CITED WORKS

Referenced in publications covered by other indexes

  • Citing :
    Alireza Shameli-Sendi , Masoume Jabbarifar , (2011-2012)
    Journal of Computer Networks and Communications/System HealthMonitoring Using a NovelMethod: Security Unified Process - Hindawi Publishing Corporation
    Cited :
    International Journal of Information and Computer Security/A new assessment and improvement model of risk propagation in information security - Inderscience
  • Citing :
    Alireza Shameli-Sendi , Masoume Jabbarifar , (2011-2012)
    Journal of Computer Networks and Communications/System HealthMonitoring Using a NovelMethod: Security Unified Process - Hindawi Publishing Corporation
    Cited :
    Proceedings of the 6th International Conference on Information Assurance and Security/ A causal model for information security risk assessment - IEEE Computer Society
  • Citing :
    Alireza Shameli-Sendi , Masoume Jabbarifar , (2011-2012)
    Journal of Computer Networks and Communications/System HealthMonitoring Using a NovelMethod: Security Unified Process - Hindawi Publishing Corporation
    Cited :
    Proceedings of the 2nd IEEE International Conference on Social Computing/ Network security risk assessment using bayesian belief networks - IEEE Computer Society
  • Citing :
    Alireza Shameli-Sendi , Masoume Jabbarifar , (2011-2012)
    Journal of Computer Networks and Communications/System HealthMonitoring Using a NovelMethod: Security Unified Process - Hindawi Publishing Corporation
    Cited :
    Security of Information and Networks/ A recursive method for validating and improving network security solutions - Trafford Publishing
  • Citing :
    Alireza Shameli-Sendi , Masoume Jabbarifar , (2011-2012)
    Journal of Computer Networks and Communications/System HealthMonitoring Using a NovelMethod: Security Unified Process - Hindawi Publishing Corporation
    Cited :
    Proceedings of the 4th International Conference on Information Assurance and Security/ A composite network security assessment - IEEE Computer Society
  • Citing :
    PeiFeng, Wang , Shang, Meng , (2009-2010)
    Markov model of malicious code propagation - IEEE Computer Society
    Cited :
    Epidemic state analysis of computers under malware attacks - Jnl.Simulation Modelling Practice & Theory, Elsevier
  • Citing :
    Suleyman Kondakci , Cemali Dincer , (2009-2010)
    Internet epidemiology: Healthy, susceptible, infected, quarantined, and recovered - Security and Communication Networks
    Cited :
    Epidemic state analysis of computers under malware attacks - Jnl.Simulation Modelling Practice & Theory, Elsevier
  • Citing :
    PeiFeng Wang , Shang Meng , (2008-2009)
    International Conference on Innovative Computing and Communication/Markov model of malicious code propagation - CICC-ITOE
    Cited :
    SIMULATION MODELLING PRACTICE AND THEORY/ Epidemic state analysis of computers under malware attacks - Elsevier/ SIMULATION MODELLING PRACTICE AND THEORY
  • Citing :
    Martin del Rey A. (2008-2009)
    A Computer Virus Spread Model Based on Cellular Automata on Graphs - Lecture Notes in Computer Science
    Cited :
    SIMULATION MODELLING PRACTICE AND THEORY/ Epidemic state analysis of computers under malware attacks - Elsevier/ SIMULATION MODELLING PRACTICE AND THEORY
  • Citing :
    Xiong Cheng-Jie , Li Yan-Fu , (2008-2009)
    ADVANCES IN SOFTWARE ENGINEERING/ Service Reliability and Availability Analysis of Distributed Software Systems Considering Malware Attack - Communications in Computer and Information Science
    Cited :
    SIMULATION MODELLING PRACTICE AND THEORY/ Epidemic state analysis of computers under malware attacks - Elsevier/ SIMULATION MODELLING PRACTICE AND THEORY
  • Citing :
    Suleyman Kondakci , Cemali Dincer , (2008-2009)
    SECURITY AND COMMUNICATION NETWORKS/ Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered - Wiley-Blackwell
    Cited :
    SIMULATION MODELLING PRACTICE AND THEORY/ Epidemic state analysis of computers under malware attacks - Elsevier/ SIMULATION MODELLING PRACTICE AND THEORY
  • Citing :
    Cheng-Jie Xiong , Yan-Fu Li , (2008-2009)
    Service reliability and availability analysis of distributed software systems considering malware attack - Communications in Computer and Information Science, Springer
    Cited :
    Epidemic state analysis of computers under malware attacks - Jnl.Simulation Modelling Practice & Theory, Elsevier
  • Citing :
    Del Rey, A.M. , Del Rey , (2008-2009)
    A computer virus spread model based on cellular automata on graphs - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Cited :
    Epidemic state analysis of computers under malware attacks - Jnl.Simulation Modelling Practice & Theory, Elsevier
  • Citing :
    Suleyman Kondakci , Suleyman Kondakci , (2008-2009)
    A concise cost analysis of Internet malware - Computers & Security, Elsevier
    Cited :
    Epidemic state analysis of computers under malware attacks - Jnl.Simulation Modelling Practice & Theory, Elsevier

Referenced in publications covered by WoS indexes

  • Citing :
    Angel Martín del Rey (2014-2015)
    Mathematical modeling of the propagation of malware: a review - Security and Communication Networks
    Cited :
    Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered - Security and Communication Networks
  • Citing :
    Jesus R. Artalejo (2014-2015)
    On the Markovian Approach for Modeling the Dynamics of Nosocomial Infections - Acta Biotheoretica-Springer Verlag
    Cited :
    Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered - Security and Communication Networks
  • Citing :
    J.R. Artalejo , M.J. Lopez-Herrero , (2014-2015)
    Stochastic epidemic models: New behavioral indicators of the disease spreading - Applied Mathematical Modelling
    Cited :
    Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered - Security and Communication Networks
  • Citing :
    Julia Amador , Jesus R. Artalejo , (2012-2013)
    Modeling computer virus with the BSDE approach - Elsevier/ COMPUTER NETWORKS
    Cited :
    Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered - SECURITY AND COMMUNICATION NETWORKS