Login / Signup
On capturing malware dynamics in mobile power-law networks.
Abhijit Bose
Kang G. Shin
Published in:
SecureComm (2008)
Keyphrases
</>
power law
long range correlations
small world
scale free
mobile phone
learning curves
mobile devices
clustering coefficient
degree distribution
power law distribution
reverse engineering
power laws
mobile users
high throughput
complex networks
path length
recurrent networks
preferential attachment