Energy-Efficient Patching Strategy for Wireless Sensor Networks
暂无分享,去创建一个
Junhao Wen | Lu-Xing Yang | Xiaofan Yang | Pengdeng Li | Qingyu Xiong | Xiang Zhong | Lu-Xing Yang | Pengdeng Li | Xiaofan Yang | Junhao Wen | Qingyu Xiong | Xiang Zhong
[1] Tansu Alpcan. A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture) , 2013, AISC.
[2] Yuan Yan Tang,et al. Defending against the Advanced Persistent Threat: An Optimal Control Approach , 2018, Secur. Commun. Networks.
[3] Limin Wang,et al. Energy-efficient multihop reprogramming for sensor networks , 2009, TOSN.
[4] Yuan Yan Tang,et al. Dynamic malware containment under an epidemic model with alert , 2017 .
[5] Piet Van Mieghem,et al. The N-intertwined SIS epidemic network model , 2011, Computing.
[6] Jitender Grover,et al. Probabilistic Density Based Adaptive Clustering scheme to improve network survivability in WSN , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[7] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[8] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[9] E. Stein,et al. Real Analysis: Measure Theory, Integration, and Hilbert Spaces , 2005 .
[10] Tansu Alpcan,et al. Network Security , 2010 .
[11] Shensheng Tang,et al. An epidemic model with adaptive virus spread control for Wireless Sensor Networks , 2011, Int. J. Secur. Networks.
[12] Shouhuai Xu,et al. Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights , 2012, TAAS.
[13] R. Robinson,et al. An Introduction to Dynamical Systems: Continuous and Discrete , 2004 .
[14] Donald E. Kirk,et al. Optimal control theory : an introduction , 1970 .
[15] Wanlei Zhou,et al. On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[16] William J. Stewart,et al. Probability, Markov Chains, Queues, and Simulation: The Mathematical Basis of Performance Modeling , 2009 .
[17] Hiroshi Furukawa,et al. Game Theory Meets Wireless Sensor Networks Security Requirements and Threats Mitigation: A Survey , 2016, Sensors.
[18] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[19] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[20] Wanlei Zhou,et al. A Differential Game Approach to Patch Injection , 2018, IEEE Access.
[21] Brian L. Mark,et al. Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.
[22] Wei Dong,et al. Reprogramming over Low Power Link Layer in Wireless Sensor Networks , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.
[23] Yuan Yan Tang,et al. A Bi-Virus Competing Spreading Model with Generic Infection Rates , 2018, IEEE Transactions on Network Science and Engineering.
[24] Jitender Grover,et al. Wireless Sensor Network in Railway Signalling System , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.
[25] Yingshu Li,et al. EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks , 2010, J. Comb. Optim..
[26] Hossam Mahmoud Ahmad Fahmy. Wireless Sensor Networks: Concepts, Applications, Experimentation and Analysis , 2016 .
[27] Zhu Han,et al. Game Theory in Wireless and Communication Networks: Theory, Models, and Applications , 2011 .
[28] Shouhuai Xu,et al. Adaptive Epidemic Dynamics in Networks , 2013, ACM Trans. Auton. Adapt. Syst..
[29] Pengpeng Zhao,et al. Discount pricing in word-of-mouth marketing: An optimal control approach , 2018, Physica A: Statistical Mechanics and its Applications.
[30] Jan Willemson,et al. Privacy Protection for Wireless Medical Sensor Data , 2016, IEEE Transactions on Dependable and Secure Computing.
[31] Daniel Liberzon,et al. Calculus of Variations and Optimal Control Theory: A Concise Introduction , 2012 .
[32] Yonghong Chen,et al. Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks , 2017, Sensors.
[33] Li-Ping Feng,et al. Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network , 2015 .
[34] Shensheng Tang. A Modified Epidemic Model for Virus Spread Control in Wireless Sensor Networks , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[35] P. Van Mieghem,et al. Virus Spread in Networks , 2009, IEEE/ACM Transactions on Networking.
[36] Shouhuai Xu,et al. Preventive and Reactive Cyber Defense Dynamics Is Globally Stable , 2016, IEEE Transactions on Network Science and Engineering.
[37] Amit K. Awasthi,et al. Modeling and Analysis of Worm Propagation in Wireless Sensor Networks , 2017, Wireless Personal Communications.
[38] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[39] Fei Yu,et al. A Survey of Game Theory in Wireless Sensor Networks Security , 2011, J. Networks.
[40] Yazeed Al-Sbou,et al. Introduction to Mobile Ad-Hoc and Vehicular Networks , 2015 .
[41] Yuan Yan Tang,et al. Security Evaluation of the Cyber Networks Under Advanced Persistent Threats , 2017, IEEE Access.
[42] Wanlei Zhou,et al. Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach , 2019, IEEE Transactions on Information Forensics and Security.
[43] Yuan Yan Tang,et al. A Risk Management Approach to Defending Against the Advanced Persistent Threat , 2020, IEEE Transactions on Dependable and Secure Computing.
[44] Yuan Yan Tang,et al. On the competition of two conflicting messages , 2018 .
[45] C. Scoglio,et al. On the existence of a threshold for preventive behavioral responses to suppress epidemic spreading , 2012, Scientific Reports.
[46] Saswati Sarkar,et al. Maximum Damage Battery Depletion Attack in Mobile Sensor Networks , 2011, IEEE Transactions on Automatic Control.
[47] Daniel Minoli,et al. Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .
[48] Lu-Xing Yang,et al. Heterogeneous virus propagation in networks: a theoretical study , 2017 .
[49] Ryan A. Rossi,et al. The Network Data Repository with Interactive Graph Analytics and Visualization , 2015, AAAI.
[50] Shouhuai Xu,et al. A Stochastic Model of Active Cyber Defense Dynamics , 2015, Internet Math..
[51] Ángel Martín del Rey,et al. Malware propagation in Wireless Sensor Networks: global models vs Individual-based models , 2017, DCAI 2017.
[52] Xiaofan Yang,et al. The impact of patch forwarding on the prevalence of computer virus: A theoretical assessment approach , 2017 .
[53] Lu-Xing Yang,et al. The Impact of the Network Topology on the Viral Prevalence: A Node-Based Approach , 2015, PloS one.
[54] Qiang Wang,et al. Reprogramming wireless sensor networks: challenges and approaches , 2006, IEEE Network.
[55] Yuan Yan Tang,et al. Effectiveness analysis of a mixed rumor-quelling strategy , 2018, J. Frankl. Inst..
[56] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[57] Hayder Radha,et al. Using signal processing techniques to model worm propagation over wireless sensor networks , 2006 .