Author of the publication

A Social Network Based Patching Scheme for Worm Containment in Cellular Networks.

, , , , and . INFOCOM, page 1476-1484. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Routing in Socially Selfish Delay Tolerant Networks., , and . INFOCOM, page 857-865. IEEE, (2010)Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks., , , and . ACM Trans. Sens. Networks, 4 (4): 23:1-23:34 (2008)Keeping Context In Mind: Automating Mobile App Access Control with User Interface Inspection., , , and . INFOCOM, page 2089-2097. IEEE, (2019)A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses., , , , and . INFOCOM, page 2455-2463. IEEE, (2009)Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification., and . ACM Trans. Inf. Syst. Secur., 11 (3): 15:1-15:30 (2008)On the Effectiveness of Internal Patching Against File-Sharing Worms., , and . ACNS, volume 5037 of Lecture Notes in Computer Science, page 1-20. (2008)SET: Detecting node clones in sensor networks., , and . SecureComm, page 341-350. IEEE, (2007)SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks., , , and . ACM Trans. Inf. Syst. Secur., 11 (4): 18:1-18:43 (2008)SDAP: : a secure hop-by-Hop data aggregation protocol for sensor networks., , , and . MobiHoc, page 356-367. ACM, (2006)Self-healing wireless networks under insider jamming attacks., , , and . CNS, page 220-228. IEEE, (2014)