Sciweavers

72 search results - page 9 / 15
» Thresholds for virus spread on networks
Sort
View
SAPIR
2004
Springer
14 years 1 months ago
Software Modeling for Open Distributed Network Monitoring Systems
Abstract. As computer networks grow in size, both physically and geographically, more scalable solutions to network administration are becoming necessary. This need is amplified by...
Jacob W. Kallman, Pedrum Minaie, Jason Truppi, Ser...
SODA
2008
ACM
184views Algorithms» more  SODA 2008»
13 years 10 months ago
On the approximability of influence in social networks
In this paper, we study the spread of influence through a social network, in a model initially studied by Kempe, Kleinberg and Tardos [14, 15]: We are given a graph modeling a soc...
Ning Chen
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 3 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
ICYCS
2008
IEEE
14 years 3 months ago
Propagation Model of Active Worms in P2P Networks
P2P worms pose heavy threatens to P2P networks. P2P worms exploit common vulnerabilities in member hosts of a P2P network and spread topologically in the P2P network, a potentiall...
Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, L...
INFOCOM
2009
IEEE
14 years 3 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem