M. L. Polla, F. Martinelli, and D. Sgandurra, A Survey on Security for Mobile Devices, IEEE Communications Surveys & Tutorials, vol.15, issue.1, p.446471, 2013.
DOI : 10.1109/SURV.2012.013012.00028

Y. Wang, S. Wen, Y. Xiang, and W. Zhou, Modeling the Propagation of Worms in Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.2, p.19
DOI : 10.1109/SURV.2013.100913.00195

B. Sun, G. Yan, and Y. Xiao, Worm Propagation Dynamics in Wireless Sensor Networks, 2008 IEEE International Conference on Communications, pp.1541-1545, 2008.
DOI : 10.1109/ICC.2008.298

I. F. Akyildiz, T. Melodia, and K. R. Chowdury, Wireless multimedia sensor networks: A survey, IEEE Wireless Communications, vol.14, issue.6, pp.32-39, 2007.
DOI : 10.1109/MWC.2007.4407225

W. Shengjun and C. Junhua, Modeling the spread of worm epidemics in wireless sensor networks, Wireless Communications, Networking and Mobile Computing, 2009. WiCom'09. 5th International Conference on, pp.1-4, 2009.

X. Wang, Z. He, X. Zhao, C. Lin, Y. Pan et al., Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks, Science China Information Sciences, vol.18, issue.9, pp.1-18, 2013.
DOI : 10.1007/s11432-013-4977-4

B. Sun, G. Yan, Y. Xiao, and T. Yang, Self-propagating malpackets in wireless sensor networks: Dynamics and defense implications, Ad Hoc Networks, pp.1489-1500, 2009.

F. Li, Y. Yang, and J. Wu, CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010.
DOI : 10.1109/INFCOM.2010.5462113

A. Houmansadr, S. A. Zonouz, and R. Berthier, A cloud-based intrusion detection and response system for mobile phones, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.31-32, 2011.
DOI : 10.1109/DSNW.2011.5958860

Y. Nadji, J. Giffin, and P. Traynor, Automated remote repair for mobile malware, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.413-422, 2011.
DOI : 10.1145/2076732.2076791

S. Tang, A modified epidemic model for virus spread control in wireless sensor networks, Global Telecommunications Conference (GLOBECOM 2011), pp.1-5, 2011.

L. Sander, C. Warren, I. Sokolov, C. Simon, and J. Koopman, Percolation on heterogeneous networks as a model for epidemics, Mathematical Biosciences, vol.180, issue.1-2, pp.293-305, 2002.
DOI : 10.1016/S0025-5564(02)00117-7

V. M. Eguíluz and K. Klemm, Epidemic Threshold in Structured Scale-Free Networks, Physical Review Letters, vol.89, issue.10, p.108701, 2002.
DOI : 10.1103/PhysRevLett.89.108701

S. Brown and C. J. Sreenan, Software Updating in Wireless Sensor Networks: A Survey and Lacunae, Journal of Sensor and Actuator Networks, vol.2, issue.4, pp.717-760, 2013.
DOI : 10.3390/jsan2040717

A. Shabtai, U. Kanonov, and Y. Elovici, Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method, Journal of Systems and Software, vol.83, issue.8, pp.1524-1537, 2010.
DOI : 10.1016/j.jss.2010.03.046

P. Wang, M. C. González, C. A. Hidalgo, and A. Barabási, Understanding the Spreading Patterns of Mobile Phone Viruses, Science, vol.324, issue.5930, pp.1071-1076, 2009.
DOI : 10.1126/science.1167053

M. Khouzani, S. Sarkar, and E. Altman, Maximum Damage Malware Attack in Mobile Wireless Networks, IEEE/ACM Transactions on Networking, vol.20, issue.5, pp.1347-1360, 2012.
DOI : 10.1109/TNET.2012.2183642

C. Gao and J. Liu, Modeling and restraining mobile virus propagation, IEEE Transactions on Mobile Computing, vol.12, issue.3, p.529541, 2013.

A. N. Mian, R. Baldoni, and R. Beraldi, A Survey of Service Discovery Protocols in Multihop Mobile Ad Hoc Networks, IEEE Pervasive Computing, vol.8, issue.1, pp.66-74, 2009.
DOI : 10.1109/MPRV.2009.2

T. H. Chung, G. A. Hollinger, and V. Isler, Search and pursuit-evasion in mobile robotics, Autonomous Robots, vol.21, issue.1, pp.299-316, 2011.
DOI : 10.1007/s10514-011-9241-4

R. Pastor-satorras and A. Vespignani, Epidemic Spreading in Scale-Free Networks, Physical Review Letters, vol.86, issue.14, pp.3200-3203, 2001.
DOI : 10.1103/PhysRevLett.86.3200

M. A. Vieira, R. Govindan, and G. S. Sukhatme, Scalable and practical pursuit-evasion with networked robots, Intelligent Service Robotics, vol.18, issue.5, pp.247-263, 2009.
DOI : 10.1007/s11370-009-0050-y

S. Lavalle, D. Lin, L. Guibas, J. Latombe, and R. Motwani, Finding an unpredictable target in a workspace with obstacles, Proceedings of International Conference on Robotics and Automation, pp.737-742, 1997.
DOI : 10.1109/ROBOT.1997.620123

A. U. Schmidt, N. Kuntze, and M. Kasper, On the Deployment of Mobile Trusted Modules, 2008 IEEE Wireless Communications and Networking Conference, pp.3169-3174, 2008.
DOI : 10.1109/WCNC.2008.553

J. Grossschadl, T. Vejda, and D. Page, Reassessing the TCG specifications for trusted computing in mobile and embedded systems, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.84-90, 2008.
DOI : 10.1109/HST.2008.4559060

O. Aciicmez, A. Latifi, J. Seifert, and X. Zhang, A Trusted Mobile Phone Prototype, 2008 5th IEEE Consumer Communications and Networking Conference, pp.1208-1209, 2008.
DOI : 10.1109/ccnc08.2007.270

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.211.9771

E. Natalizio, R. Surace, V. Loscrí, F. Guerriero, and T. Melodia, Two Families of Algorithms to Film Sport Events with Flying Robots, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, pp.319-323, 2013.
DOI : 10.1109/MASS.2013.40

URL : https://hal.archives-ouvertes.fr/hal-00917521