Smartphone malware and its propagation modeling: A survey
S Peng, S Yu, A Yang - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
Smartphones are pervasively used in society, and have been both the target and victim of
malware writers. Motivated by the significant threat that presents to legitimate users, we …
malware writers. Motivated by the significant threat that presents to legitimate users, we …
Modeling the propagation of worms in networks: A survey
There are the two common means for propagating worms: scanning vulnerable computers in
the network and spreading through topological neighbors. Modeling the propagation of …
the network and spreading through topological neighbors. Modeling the propagation of …
A survey on influence maximization in a social network
Given a social network with diffusion probabilities as edge weights and a positive integer k,
which k nodes should be chosen for initial injection of information to maximize the influence …
which k nodes should be chosen for initial injection of information to maximize the influence …
Analysis of online social network connections for identification of influential users: Survey and open research issues
Online social networks (OSNs) are structures that help users to interact, exchange, and
propagate new ideas. The identification of the influential users in OSNs is a significant …
propagate new ideas. The identification of the influential users in OSNs is a significant …
A sword with two edges: Propagation studies on both positive and negative information in online social networks
Online social networks (OSN) have become one of the major platforms for people to
exchange information. Both positive information (eg, ideas, news and opinions) and …
exchange information. Both positive information (eg, ideas, news and opinions) and …
An incentive framework for cellular traffic offloading
Cellular networks (eg, 3G) are currently facing severe traffic overload problems caused by
excessive traffic demands. Offloading part of the cellular traffic through other forms of …
excessive traffic demands. Offloading part of the cellular traffic through other forms of …
Epidemic information dissemination in mobile social networks with opportunistic links
With the advancement of smartphones, mobile social networks (MSNs) have emerged
where information can be shared among mobile users via opportunistic peer-to-peer links …
where information can be shared among mobile users via opportunistic peer-to-peer links …
Modeling and stability analysis of worm propagation in wireless sensor network
L Feng, L Song, Q Zhao, H Wang - Mathematical Problems in …, 2015 - Wiley Online Library
An improved SIRS model considering communication radius and distributed density of
nodes is proposed. The proposed model captures both the spatial and temporal dynamics of …
nodes is proposed. The proposed model captures both the spatial and temporal dynamics of …
To shut them up or to clarify: Restraining the spread of rumors in online social networks
Restraining the spread of rumors in online social networks (OSNs) has long been an
important but difficult problem to be addressed. Currently, there are mainly two types of …
important but difficult problem to be addressed. Currently, there are mainly two types of …
[HTML][HTML] IoTSecSim: A framework for modelling and simulation of security in Internet of things
The proliferation of the Internet of Things (IoT) devices has provided attackers with
tremendous opportunities to launch various cyber-attacks. It has been challenging to …
tremendous opportunities to launch various cyber-attacks. It has been challenging to …