|
1. G. Gan, Z. Lu, and J.Jiang, “Internet of things security analysis,” in Proc. IEEE iTAP 2011, Aug. 2011. 2. J. Granjal, E. Monteiro, and J. Silva, “Security for the Internet of Things: A survey of existing protocols and open research issues,” IEEE Commun. Surveys Tuts., vol. 17, pp. 1294–1312, July 2015. 3. Y. Minn, P. Pa, S. Suzuki, K. Yoshioka, T. Matsumoto, T. Kasama, and C. Rossow, “IoTPOT: Analysing the rise of IoT compromises,” in Proc. USENIX Workshop 2015, Aug. 2015. 4. G. Zyba, G. M. Voelker, M. Liljenstam, A. Mehes, and P. Johansson, “Defending mobile phones from proximity malware,” in Proc. IEEE Infocom 2009, Apr. 2009, pp. 1503–1511. 5. M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A.-R. Sadeghi, and S. Tarkoma, “IoT Sentinel: Automated device-type identification for security enforcement in IoT,” CoRR, vol. abs/1611.04880v2, 2016. 6. P.-Y. Chen and S.-M. Cheng, “Sequential defense against random and intentional attacks in complex networks,” Phys. Rev. E, vol. 91, p. 022805, Feb. 2015. 7. P.-Y. Chen and A. O. Hero, “Assessing and safeguarding network resilience to nodal attacks,” IEEE Commun. Mag., vol. 52, no. 11, pp. 138–143, Nov. 2014. 8. S.-M. Cheng, P.-Y. Chen, C.-C. Lin, and H.-C. Hsiao, “Traffic-aware patching for cyber security in mobile iot,” arXiv preprint arXiv:1703.05400, July 2017. 9. E. Ronen and A. Shamir, “Extended functionality attacks on IoT devices: The case of smart lights,” in Proc. IEEE S&P Europe 2016, Mar. 2016. 10. J. Habibi, D. Midi, A. Mudgerikar, and E. Bertino, “Heimdall: Mitigating the internet of insecure things,” 2017. 11. P.-Y. Chen, S.-M. Cheng, and K.-C. Chen, “Optimal control of epidemic information dissemination over networks,” IEEE Tran. on Cybernetics, vol. 44, no. 12, pp. 2316–2328, Dec. 2014. 12. P. De, Y. Liu, and S. K. Das, “An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks,” IEEE Trans. Mobile Comput., vol. 8, no. 3, pp. 413–425, Mar. 2009. 13. S. Peng, S. Yu, and A. Yang, “Smartphone malware and its propagation modeling: A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 2, pp. 952–941, Apr. 2014. 14. S. Tanachaiwiwat and A. Helmy, “Encounter-based worms: analysis and defense,” Ad Hoc Netw., vol. 7, no. 7, pp. 1414–1430, Sept. 2009. 15. P. Wang, M. C. Gonzalez, C. A. Hidalgo, and A.-L. Barabasi, “Understanding the spreading patterns of mobile phone viruses,” Science, vol. 324, no. 5930, pp. 1071–1075, May 2009. 16. S.-M. Cheng, W. C. Ao, P.-Y. Chen, and K.-C. Chen, “On modeling malware propagation in generalized social networks,” IEEE Commun. Lett., vol. 15, no. 1, pp. 25–27, Jan. 2011. 17. V. L. Ulrike, “A tutorial on spectral clustering,” Statistics and computing, vol. 17, no. 4, pp. 395–416, Aug. 2007. 18. W. Dong, B. Lepri, and A. Pentland, “Modeling the co-evolution of behaviors and social relationships using mobile phone data,” in Proc. MUM 2011, Dec. 2011, pp. 134–143. 19. P.-Y. Chen, C.-C. Lin, S.-M. Cheng, H.-C. Hsiao, and C.-Y. Huang, “Decapitation via digital epidemics: A bio-inspired transmissive attack,” IEEE Commun. Mag., vol. 54, p. 75—81, June 2016.
|