Sciweavers

120 search results - page 2 / 24
» Modeling Malware Spreading Dynamics
Sort
View
INFOCOM
2010
IEEE
13 years 3 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
13 years 8 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
INFOCOM
2009
IEEE
13 years 11 months ago
Defending Mobile Phones from Proximity Malware
—As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable cha...
Gjergji Zyba, Geoffrey M. Voelker, Michael Liljens...
NDSS
2006
IEEE
13 years 11 months ago
Modeling Botnet Propagation Using Time Zones
Time zones play an important and unexplored role in malware epidemics. To understand how time and location affect malware spread dynamics, we studied botnets, or large coordinated...
David Dagon, Cliff Changchun Zou, Wenke Lee
ICNS
2009
IEEE
13 years 11 months ago
A Macro View of Viral Propagation and Its Persistence in Heterogeneous Wireless Networks
Now that smart phones can interact with computers through various interface technologies such as Bluetooth, infrared, or the 802.11 family of IEEE specifications, they are workin...
Hoai-Nam Nguyen, Yoichi Shinoda