SNIRD: Disclosing Rules of Malware Spread in Heterogeneous Wireless Sensor Networks
暂无分享,去创建一个
Sheng Feng | Qiying Cao | Shigen Shen | Jianhua Liu | Haiping Zhou | Qiying Cao | Shigen Shen | Jianhua Liu | Haiping Zhou | Sheng Feng
[1] Michael Poss,et al. MeDrone: On the use of a medical drone to heal a sensor network infected by a malicious epidemic , 2016, Ad Hoc Networks.
[2] J. D. Hernández Guillén,et al. Study of the stability of a SEIRS model for computer worm propagation , 2017 .
[3] John S. Baras,et al. Selfish Response to Epidemic Propagation , 2010, IEEE Transactions on Automatic Control.
[4] Li-Ping Feng,et al. Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network , 2015 .
[5] Lin Wang,et al. Global Stability of Virus Spreading in Complex Heterogeneous Networks , 2008, SIAM J. Appl. Math..
[6] Saswati Sarkar,et al. Optimal Patching in Clustered Malware Epidemics , 2014, IEEE/ACM Transactions on Networking.
[7] Jianhua Liu,et al. Reliability Evaluation for Clustered WSNs under Malware Propagation , 2016, Sensors.
[8] Feng Xia,et al. ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks , 2017, IEEE/ACM Transactions on Networking.
[9] Shouhuai Xu,et al. A Stochastic Model of Multivirus Dynamics , 2012, IEEE Transactions on Dependable and Secure Computing.
[10] Wanlei Zhou,et al. Modeling malicious activities in cyber space , 2015, IEEE Network.
[11] Jemal H. Abawajy,et al. Malware Threats and Detection for Industrial Mobile-IoT Networks , 2018, IEEE Access.
[12] Yi Pan,et al. Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks , 2013, Science China Information Sciences.
[13] Keqiu Li,et al. How Can Heterogeneous Internet of Things Build Our Future: A Survey , 2018, IEEE Communications Surveys & Tutorials.
[14] Jianhua Liu,et al. A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion , 2017, J. Netw. Comput. Appl..
[15] Huiyan Kang,et al. Spreading Dynamics of an SEIR Model with Delay on Scale-Free Networks , 2020, IEEE Transactions on Network Science and Engineering.
[16] Tailei Zhang,et al. Epidemic spreading of an SEIRS model in scale-free networks , 2011 .
[17] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[18] Chun-Ying Huang,et al. Decapitation via digital epidemics: a bio-inspired transmissive attack , 2016, IEEE Communications Magazine.
[19] Shui Yu,et al. Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks , 2018, IEEE Internet of Things Journal.
[20] Hongjie Li,et al. A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud , 2015, Appl. Soft Comput..
[21] Ranjit Kumar Upadhyay,et al. Bifurcation analysis of an e-epidemic model in wireless sensor network , 2018, Int. J. Comput. Math..
[22] Min Chen,et al. Analytical Model of Spread of Epidemics in Open Finite Regions , 2017, IEEE Access.
[23] J. Watmough,et al. Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. , 2002, Mathematical biosciences.
[24] Arun Kumar Sangaiah,et al. An Improved Routing Schema with Special Clustering Using PSO Algorithm for Heterogeneous Wireless Sensor Network , 2019, Sensors.
[25] Basel Alomair,et al. Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach , 2016, IEEE Transactions on Control of Network Systems.
[26] Hongjie Li,et al. Optimal Report Strategies for WBANs Using a Cloud-Assisted IDS , 2015, Int. J. Distributed Sens. Networks.
[27] Jianhua Liu,et al. A Markov Detection Tree-Based Centralized Scheme to Automatically Identify Malicious Webpages on Cloud Platforms , 2018, IEEE Access.
[28] Athanasios V. Vasilakos,et al. Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.
[29] Jianhua Liu,et al. Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds , 2018, IEEE Transactions on Information Forensics and Security.
[30] Hasmukh Morarji,et al. A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts , 2017, IEEE Access.
[31] Emil C. Lupu,et al. Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..
[32] Suh-Yuh Yang,et al. Analysis of epidemic spreading of an SIRS model in complex heterogeneous networks , 2014, Commun. Nonlinear Sci. Numer. Simul..
[33] Jin Wang,et al. A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks , 2018 .
[34] Guanrong Chen,et al. Global attractivity of a network-based epidemic SIS model with nonlinear infectivity , 2012 .
[35] Wanlei Zhou,et al. On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[36] Bimal Kumar Mishra,et al. Mathematical model on the transmission of worms in wireless sensor network , 2013 .
[37] Dafang Zhang,et al. Energy-Aware Routing for SWIPT in Multi-Hop Energy-Constrained Wireless Network , 2018, IEEE Access.
[38] Yonghong Chen,et al. Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks , 2017, Sensors.
[39] Amit K. Awasthi,et al. Modeling and Analysis of Worm Propagation in Wireless Sensor Networks , 2017, Wireless Personal Communications.
[40] Liang Xiao,et al. Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.
[41] Lu-Xing Yang,et al. Heterogeneous virus propagation in networks: a theoretical study , 2017 .
[42] Wang,et al. A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks , 2014 .
[43] Bimal Kumar Mishra,et al. Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network , 2014 .
[44] Qijun Gu,et al. A study of self-propagating mal-packets in sensor networks: Attacks and defenses , 2011, Comput. Secur..
[45] Bo Qu,et al. SIS Epidemic Spreading with Heterogeneous Infection Rates , 2015, IEEE Transactions on Network Science and Engineering.
[46] George J. Pappas,et al. Optimal Resource Allocation for Control of Networked Epidemic Models , 2017, IEEE Transactions on Control of Network Systems.
[47] Xiaoming Wang,et al. Bifurcation analysis of a delay reaction-diffusion malware propagation model with feedback control , 2015, Commun. Nonlinear Sci. Numer. Simul..
[48] Song Guo,et al. Malware Propagation in Large-Scale Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.