[4] |
沈士根, 冯晟, 周海平 ,等. 基于云计算和动态贝叶斯博弈的 WSN 恶意程序传播优化抑制方法[J]. 电信科学, 2018,34(9): 78-86.
|
|
SHEN S G , FENG S , ZHOU H P ,et al. Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game[J]. Telecommunications Science, 2018,34(9): 78-86.
|
[5] |
ZHU L , ZHAO H . Dynamical analysis and optimal control for a malware propagation model in an information network[J]. Neurocomputing, 2015(149): 1370-1386.
|
[6] |
WANG Y , WEN S , XIANG Y ,et al. Modeling the propagation of worms in networks:a survey[J]. IEEE Communications Surveys & Tutorials, 2014,16(2): 942-960.
|
[7] |
HOSSEINI S , AZGOMI M A , RAHMANI A T . Malware propagation modeling considering software diversity and immunization[J]. Journal of Computational Science, 2016(13): 49-67.
|
[8] |
MOHI M , MOVAGHAR A , ZADEH P M . A Bayesian game approach for preventing DoS attacks in wireless sensor networks[C]// 2009 WRI International Conference on Communications and Mobile Computing,Jan 6-8,2009,Kunming,China. Piscataway:IEEE Press, 2009: 507-511.
|
[9] |
沈士根, 刘建华, 曹奇英 . 博弈论与无线传感器网络安全[M]. 北京: 清华大学出版社, 2016.
|
|
SHEN S G , LIU J H , CAO Q Y . Game theory and wireless sensor network security[M]. Beijing: Tsinghua University PressPress, 2016.
|
[10] |
SHEN S , LI H , HAN R ,et al. Differential game-based strategies for preventing malware propagation in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2014,9(11): 1962-1973.
|
[11] |
王晋东, 余定坤, 张恒巍 ,等. 静态贝叶斯博弈主动防御策略选取方法[J]. 西安电子科技大学学报, 2016(1): 144-150.
|
|
WANG J D , YU D K , ZHANG H W ,et al. Active defense strategy based on the static Bayesian game[J]. Journal of Xidian University, 2016(1): 144-150.
|
[12] |
CHENG Z . A differential game model between intrusion detection system and attackers for wireless sensor networks[J]. Wireless Personal Communications, 2016,90(3): 1211-1219.
|
[1] |
沈士根, 黄龙军, 周海平 ,等. 面向恶意程序传播的异质WSN 稳态可用度评估[J]. 传感技术学报, 2017,30(7): 1100-1105.
|
|
SHEN S G , HUANG L J , ZHOU H P ,et al. Steady-state availability evaluation for heterogeneous WSN under malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(7): 1100-1105.
|
[13] |
CHEN Z , QIAO C , QIU Y ,et al. Dynamics stability in wireless sensor networks active defense model[J]. Journal of Computer and System Sciences, 2014,80(8): 1534-1548.
|
[14] |
SEDJELMACI H , SENOUCI S , ANSARI N . Intrusion detection and ejection framework against lethal attacks in UAV-aided network:a Bayesian game-theoretic methodology[J]. IEEE Transactions on Intelligent Transportation Systems, 2017,18(5): 1143-1153.
|
[15] |
沈士根, 黄龙军, 范恩 ,等. 受恶意程序传染的WSN可生存性评估[J]. 传感技术学报, 2016,29(7): 1083-1089.
|
|
SHEN S G , HUANG L J , FAN E ,et al. Survivability evaluation for WSN under malware infection[J]. Chinese Journal of Sensors and Actuators, 2016,29(7): 1083-1089.
|
[2] |
沈士根, 周海平, 黄龙军 ,等. 基于最优反应均衡的传感网恶意程序传播抑制方法[J]. 传感技术学报, 2017,30(10): 1589-1595.
|
|
SHEN S G , ZHOU H P , HUANG L J ,et al. Quantal response equilibrium-based method for preventing WSN malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(10): 1589-1595.
|
[16] |
SINGH A , AWASTHI A , SINGH K ,et al. Modeling and analysis of worm propagation in wireless sensor network[J]. Wireless Personal Communications, 2018,98(3): 2535-2551.
|
[17] |
王小明, 李成博, 李英殊 . 移动无线传感网恶意数据包传染随机模型[J]. 电子与信息学报, 2013,35(6): 1290-1297.
|
[3] |
沈士根, 范恩, 胡珂立 ,等. 面向恶意程序传播的传感网可靠度评估[J]. 电子学报, 2018,46(1): 75-81.
|
|
SHEN S G , FAN E , HU K L ,et al. Reliability evaluation for WSN with malware spread[J]. Acta Electronica Sinica, 2018,46(1): 75-81.
|
[17] |
WANG X M , LI C B , LI Y S . A stochastic model of malicious data packet propagation in mobile wireless sensor networks[J]. Journal of Electronics & Information Technology, 2013,35(6): 1290-1297.
|
[18] |
宋玉蓉, 蒋国平, 徐加刚 . 一种基于元胞自动机的自适应网络病毒传播模型[J]. 物理学报, 2011(12): 115-124.
|
|
SONG Y R , JIANG G P , XU J G . An epidemic spreading modelin adaptive networks based on cellular automata[J]. Acta Physica Sinica, 2011(12): 115-124.
|
[19] |
WANG Y , LI D , DONG N . Cellular automata malware propagation model for WSN based on multi-player evolutionary game[J]. IET Networks, 2018,7(3): 129-135.
|
[20] |
FENG L , SONG L , ZHAO Q ,et al. Modeling and stability analysis of worm propagation in wireless sensor network[J]. Mathematical Problems in Engineering, 2015: 1-8.
|
[21] |
曹玉林, 赵焱鑫, 王小明 . 基于元胞自动机的自适应网络断边重连策略研究[J]. 计算机应用研究, 2016(8): 2475-2478.
|
|
CAO Y L , ZHAO Y X , WANG X M . Research on reconnecting strategy of adaptive networks based on cellular automata[J]. Application Research of Computers, 2016(8): 2475-2478.
|
[22] |
赵金皓, 曹奇英, 沈士根 . 受到恶意程序攻击的 MWSN 节点状态时空动力学分析[J]. 计算机应用与软件, 2018(6): 122-128.
|
|
ZHAO J H , CAO Q Y , SHEN S G . Spatiotemporal dynamics analyses of mobile sensor nodes attacked by malware[J]. Computer Applications and Software, 2018(6): 122-128.
|
[23] |
SAYAD H M , WEN S , XIANG Y ,et al. On the race of worms and patches:modeling the spread of information in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2016,11(12): 2854-2865.
|
[24] |
BYUN H , YU J . Cellular-automaton-based node scheduling control for wireless sensor networks[J]. IEEE Transactions on Vehicular Technology, 2014,63(8): 3892-3899.
|
[25] |
刘玉岭, 冯登国, 吴丽辉 ,等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012(3): 712-723.
|
|
LIU Y L , FENG D G , WU L H ,et al. Performance evaluation of worm attack and defense strategies based on static Bayesian game[J]. Journal of Software, 2012(3): 712-723.
|