Defending against Malicious Threats in Wireless Sensor Network: A Mathematical Model
暂无分享,去创建一个
[1] J. Gillis,et al. Matrix Iterative Analysis , 1961 .
[2] Brian L. Mark,et al. Analysis of virus spread in wireless sensor networks: An epidemic model , 2009, 2009 7th International Workshop on Design of Reliable Communication Networks.
[3] Donald F. Towsley,et al. Worm propagation modeling and analysis under dynamic quarantine defense , 2003, WORM '03.
[4] Shengqiang Liu,et al. SEIR epidemic model with delay , 2006 .
[5] Sajal K. Das,et al. Modeling node compromise spread in wireless sensor networks using epidemic theory , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[6] A. J. Hall. Infectious diseases of humans: R. M. Anderson & R. M. May. Oxford etc.: Oxford University Press, 1991. viii + 757 pp. Price £50. ISBN 0-19-854599-1 , 1992 .
[7] Thomas M. Chen,et al. Effectiveness of Quarantine in Worm Epidemics , 2006, 2006 IEEE International Conference on Communications.
[8] Jeffrey O. Kephart,et al. A biologically inspired immune system for computers , 1994 .
[9] N. Bailey. The mathematical theory of epidemics , 1957 .
[10] Alessandro Vespignani,et al. Efficiency and reliability of epidemic data dissemination in complex networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[11] R. May,et al. Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.
[12] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[13] Dinesh Kumar Saini,et al. SEIRS epidemic model with delay for transmission of malicious objects in computer network , 2007, Appl. Math. Comput..
[14] Bimal Kumar Mishra,et al. Mathematical models on computer viruses , 2007, Appl. Math. Comput..
[15] Bimal Kumar Mishra. WITHDRAWN: Generality of the final size formula for infected nodes due to the attack of malicious agents in a computer network , 2007 .
[16] Stephanie Forrest,et al. Email networks and the spread of computer viruses. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[17] Bimal Kumar Mishra,et al. Two Quarantine Models on the Attack of Malicious Objects in Computer Network , 2012 .
[18] Bimal Kumar Mishra,et al. Dynamic model of worms with vertical transmission in computer network , 2011, Appl. Math. Comput..
[19] R.W. Thommes,et al. Modeling Virus Propagation in Peer-to-Peer Networks , 2005, 2005 5th International Conference on Information Communications & Signal Processing.
[20] W. O. Kermack,et al. A contribution to the mathematical theory of epidemics , 1927 .