Sciweavers

91 search results - page 2 / 19
» Technological networks and the spread of computer viruses
Sort
View
WS
2005
ACM
14 years 1 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble
SRDS
2003
IEEE
14 years 1 months ago
Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint
How will a virus propagate in a real network? Does an epidemic threshold exist for a finite powerlaw graph, or any finite graph? How long does it take to disinfect a network giv...
Yang Wang 0008, Deepayan Chakrabarti, Chenxi Wang,...
SP
1989
IEEE
101views Security Privacy» more  SP 1989»
13 years 12 months ago
With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988
In early November 1988 the Internet, a collection of networks consisting of 60,000 host computers implementing the TCP/IP protocol suite, was attacked by a virus, a programwhich b...
Mark W. Eichin, Jon A. Rochlis
AAAI
2008
13 years 10 months ago
Minimizing the Spread of Contamination by Blocking Links in a Network
We address the problem of minimizing the propagation of undesirable things, such as computer viruses or malicious rumors, by blocking a limited number of links in a network, a dua...
Masahiro Kimura, Kazumi Saito, Hiroshi Motoda
NETWORKING
2011
12 years 10 months ago
Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point
Short-range, point-to-point communications for mobile users enjoy increasing popularity, particularly with the rise in Bluetooth-equipped mobile devices. Unfortunately, virus write...
Nicholas Valler, B. Aditya Prakash, Hanghang Tong,...