[1]
M. Hypponen, Scientific American Nov, 70 (2006).
Google Scholar
[2]
M. Nekovee, New Journal of Physics 9, 189 (2007).
Google Scholar
[3]
J. Kleinberg, Nature 449, 287 (2007).
Google Scholar
[4]
C.J. Rhodesa and M. Nekovee, Physica A 387, 6837 (2008).
Google Scholar
[5]
P. Wang, M. Gonzalez, C. A. Hidalgo and A. -L. Barabási, Science 324, 1071 (2009).
Google Scholar
[6]
M. C. González, C. A. Hidalgo and A. -L. Barabási, Nature 435, 779 (2008).
Google Scholar
[7]
T. Nagatani, Phys. Lett. A 372, 5887 (2008).
Google Scholar
[8]
Y. Hayashi, Physica A 388, 991 (2009).
Google Scholar
[9]
L. Ding and Z. H. Guan, Physica A 387, 3008 (2008).
Google Scholar
[10]
J. S. Kong and V. P. Roychowdhury, Physica A 387, 3335 (2008).
Google Scholar
[11]
S. Qin, G. Z. Dai, L. Wang and M. Fan, Physica A 386, 679 (2007).
Google Scholar
[12]
M. Schonhof, A. Kesting, M. Treiber and D. Helbing, Physica A 363, 73 (2006).
Google Scholar
[13]
W. Krause, J. Scholz and M. Greiner, Physica A 361, 707 (2006).
Google Scholar
[14]
H. Mohammadi, E. N. Oskoee, M. Afsharchi, N. Yazdani and M. Sahimi, International Journal of Modern Physics C 20, 1871 (2009).
DOI: 10.1142/s0129183109014795
Google Scholar
[15]
M. B. Hu, R. Jiang, Y. H. Wu, W. X. Wang and Q. S. Wu, European Physical Journal B 63, 127 (2008).
Google Scholar
[16]
S. E. Coull and B. K. Szymanski, Computers & Security 28, 637 (2009).
Google Scholar
[17]
B. Stephenson and B. Sikdar, IEEE Trans. On Computers 58, 1289 (2009).
Google Scholar
[18]
D. Dagon, T. Martin and T. Starner, IEEE Pervasive Computing 3, 11 (2004).
Google Scholar
[19]
G. H. Yan and S. Eidenbenz, IEEE Trans. On Mobile Computing 8, 353 (2009).
Google Scholar
[20]
S. Tanachaiwiwat and A. Helmy, Ad Hoc Networks 7, 1414 (2009).
Google Scholar
[21]
N. Levitt, IEEE Computer 38, 20 (2005).
Google Scholar
[22]
D. H. Shih, B. Lin, H. S. Chiang and M. H. Shih, Industrial Management & Data Systems 108, 478 (2008).
Google Scholar
[23]
S. Khayam and H. Radha, Analyzing the Spread of Active Worms over VANET, in Proc. ACM Int. Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, p.86–87 (2004).
DOI: 10.1145/1023875.1023889
Google Scholar
[24]
M. Nekovee, Modeling the Spread of Worm Epidemics in Vehicular Ad Hoc Networks, in Proc. IEEE Vehicular Technology Conference, Melbourne, Australia, pp.841-845 (2006).
DOI: 10.1109/vetecs.2006.1682943
Google Scholar
[25]
M. Treiber, A. Hennecke and D. Helbing. Phys. Rev. E 62, 1805 (2000).
Google Scholar
[26]
T. Rappaport, Wireless Communications, Principle and Parctice (Englewood Cliffs, NJ: Prentice-Hall) (2000).
Google Scholar
[27]
L. Cheng and R. Shakya, International Journal of Communication Networks and Information Security 2, 50 (2010).
Google Scholar
[28]
Z. J. Bao, Y. J. Cao, G. Z. Wang and L. J. Ding, Physics Letters A 373, 3032 (2009).
Google Scholar
[29]
J. Wang, Y. H. Liu, Y. Jiao and H. Y. Hu, European Physical Journal B 67, 95 (2009).
Google Scholar
[30]
J. Wang, Y. H. Liu, D. X. Tian and D. Wei, Journal of China Universities of Posts and Telecommunications 14, 79 (2007).
Google Scholar
[31]
R. Moskovitch, Y. Elovici and L. Rokach, Computational Statistics & Data Analysis 52, 4544 (2008).
DOI: 10.1016/j.csda.2008.01.028
Google Scholar