no code implementations • 23 Jul 2021 • J. S. Panman de Wit, J. van der Ham, D. Bucur
We use a real-life dataset containing device and malware data from 47 users for a year (2016).
1 code implementation • 5 Oct 2018 • D. Bucur, G. Iacca, M. Gaudesi, G. Squillero, A. Tonda
This new type of configuration, however, poses new challenges to security, amongst them, assessing the effect that a group of colluding malicious participants can have on the global message delivery rate in such a network is far from trivial.