2012
DOI: 10.1109/tdsc.2012.72
|View full text |Cite
|
Sign up to set email alerts
|

Virus Propagation in Heterogeneous Bluetooth Networks with Human Behaviors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…In this section, we propose a feasible algorithm to compute the propagation power of virus in large-scale dynamic networks based on dynamic community mining algorithm in [26], which can efficiently evaluate the propagation risk of virus in a community network.…”
Section: Calculating Propagation Power In Dynamic Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…In this section, we propose a feasible algorithm to compute the propagation power of virus in large-scale dynamic networks based on dynamic community mining algorithm in [26], which can efficiently evaluate the propagation risk of virus in a community network.…”
Section: Calculating Propagation Power In Dynamic Networkmentioning
confidence: 99%
“…But in a large-scale dynamic network, immunization strategy should cover 80% of nodes by stochastic immunization strategy or the whole topology should be known using a special immunization strategy [13,14]. Through local strategies, once a node finds itself infected, it sends an antivirus message to others immediately and the virus can be cleared accordingly [23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of these works are based on continuous mathematical tools such as systems of ordinary differential equations (see [5][6][7][8][9][10][11][12]). These type of models does not take into account local interactions between the smartphones, assume that the elements forming the network are distributed homogeneously and that all are connected with one another, and therefore, they are unable to simulate the individual dynamic of each of the smartphones of the network.…”
Section: Introductionmentioning
confidence: 99%
“…This fact is mainly due to the following: (1) Its leader position: Android holds 80% of the total market share in tablet and smartphone devices; (2) Its open-source nature; (3) The loose security policies for apps which make possible the distribution of malware through both the Android Play Store and the unofficial stores. In this sense, the 97% of malware threats target the Android operating system.…”
Section: Introductionmentioning
confidence: 99%