Sciweavers

6 search results - page 2 / 2
» An Information-Theoretic Approach to Model Identification in...
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 4 days ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...