The large-scale adoption of vehicle-to-vehicle (V2V) communication technologies risks to significantly widen the attack surface available to mobile malware targeting critical automobile operations. Given that outbreaks of vehicular computer worms self-propagating through V2V links could pose a significant threat to road traffic safety, it is important to understand the dynamics of such epidemics and to prepare adequate countermeasures. In this paper we perform a comprehensive characterization of the infection process of variously behaving vehicular worms on a road traffic scenario of unprecedented scale and heterogeneity. We then propose a simple yet effective data-driven model of the worm epidemics, and we show how it can be leveraged for ...
The mobile networks have increasingly facilitated our daily life but are also breeding grounds for m...
Abstract—A botnet in mobile networks is a collection of compromised nodes due to mobile malware, whi...
Part 6: Network ScienceInternational audienceShort-range, point-to-point communications for mobile u...
The large-scale adoption of vehicle-to-vehicle (V2V) communication technologies risks to significant...
Abstract—The large-scale adoption of vehicle-to-vehicle (V2V) communication technologies risks to si...
Connected vehicles promise to enable a wide range of new automotive services that will improve road ...
Abstract—Connected vehicles promise to enable a wide range of new automotive services that will impr...
Network attacking using malware has become very popular on the Internet and in many other networks, ...
VANETs are the essential component of the intelligent transport system, which attract research and i...
In this study we developed a macroscopic model for simulating the vehicle to vehicle communication p...
The propagation of software viruses over a vehicular network where vehicles communicate via V2V link...
Mathematical epidemiology has been developing for over a hundred years. Mathematical models develope...
Mobility can be exploited to spread malware among wireless nodes moving across network domains. Beca...
Part of the wider development and monitoring of smart environments for an intelligent cities approac...
Worms spreading directly between cell-phones over short-range radio (Bluetooth, WiFi, etc.) are incr...
The mobile networks have increasingly facilitated our daily life but are also breeding grounds for m...
Abstract—A botnet in mobile networks is a collection of compromised nodes due to mobile malware, whi...
Part 6: Network ScienceInternational audienceShort-range, point-to-point communications for mobile u...
The large-scale adoption of vehicle-to-vehicle (V2V) communication technologies risks to significant...
Abstract—The large-scale adoption of vehicle-to-vehicle (V2V) communication technologies risks to si...
Connected vehicles promise to enable a wide range of new automotive services that will improve road ...
Abstract—Connected vehicles promise to enable a wide range of new automotive services that will impr...
Network attacking using malware has become very popular on the Internet and in many other networks, ...
VANETs are the essential component of the intelligent transport system, which attract research and i...
In this study we developed a macroscopic model for simulating the vehicle to vehicle communication p...
The propagation of software viruses over a vehicular network where vehicles communicate via V2V link...
Mathematical epidemiology has been developing for over a hundred years. Mathematical models develope...
Mobility can be exploited to spread malware among wireless nodes moving across network domains. Beca...
Part of the wider development and monitoring of smart environments for an intelligent cities approac...
Worms spreading directly between cell-phones over short-range radio (Bluetooth, WiFi, etc.) are incr...
The mobile networks have increasingly facilitated our daily life but are also breeding grounds for m...
Abstract—A botnet in mobile networks is a collection of compromised nodes due to mobile malware, whi...
Part 6: Network ScienceInternational audienceShort-range, point-to-point communications for mobile u...