Click to open the HelpDesk interface
AECE - Front page banner

Menu:


FACTS & FIGURES

JCR Impact Factor: 0.595
JCR 5-Year IF: 0.661
Issues per year: 4
Current issue: Aug 2017
Next issue: Nov 2017
Avg review time: 75 days


PUBLISHER

Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229
ROMANIA

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


TRAFFIC STATS

1,714,432 unique visits
505,547 downloads
Since November 1, 2009



No robots online now


SJR SCImago RANK

SCImago Journal & Country Rank


SEARCH ENGINES

aece.ro - Google Pagerank




TEXT LINKS

Anycast DNS Hosting
MOST RECENT ISSUES

 Volume 17 (2017)
 
     »   Issue 3 / 2017
 
     »   Issue 2 / 2017
 
     »   Issue 1 / 2017
 
 
 Volume 16 (2016)
 
     »   Issue 4 / 2016
 
     »   Issue 3 / 2016
 
     »   Issue 2 / 2016
 
     »   Issue 1 / 2016
 
 
 Volume 15 (2015)
 
     »   Issue 4 / 2015
 
     »   Issue 3 / 2015
 
     »   Issue 2 / 2015
 
     »   Issue 1 / 2015
 
 
 Volume 14 (2014)
 
     »   Issue 4 / 2014
 
     »   Issue 3 / 2014
 
     »   Issue 2 / 2014
 
     »   Issue 1 / 2014
 
 
  View all issues  


FEATURED ARTICLE

ABC Algorithm based Fuzzy Modeling of Optical Glucose Detection, SARACOGLU, O. G., BAGIS, A., KONAR, M., TABARU, T. E.
Issue 3/2016

AbstractPlus






LATEST NEWS

2017-Jun-14
Thomson Reuters published the Journal Citations Report for 2016. The JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.595, and the JCR 5-Year Impact Factor is 0.661.

2017-Apr-04
We have the confirmation Advances in Electrical and Computer Engineering will be included in the EBSCO database.

2017-Feb-16
With new technologies, such as mobile communications, internet of things, and wide applications of social media, organizations generate a huge volume of data, much faster than several years ago. Big data, characterized by high volume, diversity and velocity, increasingly drives decision making and is changing the landscape of business intelligence, from governments to private organizations, from communities to individuals. Big data analytics that discover insights from evidences has a high demand for computing efficiency, knowledge discovery, problem solving, and event prediction. We dedicate a special section of Issue 4/2017 to Big Data. Prospective authors are asked to make the submissions for this section no later than the 31st of May 2017, placing "BigData - " before the paper title in OpenConf.

2017-Jan-30
We have the confirmation Advances in Electrical and Computer Engineering will be included in the Gale database.

2016-Dec-17
IoT is a new emerging technology domain which will be used to connect all objects through the Internet for remote sensing and control. IoT uses a combination of WSN (Wireless Sensor Network), M2M (Machine to Machine), robotics, wireless networking, Internet technologies, and Smart Devices. We dedicate a special section of Issue 2/2017 to IoT. Prospective authors are asked to make the submissions for this section no later than the 31st of March 2017, placing "IoT - " before the paper title in OpenConf.

Read More »


    
 

  2/2012 - 1
View TOC | « Previous Article | Next Article »

Performance Analysis of Cell-Phone Worm Spreading in Cellular Networks through Opportunistic Communications

YAHUI, W. See more information about YAHUI, W. on SCOPUS See more information about YAHUI, W. on IEEExplore See more information about YAHUI, W. on Web of Science, DENG, S. See more information about  DENG, S. on SCOPUS See more information about  DENG, S. on SCOPUS See more information about DENG, S. on Web of Science, HUANG, H. See more information about  HUANG, H. on SCOPUS See more information about  HUANG, H. on SCOPUS See more information about HUANG, H. on Web of Science, DENG, Y. See more information about DENG, Y. on SCOPUS See more information about DENG, Y. on SCOPUS See more information about DENG, Y. on Web of Science
 
Click to see author's profile on See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (720 KB) | Citation | Downloads: 860 | Views: 2,524

Author keywords
opportunistic communications, delay tolerant network, 3G networks, Markov process, cell-phone worms

