Worms spreading directly between cell-phones over short-range radio (Bluetooth, WiFi, etc.) are increasing rapidly. Communication by these technologies is opportunistic and has very close relation with the social characteristics of the phone carriers. In this paper, we try to evaluate the impact of different characteristics on the spreading performance of worms. On the other hand, the behaviors of worms may have certain impact, too. For example, worms may make phones be completely dysfunctional and these phones can be seen as killed. We study the impact of the killing speed. Using the Markov model, we propose some theoretical models to evaluate the spreading performance in different cases. Simulation results show the accuracy of our m...
Mobile Ad-hoc Networks (MANETs) are used for emer-gency situations like disasterrelief, military app...
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to t...
Abstract—Malware attacks constitute a serious security risk that threatens to slow down the large sc...
The mobile networks have increasingly facilitated our daily life but are also breeding grounds for m...
The alarm that worms start to spread on increasingly popu-lar mobile devices calls for an in-depth i...
Part 6: Network ScienceInternational audienceShort-range, point-to-point communications for mobile u...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
Millions of users world-wide are sharing content using the Peer-to-Peer (P2P) client network. While ...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
Viruses that infect smartphones are emerging as a new research area in the fight against com-puter v...
Abstract- Independent-operating attacks in modern communication networks have become increasingly po...
Abstract—In the last few years, the growing popularity of mobile devices has made them attractive to...
Smartphone applications are getting more and more popular and pervasive in our daily life, and are a...
Smart devices interconnected through Internet became one of everyday items. In particular, we are no...
Mathematical epidemiology has been developing for over a hundred years. Mathematical models develope...
Mobile Ad-hoc Networks (MANETs) are used for emer-gency situations like disasterrelief, military app...
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to t...
Abstract—Malware attacks constitute a serious security risk that threatens to slow down the large sc...
The mobile networks have increasingly facilitated our daily life but are also breeding grounds for m...
The alarm that worms start to spread on increasingly popu-lar mobile devices calls for an in-depth i...
Part 6: Network ScienceInternational audienceShort-range, point-to-point communications for mobile u...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
Millions of users world-wide are sharing content using the Peer-to-Peer (P2P) client network. While ...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
Viruses that infect smartphones are emerging as a new research area in the fight against com-puter v...
Abstract- Independent-operating attacks in modern communication networks have become increasingly po...
Abstract—In the last few years, the growing popularity of mobile devices has made them attractive to...
Smartphone applications are getting more and more popular and pervasive in our daily life, and are a...
Smart devices interconnected through Internet became one of everyday items. In particular, we are no...
Mathematical epidemiology has been developing for over a hundred years. Mathematical models develope...
Mobile Ad-hoc Networks (MANETs) are used for emer-gency situations like disasterrelief, military app...
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to t...
Abstract—Malware attacks constitute a serious security risk that threatens to slow down the large sc...