Stability and bifurcation analysis in a delayed reaction-diffusion malware propagation model
暂无分享,去创建一个
[1] Zhidong Teng,et al. Dynamic analysis of an SIR epidemic model with state dependent pulse vaccination , 2012 .
[2] Jianfeng Fan,et al. Elastic neural network method for multi-target tracking task allocation in wireless sensor network , 2009, Comput. Math. Appl..
[3] M. Newman. Spread of epidemic disease on networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[4] Rui Xu,et al. Global stability of a delayed SIRS epidemic model with saturation incidence and temporary immunity , 2010, Comput. Math. Appl..
[5] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[6] Rabi N. Mahapatra,et al. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[7] Li,et al. An Improved SIR Model for Analyzing the Dynamics of Worm Propagation in Wireless Sensor Networks , 2009 .
[8] Xiaolin Lin,et al. Hopf bifurcation in spatially homogeneous and inhomogeneous autocatalysis models , 2014, Comput. Math. Appl..
[9] Teresa Faria,et al. Normal forms and Hopf bifurcation for partial differential equations with delays , 2000 .
[10] Zhidong Teng,et al. Stability and bifurcation analysis of a discrete predator–prey model with nonmonotonic functional response , 2011 .
[11] Yang Luo,et al. Stability and Hopf bifurcation of a HIV infection model with CTL-response delay , 2011, Comput. Math. Appl..
[12] Zhidong Teng,et al. Stability analysis in a class of discrete SIRS epidemic models , 2012 .
[13] Azzedine Boukerche,et al. A secure mobile healthcare system using trust-based multicast scheme , 2009, IEEE Journal on Selected Areas in Communications.
[14] Wenjie Zuo,et al. Stability and Hopf bifurcation in a diffusive predator–prey system with delay effect , 2011 .
[15] Yi Pan,et al. Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks , 2013, Science China Information Sciences.
[16] Lu-Xing Yang,et al. A novel computer virus model and its dynamics , 2012 .
[17] Zhen Jin,et al. Analysis of an SIR model with bilinear incidence rate , 2010 .
[18] Gurkan Tuna,et al. An autonomous wireless sensor network deployment system using mobile robots for human existence detection in case of disasters , 2014, Ad Hoc Networks.
[19] Wilfried N. Gansterer,et al. Static vs. mobile sink: The influence of basic parameters on energy efficiency in wireless sensor networks , 2013, Comput. Commun..
[20] Xiangyun Shi,et al. Stability and Hopf bifurcation analysis of an eco-epidemic model with a stage structure , 2011 .
[21] Jianhong Wu. Theory and Applications of Partial Functional Differential Equations , 1996 .
[22] Cishen Zhang,et al. Energy-Based Multiple Target Localization and Pursuit in Mobile Sensor Networks , 2012, IEEE Transactions on Instrumentation and Measurement.
[24] Ming Chen,et al. Adaptive BER-constraint-based power allocation for downlink MC-CDMA systems with linear MMSE receiver , 2010, 2010 IEEE 12th International Conference on Communication Technology.
[25] Massimo Merro,et al. A semantic analysis of key management protocols for wireless sensor networks , 2011, Sci. Comput. Program..
[26] Saswati Sarkar,et al. Maximum Damage Battery Depletion Attack in Mobile Sensor Networks , 2011, IEEE Transactions on Automatic Control.
[27] Shanshan Li,et al. A scalable code dissemination protocol in heterogeneous wireless sensor networks , 2011, Science China Information Sciences.
[28] Issa M. Khalil,et al. CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks , 2012, Comput. Networks.
[29] Herbert W. Hethcote,et al. The Mathematics of Infectious Diseases , 2000, SIAM Rev..
[30] Bechir Hamdaoui,et al. Design and Analysis of Delay-Tolerant Sensor Networks for Monitoring and Tracking Free-Roaming Animals , 2012, IEEE Transactions on Wireless Communications.
[31] Robert F. Mills,et al. A security policy language for wireless sensor networks , 2009, J. Syst. Softw..
[32] J. Hale. Functional Differential Equations , 1971 .
[33] Hongyong Zhao,et al. Bifurcation and optimal harvesting of a diffusive predator-prey system with delays and interval biological parameters. , 2014, Journal of theoretical biology.
[34] Li Li,et al. Bifurcation and chaos in an epidemic model with nonlinear incidence rates , 2010, Appl. Math. Comput..
[35] Yingshu Li,et al. EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks , 2010, J. Comb. Optim..