Virus Propagation in Wireless Sensor Networks with Media Access Control Mechanism
暂无分享,去创建一个
Jijun Tong | Lurong Jiang | Hangyi Pan | Yanyun Dai | Qiaoyu Xu | Yanyun Dai | Hangyi Pan | Qiaoyu Xu | Jijun Tong | Lurong Jiang
[1] J. Kleinberg. Computing: the wireless epidemic. , 2007, Nature.
[2] Brian L. Mark,et al. Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.
[3] S. C. Sharma,et al. Energy optimization of energy aware routing protocol and bandwidth assessment for wireless sensor network , 2014, International Journal of System Assurance Engineering and Management.
[4] George Ledin. Not teaching viruses and worms is harmful , 2005, CACM.
[5] Bo Jiang,et al. Trust based energy efficient data collection with unmanned aerial vehicle in edge network , 2020, Trans. Emerg. Telecommun. Technol..
[6] Barry Sandywell,et al. Monsters in cyberspace cyberphobia and cultural panic in the information age , 2006 .
[7] Imran Khan. An introduction to computer viruses: problems and solutions , 2012 .
[8] Rudra Pratap Ojha,et al. Stability Analysis of SIDR Model for Worm Propagation in Wireless Sensor Network , 2016 .
[9] Xiao-Yuan Yang,et al. Virus spreading in wireless sensor networks with a medium access control mechanism , 2013 .
[10] A. Nageswar Rao,et al. Optimization of energy in wireless sensor networks using clustering techniques , 2016, 2016 International Conference on Communication and Electronics Systems (ICCES).
[11] Peng Li,et al. Influence of node mobility on virus spreading behaviors in multi-hop network , 2016, EURASIP J. Wirel. Commun. Netw..
[12] S. S. Patil,et al. Identification of Lung Cancer Related Genes Using Enhanced Floyd Warshall Algorithm in a Protein to Protein Interaction Network , 2018, International Journal of Intelligent Engineering and Systems.
[13] Li-Ping Feng,et al. Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network , 2015 .
[14] Yurong Song,et al. The Model of Malware Propagation in Wireless Sensor Networks with Regional Detection Mechanism , 2014, CWSN.
[15] A. Rachadi,et al. Modeling the spread of virus in packets on scale free network , 2016 .
[16] Nirvana Meratnia,et al. Potential of Wake-Up Radio-Based MAC Protocols for Implantable Body Sensor Networks (IBSN)—A Survey , 2016, Sensors.
[17] Yuxia Li,et al. Virus Propagation Model for Wireless Sensor Networks Based on IPv6 , 2018, Int. J. Online Eng..
[18] Zhigeng Pan,et al. Using SIR Model to Simulate Emotion Contagion in Dynamic Crowd Aggregation Process , 2018 .
[19] Bimal Kumar Mishra,et al. Mathematical model on the transmission of worms in wireless sensor network , 2013 .
[20] Yonghong Chen,et al. Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks , 2017, Sensors.
[21] Amit K. Awasthi,et al. Modeling and Analysis of Worm Propagation in Wireless Sensor Networks , 2017, Wireless Personal Communications.
[22] Wei Liu,et al. Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things , 2020, Trans. Emerg. Telecommun. Technol..
[23] Paul D. Mitchell,et al. Reservation Packet Medium Access Control for Wireless Sensor Networks , 2008, 2008 IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications.
[24] Vasileios Vlachos,et al. Epidemic model for malware targeting telephony networks , 2016, 2016 23rd International Conference on Telecommunications (ICT).
[25] Quan-Hui Liu,et al. Predicting the epidemic threshold of the susceptible-infected-recovered model , 2015, Scientific Reports.
[26] Zhao Yang Dong,et al. A Framework for Cyber-Topology Attacks: Line-Switching and New Attack Scenarios , 2019, IEEE Transactions on Smart Grid.
[27] Yan Gao,et al. Modeling of Node Energy Consumption for Wireless Sensor Networks , 2011, Wirel. Sens. Netw..
[28] H. G. Miller,et al. Waxman’s algorithm for non-Hermitian Hamiltonian operators , 2017, 1710.08411.
[29] Zhiwen Zeng,et al. A trust-based minimum cost and quality aware data collection scheme in P2P network , 2020, Peer-to-Peer Netw. Appl..
[30] Maziar Nekovee,et al. Worm epidemics in wireless ad hoc networks , 2007, ArXiv.
[31] Ranjit Kumar Upadhyay,et al. Bifurcation analysis of an e-epidemic model in wireless sensor network , 2018, Int. J. Comput. Math..
[32] Jungmin So,et al. Node Scheduling Control Inspired by Epidemic Theory for Data Dissemination in Wireless Sensor-Actuator Networks With Delay Constraints , 2016, IEEE Transactions on Wireless Communications.