Abstract—Due to the critical security threats imposed by email-based malware in recent years, modeling the propagation dynamics of email malware becomes a fundamental technique for predicting its potential damages and developing effective countermeasures. Compared to earlier versions of email malware, modern email malware exhibits two new features, reinfection and self-start. Reinfection refers to the malware behavior that modern email malware sends out malware copies whenever any healthy or infected recipients open the malicious attachment. Self-start refers to the behavior that malware starts to spread whenever compromised computers restart or certain files are visited. In the literature, several models are proposed for email malware prop...
Social network worms, such as email worms and facebook worms, pose a critical security threat to the...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Malware is pervasive in networks, and poses a critical threat to network security. However, we have ...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Abstract — In recent years, email is the basic service for person to person communication, and emai...
In recent years, the security threats imposed by email-based malware, modeling the propagation analy...
Email worms propagate across networks by taking advantage of email relationships. Modeling the propa...
In this paper we present analytical techniques that can be used to better understand the behavior of...
We analyze real data sets from two e-mail viruses, the Magistr.b and the Sircam.a to explore how we ...
In light of the rise of malicious attacks on the internet and the various networks and applications ...
The Email Mining Toolkit (EMT) is a data mining system that computes behavior profiles or models of ...
We introduce the Email Mining Toolkit (EMT), a system that implements behavior-based methods to imp...
A new model for malicious file propagation and transmission in a computer network is formulated. Thi...
Social network worms, such as email worms and facebook worms, pose a critical security threat to the...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Malware is pervasive in networks, and poses a critical threat to network security. However, we have ...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Due to the critical security threats imposed by email-based malware in recent years, modeling the pr...
Abstract — In recent years, email is the basic service for person to person communication, and emai...
In recent years, the security threats imposed by email-based malware, modeling the propagation analy...
Email worms propagate across networks by taking advantage of email relationships. Modeling the propa...
In this paper we present analytical techniques that can be used to better understand the behavior of...
We analyze real data sets from two e-mail viruses, the Magistr.b and the Sircam.a to explore how we ...
In light of the rise of malicious attacks on the internet and the various networks and applications ...
The Email Mining Toolkit (EMT) is a data mining system that computes behavior profiles or models of ...
We introduce the Email Mining Toolkit (EMT), a system that implements behavior-based methods to imp...
A new model for malicious file propagation and transmission in a computer network is formulated. Thi...
Social network worms, such as email worms and facebook worms, pose a critical security threat to the...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Malware is pervasive in networks, and poses a critical threat to network security. However, we have ...