References keywords
mobile(14), networks(10), malware(10), sarkar(5), khouzani(5), infocom(5), infcom(5), worm(4), network(4), delay(4)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2012-05-30
Volume 12, Issue 2, Year 2012, On page(s): 3 - 8
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2012.02001
Web of Science Accession Number: 000305608000001
SCOPUS ID: 84865306374

Abstract
Quick view
Full text preview
Worms spreading directly between cell-phones over short-range radio (Bluetooth, WiFi, etc.) are increasing rapidly. Communication by these technologies is opportunistic and has very close relation with the social characteristics of the phone carriers. In this paper, we try to evaluate the impact of different characteristics on the spreading performance of worms. On the other hand, the behaviors of worms may have certain impact, too. For example, worms may make phones be completely dysfunctional and these phones can be seen as killed. We study the impact of the killing speed. Using the Markov model, we propose some theoretical models to evaluate the spreading performance in different cases. Simulation results show the accuracy of our models. Numerical results show that if users do not believe the data coming from others easily, the worms may bring less damage. Surprisingly, if the users are more willing to install the anti-virus software, the worms may bring bigger damage when the software becomes to be outdated with high probability. Though the worms can bring big damage on the network temporarily by killing phones rapidly, numerical results show that this behavior may decrease the total damage in the long time. Therefore, killing nodes more rapidly may be not optimal for worms.


References | Cited By  «-- Click to see who has cited this paper

[1] Z. Zhu, G. Cao, S. Zhu, S. Ranjan, A. Nucci, "A social network based patching scheme for worm containment in cellular networks," in Proc. IEEE INFOCOM, 2009.
[CrossRef] [Web of Science Times Cited 32] [SCOPUS Times Cited 74]


[2] F. Li, Y. Yang, and J. Wu, "CPMC: an efficient proximity malware coping scheme in Smartphone-based mobile networks," in Proc. IEEE INFOCOM, 2010.
[CrossRef] [SCOPUS Times Cited 32]


[3] K. Fall, "A delay-tolerant network architecture for challenged internets," in Proc. ACM SIGCOMM, 2003.
[CrossRef]


[4] G. Papastergious, I. Psaras, and V. Tsaoussidis, "Deep-space transport protocol: a novel transport scheme for space DTNs," Computer Communications, vol.32, no. 16, 2009.
[CrossRef] [Web of Science Times Cited 39] [SCOPUS Times Cited 52]


[5] J. Ott, E. Hyytiä, P. Lassila, T. Vaegs, and J. Kangasharju, "Floating content: information sharing in urban areas," in Proc. IEEE Int. Conf. PerCom, Mar. 2011.
[CrossRef] [SCOPUS Times Cited 65]


[6] B. Oh, Y. Na, J. Yang, S. Park, J. Nang, and J. Kim, "Genetic algorithm-based dynamic vehicle route search using car-to-car communications," Advances in Electrical and Computer Engineering, vol. 10, no. 4, pp. 81-86, 2010.
[CrossRef] [Full Text] [Web of Science Times Cited 4]


[7] T. Spyropoulos, T. Turletti, and K. Obrazcka, "Routing in delay tolerant networks comprising heterogeneous populations of nodes," IEEE Trans. Mobile Computing, vol.8, no. 8, Aug. 2009.
[CrossRef] [Web of Science Times Cited 86] [SCOPUS Times Cited 121]


[8] E. Bulut, Z. Wang, and B. Szymanski, "Cost effective multi-period spraying for routing in delay tolerant networks," IEEE/ACM Trans. Networking, Vol. 8, no. 5, Oct. 2010.
[CrossRef] [Web of Science Times Cited 33] [SCOPUS Times Cited 59]


[9] J. Omic, A. Orda, and P. V. Mieghem, "Protecting against network infections: a game theoretic perspective," in Proc. IEEE INFOCOM, 2009.
[CrossRef] [Web of Science Times Cited 20] [SCOPUS Times Cited 47]


[10] MHR. Khouzani and S. Sarkar, "Dynamic malware attack in energy-constrained mobile wireless networks." in Proc. Fifth Symposium on Information Theory and Applications, 2010.
[CrossRef] [SCOPUS Times Cited 12]


