[1] |
SHEN S , HUANG L , ZHOU H ,et al. Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based IoT networks[J]. IEEE Internet of Things Journal, 2018,5(2): 1043-1054.
|
[2] |
SHEN S , ZHOU H , FENG S ,et al. HSIRD:a model for characterizing dynamics of malware diffusion in heterogeneous WSN[J]. Journal of Network and Computer Applications, 2019(146): 14.
|
[3] |
ZHOU H , SHEN S , LIU J . Malware propagation model in wireless sensor networks under attack-defense confrontation[J]. Computer Communications, 2020(162): 51-58.
|
[4] |
张红, 沈士根, 吴小军 ,等. 基于元胞自动机和静态贝叶斯博弈的 WSN 恶意程序传染模型[J]. 电信科学, 2019,35(6): 60-69.
|
|
ZHANG H , SHEN S G , WU X J ,et al. WSN malware infection model based on cellular automaton and static Bayesian game[J]. Telecommunications Science, 2019,35(6): 60-69.
|
[5] |
周海平, 沈士根, 黄龙军 ,等. 基于博弈论的无线传感器网络恶意程序传播模型[J]. 电信科学, 2018,34(11): 67-76.
|
|
ZHOU H P , SHEN S G , HUANG L J ,et al. Game theory-based malware propagation model for wireless sensor network[J]. Telecommunications Science, 2018,34(11): 67-76.
|
[6] |
沈士根, 冯晟, 周海平 ,等. 基于云计算和动态贝叶斯博弈的 WSN 恶意程序传播优化抑制方法[J]. 电信科学, 2018,34(9): 78-86.
|
|
SHEN S G , FENG S , ZHOU H P ,et al. Optimal approach of suppressing WSN malware propagation based on cloud computing and dynamic Bayesian game[J]. Telecommunications Science, 2018,34(9): 78-86.
|
[7] |
邹青丙, 何明, 王琰 ,等. 无线多跳网络可靠性评估方法研究[J]. 计算机工程与应用, 2015,51(5): 88-91,192.
|
|
ZOU Q B , HE M , WANG Y ,et al. Survey on reliability evaluating method of wireless multi-hop networks[J]. Computer Engineering and Applications, 2015,51(5): 88-91,192.
|
[8] |
何明, 陈国华, 赖海光 ,等. 物联网感知层移动自组织网可靠性评估方法[J]. 计算机科学, 2012,39(6): 104-106,137.
|
|
HE M , CHEN G H , LAI H G ,et al. Methods for evaluating reliability of mobile Ad hoc networks in the perception layer of IoT[J]. Computer Science, 2012,39(6): 104-106,137.
|
[9] |
沈士根, 黄龙军, 范恩 ,等. 受恶意程序传染的 WSNs 可生存性评估[J]. 传感技术学报, 2016,29(7): 1083-1089.
|
|
SHEN S G , HUANG L J , FAN E ,et al. Survivability evaluation for WSNs under malware infection[J]. Chinese Journal of Sensors and Actuators, 2016,29(7): 1083-1089.
|
[10] |
SHEN S G , MA H , FAN E ,et al. A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion[J]. Journal of Network and Computer Applications, 2017,91: 26-35.
|
[11] |
沈士根, 范恩, 胡珂立 ,等. 面向恶意程序传播的传感器网络可靠度评估[J]. 电子学报, 2018,46(1): 75-81.
|
|
SHEN S G , FAN E , HU K L ,et al. Reliability evaluation for WSNs with malware spread[J]. Acta Electronica Sinica, 2018,46(1): 75-81.
|
[12] |
沈士根, 黄龙军, 周海平 ,等. 面向恶意程序传播的异质WSN 稳态可用度评估[J]. 传感技术学报, 2017,30(7): 1100-1105.
|
|
SHEN S G , HUANG L J , ZHOU H P ,et al. Steady-state availability evaluation for heterogeneous WSN under malware infection[J]. Chinese Journal of Sensors and Actuators, 2017,30(7): 1100-1105.
|
[13] |
金娟, 曹奇英, 沈士根 ,等. 受恶意程序攻击的异质传感器网络节点可用度分析[J]. 计算机应用与软件, 2018,35(9): 167-172.
|
|
JIN J , CAO Q Y , SHEN S G ,et al. Nodes availability analysis of heterogeneous WSN attacked by malware[J]. Computer Applications and Software, 2018,35(9): 167-172.
|
[14] |
石琼, 丁英华, 秦丽 ,等. 无线传感器网络可生存性评估研究[J]. 中北大学学报(自然科学版), 2020,41(5): 418-430.
|
|
SHI Q , DING Y H , QIN L ,et al. Survivability assessment for wireless sensor networks[J]. Journal of North University of China (Natural Science Edition), 2020,41(5): 418-430.
|
[15] |
刘志锋, 陈凯, 李雷 ,等. 一种多种攻击并发下的WSN生存性评估模型[J]. 计算机科学, 2017,44(8): 129-133.
|
|
LIU Z F , CHEN K , LI L ,et al. Survivability evaluation model for wireless sensor network under multiple attacks[J]. Computer Science, 2017,44(8): 129-133.
|
[16] |
李化邓, 李雷, 施化吉 ,等. 无线传感器网络的生存性评估[J]. 计算机应用研究, 2018,35(8): 2450-2453.
|
|
LI H D , LI L , SHI H J ,et al. Survivability evaluation in wireless sensor network[J]. Application Research of Computers, 2018,35(8): 2450-2453.
|
[17] |
LIU J , JIANG X , NISHIYAMA H ,et al. Reliability assessment for wireless mesh networks under probabilistic region failure model[J]. IEEE Transactions on Vehicular Technology, 2011,60(5): 2253-2264.
|
[18] |
HUANG J , CHEN G , CHENG B . A stochastic approach of dependency evaluation for IoT devices[J]. Chinese Journal of Electronics, 2016,25(2): 209-214.
|
[19] |
YUE Y , LI J , FAN H ,et al. An efficient reliability evaluation method for industrial wireless sensor networks[J]. Journal of Southeast University (English Edition), 2016,32(2): 195-200.
|
[20] |
FERRAZ JUNIOR N , SILVA A , GUELFI A ,et al. IoT6Sec:reliability model for Internet of Things security focused on anomalous measurements identification with energy analysis[J]. Wireless Networks, 2019,25(4): 1533-1556.
|
[21] |
HUANG C , HUANG D , LIN Y . Network reliability evaluation for a distributed network with edge computing[J]. Computers and Industrial Engineering, 2020(147): 106492.
|
[22] |
ANDRADE E , NOGUEIRA B . Dependability evaluation of a disaster recovery solution for IoT infrastructures[J]. Journal of Supercomputing, 2020,76(3): 1828-1849.
|
[23] |
XIANG S , YANG J . Reliability evaluation and reliability-based optimal design for wireless sensor networks[J]. IEEE Systems Journal, 2020,14(2): 1752-1763.
|