A Survey on Security for Mobile Devices, IEEE Communications Surveys & Tutorials, vol.15, issue.1, p.446471, 2013. ,
DOI : 10.1109/SURV.2012.013012.00028
Modeling the Propagation of Worms in Networks: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.2, p.19 ,
DOI : 10.1109/SURV.2013.100913.00195
Worm Propagation Dynamics in Wireless Sensor Networks, 2008 IEEE International Conference on Communications, pp.1541-1545, 2008. ,
DOI : 10.1109/ICC.2008.298
Wireless multimedia sensor networks: A survey, IEEE Wireless Communications, vol.14, issue.6, pp.32-39, 2007. ,
DOI : 10.1109/MWC.2007.4407225
Modeling the spread of worm epidemics in wireless sensor networks, Wireless Communications, Networking and Mobile Computing, 2009. WiCom'09. 5th International Conference on, pp.1-4, 2009. ,
Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks, Science China Information Sciences, vol.18, issue.9, pp.1-18, 2013. ,
DOI : 10.1007/s11432-013-4977-4
Self-propagating malpackets in wireless sensor networks: Dynamics and defense implications, Ad Hoc Networks, pp.1489-1500, 2009. ,
CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-based Mobile Networks, 2010 Proceedings IEEE INFOCOM, pp.1-9, 2010. ,
DOI : 10.1109/INFCOM.2010.5462113
A cloud-based intrusion detection and response system for mobile phones, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), pp.31-32, 2011. ,
DOI : 10.1109/DSNW.2011.5958860
Automated remote repair for mobile malware, Proceedings of the 27th Annual Computer Security Applications Conference on, ACSAC '11, pp.413-422, 2011. ,
DOI : 10.1145/2076732.2076791
A modified epidemic model for virus spread control in wireless sensor networks, Global Telecommunications Conference (GLOBECOM 2011), pp.1-5, 2011. ,
Percolation on heterogeneous networks as a model for epidemics, Mathematical Biosciences, vol.180, issue.1-2, pp.293-305, 2002. ,
DOI : 10.1016/S0025-5564(02)00117-7
Epidemic Threshold in Structured Scale-Free Networks, Physical Review Letters, vol.89, issue.10, p.108701, 2002. ,
DOI : 10.1103/PhysRevLett.89.108701
Software Updating in Wireless Sensor Networks: A Survey and Lacunae, Journal of Sensor and Actuator Networks, vol.2, issue.4, pp.717-760, 2013. ,
DOI : 10.3390/jsan2040717
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method, Journal of Systems and Software, vol.83, issue.8, pp.1524-1537, 2010. ,
DOI : 10.1016/j.jss.2010.03.046
Understanding the Spreading Patterns of Mobile Phone Viruses, Science, vol.324, issue.5930, pp.1071-1076, 2009. ,
DOI : 10.1126/science.1167053
Maximum Damage Malware Attack in Mobile Wireless Networks, IEEE/ACM Transactions on Networking, vol.20, issue.5, pp.1347-1360, 2012. ,
DOI : 10.1109/TNET.2012.2183642
Modeling and restraining mobile virus propagation, IEEE Transactions on Mobile Computing, vol.12, issue.3, p.529541, 2013. ,
A Survey of Service Discovery Protocols in Multihop Mobile Ad Hoc Networks, IEEE Pervasive Computing, vol.8, issue.1, pp.66-74, 2009. ,
DOI : 10.1109/MPRV.2009.2
Search and pursuit-evasion in mobile robotics, Autonomous Robots, vol.21, issue.1, pp.299-316, 2011. ,
DOI : 10.1007/s10514-011-9241-4
Epidemic Spreading in Scale-Free Networks, Physical Review Letters, vol.86, issue.14, pp.3200-3203, 2001. ,
DOI : 10.1103/PhysRevLett.86.3200
Scalable and practical pursuit-evasion with networked robots, Intelligent Service Robotics, vol.18, issue.5, pp.247-263, 2009. ,
DOI : 10.1007/s11370-009-0050-y
Finding an unpredictable target in a workspace with obstacles, Proceedings of International Conference on Robotics and Automation, pp.737-742, 1997. ,
DOI : 10.1109/ROBOT.1997.620123
On the Deployment of Mobile Trusted Modules, 2008 IEEE Wireless Communications and Networking Conference, pp.3169-3174, 2008. ,
DOI : 10.1109/WCNC.2008.553
Reassessing the TCG specifications for trusted computing in mobile and embedded systems, 2008 IEEE International Workshop on Hardware-Oriented Security and Trust, pp.84-90, 2008. ,
DOI : 10.1109/HST.2008.4559060
A Trusted Mobile Phone Prototype, 2008 5th IEEE Consumer Communications and Networking Conference, pp.1208-1209, 2008. ,
DOI : 10.1109/ccnc08.2007.270
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.211.9771
Two Families of Algorithms to Film Sport Events with Flying Robots, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, pp.319-323, 2013. ,
DOI : 10.1109/MASS.2013.40
URL : https://hal.archives-ouvertes.fr/hal-00917521