tests and verifies the impact of …

Encounter-based worms: Analysis and defense

S Tanachaiwiwat, A Helmy - Ad Hoc Networks, 2009 - Elsevier
An encounter-based network is a frequently disconnected wireless ad hoc network requiring
immediate neighbors to store and forward aggregated data for information disseminations …

On the evolution and impact of mobile botnets in wireless networks

Z Lu, W Wang, C Wang - IEEE Transactions on Mobile …, 2015 - ieeexplore.ieee.org
A botnet in mobile networks is a collection of compromised nodes due to mobile malware,
which are able to perform coordinated attacks. Different from Internet botnets, mobile botnets …