Author of the publication

SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks.

, , , , , and . IEEE Trans. Dependable Sec. Comput., 16 (1): 142-155 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of multithreading in virtual digital storage oscilloscope development., , and . ICARCV, page 504-508. IEEE, (2004)Investigating the deceptive information in Twitter spam., , , , , , and . Future Generation Comp. Syst., (2017)Are the popular users always important for information dissemination in online social networks?, , , , and . IEEE Network, 28 (5): 64-67 (2014)Detection and defense of application-layer DDoS attacks in backbone web traffic., , , , and . Future Generation Comp. Syst., (2014)Rumor Source Identification in Social Networks with Time-Varying Topology., , , , and . IEEE Trans. Dependable Sec. Comput., 15 (1): 166-179 (2018)My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media., , , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 528-539. Springer, (2017)Malicious Attack Propagation and Source Identification, , , , , and . Advances in Information Security Springer, (2019)Modeling Propagation Dynamics of Social Network Worms., , , , , and . IEEE Trans. Parallel Distrib. Syst., 24 (8): 1633-1643 (2013)Using epidemic betweenness to measure the influence of users in complex networks., , , , and . J. Network and Computer Applications, (2017)TouchWB: Touch behavioral user authentication based on web browsing on smartphones., , , , and . J. Network and Computer Applications, (2018)