M. L. Polla, F. Martinelli, and D. Sgandurra, A Survey on Security for Mobile Devices, IEEE Communications Surveys & Tutorials, vol.15, issue.1, p.446471, 2013.
DOI : 10.1109/SURV.2012.013012.00028

Y. Wang, S. Wen, Y. Xiang, and W. Zhou, Modeling the Propagation of Worms in Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.2, p.19
DOI : 10.1109/SURV.2013.100913.00195

B. Sun, G. Yan, and Y. Xiao, Worm Propagation Dynamics in Wireless Sensor Networks, 2008 IEEE International Conference on Communications, pp.1541-1545, 2008.
DOI : 10.1109/ICC.2008.298

I. F. Akyildiz, T. Melodia, and K. R. Chowdury, Wireless multimedia sensor networks: A survey, IEEE Wireless Communications, vol.14, issue.6, pp.32-39, 2007.
DOI : 10.1109/MWC.2007.4407225

W. Shengjun and C. Junhua, Modeling the spread of worm epidemics in wireless sensor networks, Wireless Communications, Networking and Mobile Computing, 2009. WiCom'09. 5th International Conference on, pp.1-4, 2009.

X. Wang, Z. He, X. Zhao, C. Lin, Y. Pan et al., Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks, Science China Information Sciences, vol.18, issue.9, pp.1-18, 2013.
DOI : 10.1007/s11432-013-4977-4

B. Sun, G. Yan, Y. Xiao, and T. Yang, Self-propagating malpackets in wireless sensor networks: Dynamics and defense implications, Ad Hoc Networks, pp.1489-1500, 2009.

F. Li, Y. Yang, and J. Wu, CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010.
DOI : 10.1109/INFCOM.2010.5462113

A. Houmansadr, S. A. Zonouz, and R. Berthier, A cloud-based intrusion detection and response system for mobile phones, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.31-32, 2011.
DOI : 10.1109/DSNW.2011.5958860

Y. Nadji, J. Giffin, and P. Traynor, Automated remote repair for mobile malware, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.413-422, 2011.
DOI : 10.1145/2076732.2076791

S. Tang, A modified epidemic model for virus spread control in wireless sensor networks, Global Telecommunications Conference (GLOBECOM 2011), pp.1-5, 2011.

L. Sander, C. Warren, I. Sokolov, C. Simon, and J. Koopman, Percolation on heterogeneous networks as a model for epidemics, Mathematical Biosciences, vol.180, issue.1-2, pp.293-305, 2002.
DOI : 10.1016/S0025-5564(02)00117-7

V. M. Eguíluz and K. Klemm, Epidemic Threshold in Structured Scale-Free Networks, Physical Review Letters, vol.89, issue.10, p.108701, 2002.
DOI : 10.1103/PhysRevLett.89.108701

S. Brown and C. J. Sreenan, Software Updating in Wireless Sensor Networks: A Survey and Lacunae, Journal of Sensor and Actuator Networks, vol.2, issue.4, pp.717-760, 2013.
DOI : 10.3390/jsan2040717

A. Shabtai, U. Kanonov, and Y. Elovici, Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method, Journal of Systems and Software, vol.83, issue.8, pp.1524-1537, 2010.
DOI : 10.1016/j.jss.2010.03.046

P. Wang, M. C. González, C. A. Hidalgo, and A. Barabási, Understanding the Spreading Patterns of Mobile Phone Viruses, Science, vol.324, issue.5930, pp.1071-1076, 2009.
DOI : 10.1126/science.1167053

M. Khouzani, S. Sarkar, and E. Altman, Maximum Damage Malware Attack in Mobile Wireless Networks, IEEE/ACM Transactions on Networking, vol.20, issue.5, pp.1347-1360, 2012.
DOI : 10.1109/TNET.2012.2183642

C. Gao and J. Liu, Modeling and restraining mobile virus propagation, IEEE Transactions on Mobile Computing, vol.12, issue.3, p.529541, 2013.

A. N. Mian, R. Baldoni, and R. Beraldi, A Survey of Service Discovery Protocols in Multihop Mobile Ad Hoc Networks, IEEE Pervasive Computing, vol.8, issue.1, pp.66-74, 2009.
DOI : 10.1109/MPRV.2009.2

T. H. Chung, G. A. Hollinger, and V. Isler, Search and pursuit-evasion in mobile robotics, Autonomous Robots, vol.21, issue.1, pp.299-316, 2011.
DOI : 10.1007/s10514-011-9241-4

R. Pastor-satorras and A. Vespignani, Epidemic Spreading in Scale-Free Networks, Physical Review Letters, vol.86, issue.14, pp.3200-3203, 2001.
DOI : 10.1103/PhysRevLett.86.3200

M. A. Vieira, R. Govindan, and G. S. Sukhatme, Scalable and practical pursuit-evasion with networked robots, Intelligent Service Robotics, vol.18, issue.5, pp.247-263, 2009.
DOI : 10.1007/s11370-009-0050-y

S. Lavalle, D. Lin, L. Guibas, J. Latombe, and R. Motwani, Finding an unpredictable target in a workspace with obstacles, Proceedings of International Conference on Robotics and Automation, pp.737-742, 1997.
DOI : 10.1109/ROBOT.1997.620123

A. U. Schmidt, N. Kuntze, and M. Kasper, On the Deployment of Mobile Trusted Modules, 2008 IEEE Wireless Communications and Networking Conference, pp.3169-3174, 2008.
DOI : 10.1109/WCNC.2008.553

J. Grossschadl, T. Vejda, and D. Page, Reassessing the TCG specifications for trusted computing in mobile and embedded systems, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.84-90, 2008.
DOI : 10.1109/HST.2008.4559060

O. Aciicmez, A. Latifi, J. Seifert, and X. Zhang, A Trusted Mobile Phone Prototype, 2008 5th IEEE Consumer Communications and Networking Conference, pp.1208-1209, 2008.
DOI : 10.1109/ccnc08.2007.270

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

E. Natalizio, R. Surace, V. Loscrí, F. Guerriero, and T. Melodia, Two Families of Algorithms to Film Sport Events with Flying Robots, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, pp.319-323, 2013.
DOI : 10.1109/MASS.2013.40

URL : https://hal.archives-ouvertes.fr/hal-00917521