On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks.
Proceedings of the Third International Conference on Emerging Security Information, 2009
Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis.
J. Comput. Sci. Technol., 2008