Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks
暂无分享,去创建一个
Yonghong Chen | Hui Tian | Tian Wang | Yiqiao Cai | Baowei Wang | Qun Wu | Sheng Wen | Baowei Wang | Yonghong Chen | Tian Wang | Yiqiao Cai | H. Tian | Sheng Wen | Qun Wu
[1] Neeli R. Prasad,et al. Self-propagating worms in wireless sensor networks , 2009, Co-Next Student Workshop '09.
[2] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[3] Donald F. Towsley,et al. Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms , 2007, IEEE Transactions on Dependable and Secure Computing.
[4] Li Xu,et al. Worm propagation model in mobile network , 2016, Concurr. Comput. Pract. Exp..
[5] Zhou Hanxun and Zhao Hong. Modeling and Analysis of Active-Benign Worms and Hybrid-Benign Worms , 2007 .
[6] Qijun Gu,et al. A study of self-propagating mal-packets in sensor networks: Attacks and defenses , 2011, Comput. Secur..
[7] Ruchuan Wang,et al. Modeling and analysis of anti-worm in P2P networks , 2012 .
[8] WangMeng,et al. Worm propagation model in mobile network , 2016 .
[9] Bimal Kumar Mishra,et al. Mathematical model on the transmission of worms in wireless sensor network , 2013 .
[10] Daeyoung Kim,et al. A2S: Automated Agriculture System based on WSN , 2007, 2007 IEEE International Symposium on Consumer Electronics.
[11] Athanasios V. Vasilakos,et al. Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.
[12] Sencun Zhu,et al. Improving sensor network immunity under worm attacks: a software diversity approach , 2008, MobiHoc '08.
[13] Shensheng Tang,et al. A Modified SI Epidemic Model for Combating Virus Spread in Wireless Sensor Networks , 2011, Int. J. Wirel. Inf. Networks.
[14] Xingming Sun,et al. Efficient algorithm for k-barrier coverage based on integer linear programming , 2016, China Communications.
[15] Jian Shen,et al. A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .
[16] Md. Rafiqul Islam,et al. Anomaly Detection in Wireless Sensor Network , 1969, J. Networks.
[17] Mark Newman,et al. Networks: An Introduction , 2010 .
[18] Sandeep S. Kulkarni,et al. Infuse: A TDMA Based Data Dissemination Protocol for Sensor Networks , 2006, Int. J. Distributed Sens. Networks.
[19] Sajal K. Das,et al. Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, Ad Hoc Networks.
[20] S. Subha,et al. Message authentication and wormhole detection mechanism in wireless sensor network , 2015, 2015 IEEE 9th International Conference on Intelligent Systems and Control (ISCO).
[21] Tian Wang,et al. Extracting Target Detection Knowledge Based on Spatiotemporal Information in Wireless Sensor Networks , 2016, Int. J. Distributed Sens. Networks.
[22] M. Srbinovska,et al. Environmental parameters monitoring in precision agriculture using wireless sensor networks , 2015 .
[23] Bimal Kumar Mishra,et al. Optimal Control Model for Attack of Worms in Wireless Sensor Network , 2014 .
[24] Jiannong Cao,et al. Following Targets for Mobile Tracking in Wireless Sensor Networks , 2016, ACM Trans. Sens. Networks.
[25] Ziyad S. Al-Salloum. Defensive computer worms: an overview , 2012, Int. J. Secur. Networks.
[26] Sencun Zhu,et al. Improving sensor network immunity under worm attacks: A software diversity approach , 2016, Ad Hoc Networks.
[27] Hao Wang,et al. A measure system of zero moment point using wearable inertial sensors , 2016, China Communications.
[28] Nilesh K. Modi,et al. Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in Ad hoc Networks , 2014 .
[29] Li-Ping Feng,et al. Modeling and Stability Analysis of Worm Propagation in Wireless Sensor Network , 2015 .
[30] Adel Torkaman Rahmani,et al. Malware propagation modeling considering software diversity and immunization , 2016, J. Comput. Sci..
[31] K DasSajal,et al. Distributed detection of mobile malicious node attacks in wireless sensor networks , 2012, AdhocNets 2012.
[32] Walid Abdallah,et al. A location-aware authentication and key management scheme for wireless sensor networks , 2016, 2016 22nd Asia-Pacific Conference on Communications (APCC).
[33] Michalis Faloutsos,et al. Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point , 2011, Networking.
[34] Daniel P. W. Ellis,et al. White Worms Don't Work , 2006, Login: The Usenix Magazine.
[35] Jun Zhang,et al. Modeling and Analysis on the Propagation Dynamics of Modern Email Malware , 2014, IEEE Transactions on Dependable and Secure Computing.
[36] Wanlei Zhou,et al. On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.
[37] Steven Myers,et al. Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm , 2011, LEET.
[38] Yuxiang Wang,et al. Construction of Tree Network with Limited Delivery Latency in Homogeneous Wireless Sensor Networks , 2014, Wirel. Pers. Commun..
[39] Bin Wang,et al. P2P Anti-worm: Modeling and Analysis of a New Worm Counter-measurement Strategy , 2008, 2008 The 9th International Conference for Young Computer Scientists.