The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of malware behavior in networks to date. In this paper, we investigate how malware propagates in networks from a global perspective. We formulate the problem, and establish a rigorous two layer epidemic model for malware propagation from network to network. Based on the proposed...
User interests and behavior will play a key role in the design of future mobile networks. In this paper, we introduce a novel technique for the modeling of mobile users interests based on their online activity and mobility. In this study, we conduct domain-specific and location-based analysis and modeling of mobile user interests based on the amount of their online time. Using KS test, we show that...
In recent years, technology acceptance model (TAM) has received considerable attentions in the researches of the e-commerce consumer acceptance and behavior intention. The origin and development of TAM in the e-commerce are reviewed, summarized and contrasted respectively. The models are classified into the following three categories: simple modified TAM, models combining TAM with related theories...
Technology acceptance research has tended to focus on extrinsic motivation based on sole theoretical paradigm. Building upon and integrating the key findings of four closely related theoretical paradigms (the technology acceptance model, the theory of planned behavior, innovation diffusion theory, and the flow theory), we developed and test a more comprehensive and unified model in the context of...
The growing popularity of mobile ad hoc networks (MANETs) makes them increasingly attractive to malicious code writers, and malicious code targeting MANETs has already begun to appear. In this paper, using the theories of complex networks, we present a propagation model of malicious code in WiFi-based MANETs and investigate the propagating behaviors of the malicious code in such networks by means...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.