Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] P. Wang, M. Gonzalez, C. Hidalgo, and A. Barabasi, “Under- standing the Spreading Patterns of Mobile Phone Viruses,†Science, vol. 324, no. 5930, pp. 1071- 1076, 2009. [2] Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, “A Social Network Based Patching Scheme for Worm Containment in Cellular Networks,†Proc. IEEE INFOCOM, 2009. [3] G. Zyba, G. Voelker, M. Liljenstam, A. Me´hes, and P. Johansson, “Defending Mobile Phones from Proximity Malware,†Proc. IEEE INFOCOM, 2009. [4] F. Li, Y. Yang, and J. Wu, “CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-Based Mobile Networks,†Proc. IEEE INFOCOM, 2009. [5] P. Bre´maud, Markov Chains: Gibbs Fields, Monte Carlo Simulation, and Queues. Springer Verlag, 1999. J.Sowmiya et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.3, March2015, pg. 466-470 © 2015, IJCSMC All Rights Reserved 470 [6] P. Hui, J. Crowcroft, and E. Yoneki, “Bubble Rap: Social-Based Forwarding in Delay Tolerant Networks,†Proc. ACM MobiHoc, 2008 [7] G. Yan and S. Eidenbenz, “Modeling Propagation Dynamics of Bluetooth Worms,†IEEE Trans. Mobile Computing, vol. 8, no. 3, p. 1071, 2008. [8] G. Yan, H. Flores, L. Cuellar, N. Hengartner, S. Eidenbenz, and V. Vu, “Bluetooth Worm Propagation: Mobility Pattern Matters!†Proc. ACM Symp. Information, Computer and Comm. Security, pp. 32- 44, 2007. [9] C. Fleizach, M. Liljenstam, P. Johansson, G. Voelker, and A. Mehes, “Can You Infect Me Now? Malware Propagation in Mobile Phone Networks,†Proc. ACM Workshop Recurring Malcode, pp. 61- 68, 2007. [10] A. Bose and K. Shin, “On Mobile Viruses Exploiting Messaging and Bluetooth Services,†Proc. Securecomm and Workshops, pp. 1- 10, 2006. [11] D. Daley and J. Gani, Epidemic Modelling: An Introduction. Cam- bridge Univ, 2001. [12] E. Altman, A.P. Azad, and F. De Pellegrini, “Optimal Activation and Transmission Control in Delay Tolerant Networks,†Proc. IEEE INFOCOM, 2010. [13] M. Khouzani, S. Sarkar, and E. Altman, “Dispatch then Stop: Optimal Dissemination of Security Patches in Mobile Wireless Networks,†Proc. IEEE 49th Conf. Decision and Control (CDC), pp. 2354-2359, 2010. [14] Kalpana,R. and Rengarajan, N. "Mobile Anonymous Trust Based Routing Using Ant Colony Optimization", American Journal of Applied Sciences. ISSN:1546- 9239, Vol. 9 No. 8, pp. 1283-1289, 2012.
![]() | V2I922.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|