2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering 2013
DOI: 10.1109/iciii.2013.6702953
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the spreading behavior of passive worms in mobile social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2018
2018

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Thus, in information loss evaluation, we only account for the generalization part, while the information loss caused by pre‐processing phase is not taken into consideration. In Memon et al and Adu‐Gyamfi et al, they adopt the reduction in the probability with which people can accurately determine the position of an object. In this paper, we measure the information loss by the ratio of the size of trajectory k‐anonymity region to the area size of the whole space, which is computed by .…”
Section: Resultsmentioning
confidence: 99%
“…Thus, in information loss evaluation, we only account for the generalization part, while the information loss caused by pre‐processing phase is not taken into consideration. In Memon et al and Adu‐Gyamfi et al, they adopt the reduction in the probability with which people can accurately determine the position of an object. In this paper, we measure the information loss by the ratio of the size of trajectory k‐anonymity region to the area size of the whole space, which is computed by .…”
Section: Resultsmentioning
confidence: 99%
“…Few approaches used in association rule hiding are heuristic‐based approaches [21], exact approaches [22], reconstruction‐based approaches [23], cryptography‐based approaches [24], and border‐based approaches [25]. Recently, for association rule mining with privacy preservation, heuristic approaches are used extensively.…”
Section: Introductionmentioning
confidence: 99%
“…[2][3][4][5] Hence, a secure authentication and key agreement scheme should be used to thwart security attacks. [2][3][4][5] Hence, a secure authentication and key agreement scheme should be used to thwart security attacks.…”
Section: Introductionmentioning
confidence: 99%
“…However, since wireless communications rely on open and public transmission media, the adversaries can launch various security attacks, including eavesdropping, masquerading, and tampering. [2][3][4][5] Hence, a secure authentication and key agreement scheme should be used to thwart security attacks. [6][7][8][9] It is obvious that the conventional authentication schemes are not suitable for GLOMONETs.…”
Section: Introductionmentioning
confidence: 99%