Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chen, Pin-Yu | en_US |
dc.contributor.author | Lin, Ching-Chao | en_US |
dc.contributor.author | Cheng, Shin-Ming | en_US |
dc.contributor.author | Hsiao, Hsu-Chun | en_US |
dc.contributor.author | Huang, Chun-Ying | en_US |
dc.date.accessioned | 2017-04-21T06:56:45Z | - |
dc.date.available | 2017-04-21T06:56:45Z | - |
dc.date.issued | 2016-06 | en_US |
dc.identifier.issn | 0163-6804 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/132576 | - |
dc.description.abstract | The evolution of communication technology and the proliferation of electronic devices have rendered adversaries powerful means for targeted attacks via all sorts of accessible resources. In particular, due to the intrinsic interdependence and ubiquitous connectivity of modern communication systems, adversaries can devise malware that propagates through intermediate hosts to approach the target, to which we refer as transmissive attacks. Inspired by biology, the transmission pattern of such an attack in the digital space much resembles the spread of an epidemic in real life. This article describes transmissive attacks, summarizes the utility of epidemic models in communication systems, and draws connections between transmissive attacks and epidemic models. Simulations, experiments, and ongoing research challenges on transmissive attacks are also addressed. | en_US |
dc.language.iso | en_US | en_US |
dc.title | Decapitation via Digital Epidemics: A Bio-Inspired Transmissive Attack | en_US |
dc.identifier.journal | IEEE COMMUNICATIONS MAGAZINE | en_US |
dc.citation.volume | 54 | en_US |
dc.citation.issue | 6 | en_US |
dc.citation.spage | 75 | en_US |
dc.citation.epage | 81 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
dc.identifier.wosnumber | WOS:000383436000012 | en_US |
Appears in Collections: | Articles |