A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

An incentive framework for cellular traffic offloading

X Zhuo, W Gao, G Cao, S Hua - IEEE transactions on mobile …, 2013 - ieeexplore.ieee.org
Cellular networks (eg, 3G) are currently facing severe traffic overload problems caused by
excessive traffic demands. Offloading part of the cellular traffic through other forms of …

A social network based patching scheme for worm containment in cellular networks

Z Zhu, G Cao, S Zhu, S Ranjan, A Nucci - Handbook of Optimization in …, 2012 - Springer
Recently, cellular phone networks have begun allowing third-party applications to run over
certain open-API phone operating systems such as Windows Mobile, Iphone and Google's …

Modeling and restraining mobile virus propagation

C Gao, J Liu - IEEE transactions on mobile computing, 2012 - ieeexplore.ieee.org
Viruses and malwares can spread from computer networks into mobile networks with the
rapid growth of smart cellphone users. In a mobile network, viruses and malwares can cause …

Can you infect me now? Malware propagation in mobile phone networks

C Fleizach, M Liljenstam, P Johansson… - Proceedings of the …, 2007 - dl.acm.org
In this paper we evaluate the effects of malware propagating usingcommunication services
in mobile phone networks. Although self-propagating malware is well understood in the …

Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models

T Courtney, S Gaonkar, K Keefe… - 2009 IEEE/IFIP …, 2009 - ieeexplore.ieee.org
Mobius 2.3 is an extensible dependability, security, and performance modeling environment
for large-scale discrete-event systems. It provides multiple model formalisms and solution …

Applications of temporal graph metrics to real-world networks

J Tang, I Leontiadis, S Scellato, V Nicosia, C Mascolo… - Temporal …, 2013 - Springer
Real world networks exhibit rich temporal information: friends are added and removed over
time in online social networks; the seasons dictate the predator-prey relationship in food …

Defending mobile phones from proximity malware

G Zyba, GM Voelker, M Liljenstam, A Méhes… - IEEE INFOCOM …, 2009 - ieeexplore.ieee.org
As mobile phones increasingly become the target of propagating malware, their use of direct
pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable …

Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones

S Peng, G Wang, S Yu - Journal of Computer and System Sciences, 2013 - Elsevier
Smartphones combine the communication capabilities of cellphones and the functions of
PDA (personal digital assistant), which enable us to access a large variety of ubiquitous …

Exploiting temporal complex network metrics in mobile malware containment

J Tang, C Mascolo, M Musolesi… - 2011 IEEE International …, 2011 - ieeexplore.ieee.org
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts,
similar to the propagation of human and other biological viruses. Recent work has employed …