[11] J. Su, K. Chan, A. Miklas, K. Po, A. Akhavan, S. Saroiu, E. de Lara, and A. Goel, "A preliminary investigation of worm infections in a Bluetooth environment," in Proc. ACM WORM, 2006.
[CrossRef] [SCOPUS Times Cited 65]


[12] A. Bose and K. Shin, " On mobile viruses exploiting messaging and Bluetooth services," in Proc. ICST Securecomm, 2006.
[CrossRef] [SCOPUS Times Cited 43]


[13] S. Cheng, W. C. Ao, P. Chen, and K. Chen, "On modeling malware propagation in generalized social networks," IEEE Comm. Lett., vol. 15, no. 1, Jan. 2011.
[CrossRef] [Web of Science Times Cited 41] [SCOPUS Times Cited 51]


[14] N. Husted and S. Myers, "Why mobile-to-mobile wireless malware won't cause a storm," in Proc. USENIX Workshop on Large-scale Exploits and Emergent Threats, 2011.

[15] J. Tang, C. Mascolo, M. Musolesi, and V. Latora, "Exploiting temporal complex network metrics in mobile malware containment," in Proc. WOWMOM, Jue. 2011.
[CrossRef] [SCOPUS Times Cited 17]


[16] G. Yan, L. Cuellar, and S. Eidenbenz, "Blue-watchdog: detecting Bluetooth worm propagation in public areas," in Proc. DSN, 2009.
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 10]


[17] J. Cheng, S. H. Y. Wong, H. Yang, and S. Lu, "SmartSiren: virus detection and alert for smart phones," in Proc. Mobisys, Jue. 2007.
[CrossRef] [SCOPUS Times Cited 112]


[18] MHR. Khouzani, E. Altman, and S. Sarkar, "Optimal quarantining of wireless malware through power control," in Proc. Fourth Symposium on Information Theory and Applications, University of California, San Diego, Feb. 2009.
[CrossRef]


[19] MHR. Khouzani, E. Altman, and S. Sarkar, "Maximum damage malware attack in mobile wireless networks," in Proc. IEEE INFOCOM, 2010.
[CrossRef] [SCOPUS Times Cited 30]


[20] MHR. Khouzani, S. Sarkar, and E. Altman, "Dispatch then stop: optimal dissemination of security patches in mobile wireless networks," in Proc. IEEE CDC, 2010.
[CrossRef] [Web of Science Times Cited 10] [SCOPUS Times Cited 20]


[21] MHR. Khouzani, S. Sarkar, and E. Altman, "A dynamic game solution to malware attack," in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011.
[CrossRef] [SCOPUS Times Cited 14]


[22] Y. Li, P. Hui, D. Jin, L. Su, and L. Zeng, "An optimal distributed malware defense system for mobile networks with heterogamous devices," in Proc. IEEE SECON, Jun. 2011.
[CrossRef] [SCOPUS Times Cited 7]


[23] A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, " A survey of mobile malware in the wild," in Proc. ACM Workshop on Security and Privacy in Mobile Devices (SPSM), 2011.
[CrossRef] [SCOPUS Times Cited 343]


[24] R. Groenevelt, P. Nain, and G. Koole, "The message delay in mobile ad hoc networks," Performance Evaluation, 2005.
[CrossRef] [Web of Science Times Cited 256] [SCOPUS Times Cited 399]


[25] T. Karagiannis, J. -Y. L. Boudec, and M. Zojnovic, "Power law and exponential decay of inter contact times between mobile devices," in Proc. ACM MOBICOM, 2007.
[CrossRef] [SCOPUS Times Cited 312]


[26] A. Keranen, J. Ott, and T. Karkkainen, "The ONE simulator for DTN protocol evaluation," in Proc. SIMUTOOLS, 2009.
[CrossRef] [SCOPUS Times Cited 1086]




References Weight

Web of Science® Citations for all references: 526 TCR
SCOPUS® Citations for all references: 2,971 TCR

Web of Science® Average Citations per reference: 19 ACR
SCOPUS® Average Citations per reference: 110 ACR

TCR = Total Citations for References / ACR = Average Citations per Reference

We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more

Citations for references updated on 2017-09-19 16:23 in 166 seconds.




Note1: Web of Science® is a registered trademark of Thomson Reuters.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.

Copyright ©2001-2017
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania


All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.




Website loading speed and performance optimization powered by: