2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2011
DOI: 10.1109/wowmom.2011.5986463
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting temporal complex network metrics in mobile malware containment

Abstract: Abstract-Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed models from epidemiology and complex networks to analyse the spread of malware and the effect of patching specific nodes. These approaches have adopted a static view of the mobile networks, i.e., by aggregating all the edges that appear over time, which leads to an approximate representation of the real interactions: instead,… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 40 publications
(31 citation statements)
references
References 19 publications
0
28
0
Order By: Relevance
“…In this context, temporal network modeling and analysis of various temporal centrality measures (see Sect. IV I) can be used for designing strategies for containing the spread of malware in mobile devices [146].…”
Section: A Person-to-person Communicationmentioning
confidence: 99%
“…In this context, temporal network modeling and analysis of various temporal centrality measures (see Sect. IV I) can be used for designing strategies for containing the spread of malware in mobile devices [146].…”
Section: A Person-to-person Communicationmentioning
confidence: 99%
“…In time-varying networks the analytical study of contagion processes is hindered by the difficulties in dealing with the concurrent time scales of the contagion and network evolution processes. [34][35][36][37][38][39]. In the case of activity driven networks however it is possible to derive the mean-field level dynamical equations describing the contagion process by defining the activity block variable I t a and S t a that represent the number of infected and susceptible individuals, respectively, in the class of activity a at time t. From those quantity it is possible to derive the mean-field evolution of the number of infected individuals of class a at time t + 1 as…”
mentioning
confidence: 99%
“…Tang et al [92] studied the spreading of malwares via bluetooth and efficient way to contain them. They considered three different datasets: the MIT reality mining data mentioned before, the interaction between researchers at the University of Cambridge [93], and those between participants of a conference [94].…”
Section: Controlling Contagion Processes In Real Temporal Networkmentioning
confidence: 99%