[1] |
ALEXANDER S , ROBERTO B J . Estimating the state probability distribution for epidemic spreading in complex networks[J]. Applied Mathematics and Computation, 2016,291: 197-206.
|
[2] |
JUN W H . Hop-by-hop worm propagation with carry over epidemic model in mobile sensor networks[J]. Computers, 2015,4(4): 283-292.
|
[3] |
苏晓萍, 宋玉蓉, 申情 ,等. 一种具有GAF分簇结构的无线传感器网络中恶意软件传播模型[J]. 电信科学, 2011,27(8): 33-38.
|
|
SU X P , SONG Y R , SHEN Q ,et al. A malware propagation model with GAF-based clustering in wireless sensor network[J]. Telecommunica tions Science, 2011,27(8): 33-38.
|
[4] |
庄克琛, 张宏, 张琨 ,等. 无线传感器网络中的病毒传播动力学研究[J]. 计算机科学, 2013,40(3): 187-191.
|
|
ZHUANG K C , ZHANG H , ZHANG K ,et al. Analysis of spreading dynamics of virus in wireless sensor networks[J]. Computer Science, 2013,40(3): 187-191.
|
[5] |
曹玉林, 王小明, 何早波 ,等. 移动无线传感网中恶意软件传播的最优安全策略[J]. 电子学报, 2016,44(8): 1851-1857.
|
|
CAO Y L , WANG X M , HE Z B ,et al. Optimal security strategy for malware propagation in mobile wireless sensor networks[J]. Acta Electronica Sinica, 2016,44(8): 1851-1857.
|
[6] |
王田, 吴群, 文晟 ,等. 无线传感网中移动式蠕虫的抑制与清理[J]. 电子与信息学报, 2016,38(9): 2202-2207.
|
|
WANG T , WU Q , WEN S ,et al. The inhibition and clearup of the mobile worm in wireless sensor networks[J]. Journal of Electronics & Information Technology, 2016,38(9): 2202-2207.
|
[7] |
MOHAMMAD S H , SHENG W , YANG X ,et al. On the race of worms and patches:modeling the spread of information in wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security, 2016,11(12): 2854-2865.
|
[8] |
FENG L P , SONG L P , ZHAO Q S ,et al. Modeling and stability analysis of worm propagation in wireless sensor network[J]. Mathematical Problems in Engineering, 2015,2015(1): 1-8.
|
[9] |
SOCIEVOLE A , RANGO F D , SCOGLIO C ,et al. Assessing network robustness under SIS epidemics:the relationship between epidemic threshold and viral conductance[J]. Computer Networks, 2016,103: 196-206.
|
[10] |
YEZEKAEL H , QUANYAN Z , Epidemic protection over heterogeneous networks using evolutionary poisson games[J]. IEEE Transactions on Information Forensics and Security, 2017,12: 1786-1800.
|