-
1
-
-
33746766914
-
Qos supporting and optimal energy allocation for a cluster-based wireless sensor network
-
Tang S., Li W. Qos supporting and optimal energy allocation for a cluster-based wireless sensor network. Comput. Commun. 2006, 29:2569-2577.
-
(2006)
Comput. Commun.
, vol.29
, pp. 2569-2577
-
-
Tang, S.1
Li, W.2
-
2
-
-
0036688074
-
A survey on networks
-
Akyildiz I., Su W., Sankarasubramaniam Y., Cayirci E. A survey on networks. IEEE Commun. Mag. 2002, 40(8).
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
84872621653
-
-
Weaver, in: Proc. Of the 11th USENIX Security Symposium (Security '02)
-
S.Stantiford, V. Paxton, Weaver, in: Proc. Of the 11th USENIX Security Symposium (Security '02), 2000.
-
(2000)
-
-
Stantiford, S.1
Paxton, V.2
-
7
-
-
22944476745
-
-
Levitt N. IEEE Comput. 2005, 38(4):20-23.
-
(2005)
IEEE Comput.
, vol.38
, Issue.4
, pp. 20-23
-
-
Levitt, N.1
-
10
-
-
34248175732
-
SEIRS epidemic model with delay for transmission of malicious objects in computer network
-
Mishra Bimal Kumar, Saini Dinesh Kumar SEIRS epidemic model with delay for transmission of malicious objects in computer network. Appl. Math. Comput. 2007, 188(2):1476-1482.
-
(2007)
Appl. Math. Comput.
, vol.188
, Issue.2
, pp. 1476-1482
-
-
Mishra, B.K.1
Saini, D.K.2
-
11
-
-
34247248180
-
Mathematical models on computer virus
-
Mishra Bimal Kumar, Saini Dinesh K Mathematical models on computer virus. Appl. Math. Comput. 2007, 187(2):929-936.
-
(2007)
Appl. Math. Comput.
, vol.187
, Issue.2
, pp. 929-936
-
-
Mishra, B.K.1
Saini, D.K.2
-
12
-
-
34250656571
-
Fixed period of temporary immunity after run of anti-malicious software on computer nodes
-
Mishra Bimal Kumar, Jha Navnit Fixed period of temporary immunity after run of anti-malicious software on computer nodes. Appl. Math. Comput. 2007, 190(2):1207-1212.
-
(2007)
Appl. Math. Comput.
, vol.190
, Issue.2
, pp. 1207-1212
-
-
Mishra, B.K.1
Jha, N.2
-
13
-
-
36749023984
-
Dealing with software viruses: a biological paradigm
-
Gelenbe E. Dealing with software viruses: a biological paradigm. Inform. Security Tech. Rep. 2007, 12(4):242-250.
-
(2007)
Inform. Security Tech. Rep.
, vol.12
, Issue.4
, pp. 242-250
-
-
Gelenbe, E.1
-
14
-
-
84872596854
-
Dealing with software viuses under control
-
Springer, 20th International Symposium on Computer and Information Sciences - ISCIS 2005
-
Gelenbe Erol Dealing with software viuses under control. Lecture Notes in Computer Science 2005, vol. 3733. Springer.
-
(2005)
Lecture Notes in Computer Science
, vol.3733
-
-
Gelenbe, E.1
-
15
-
-
33746561409
-
Biological metaphor for agent behavior
-
Springer-Verlag, 19th International Symposium on Computer and Information Science-ISCIS 2004
-
Gelenbe Erol, Kaptan Varol, Wang Yu Biological metaphor for agent behavior. Lecture Notes in Computer Science 2004, vol. 3280:667-675. Springer-Verlag.
-
(2004)
Lecture Notes in Computer Science
, vol.3280
, pp. 667-675
-
-
Gelenbe, E.1
Kaptan, V.2
Wang, Y.3
-
16
-
-
48849116444
-
Dynamical models for computer virus propagation
-
dio: 101155/2008/940526.
-
J.R.C. Piqueira, F.B. Cesar, Dynamical models for computer virus propagation, Math. Prob. Eng. dio: 101155/2008/940526.
-
Math. Prob. Eng.
-
-
Piqueira, J.R.C.1
Cesar, F.B.2
-
17
-
-
26844518826
-
Epidemiological model applied to virus in computer networks
-
Piqueira J.R.C., Navarro B.F., Monteiro L.H.A. Epidemiological model applied to virus in computer networks. J. Comput. Sci. 2005, 1(1):31-34.
-
(2005)
J. Comput. Sci.
, vol.1
, Issue.1
, pp. 31-34
-
-
Piqueira, J.R.C.1
Navarro, B.F.2
Monteiro, L.H.A.3
-
18
-
-
0001793263
-
Self-nonself discrimination in a computer, in: Proceeding of IEEE Symposium on Computer Security and Privacy
-
S. Forest, S. Hofmeyr, A. Somayaji, T. Longastaff, Self-nonself discrimination in a computer, in: Proceeding of IEEE Symposium on Computer Security and Privacy, 1994, pp. 202-212.
-
(1994)
, pp. 202-212
-
-
Forest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longastaff, T.4
-
19
-
-
4544275741
-
Modeling the effect of timing parameters on virus propagation
-
2003 ACM Workshop on Rapid Malcode, ACM, October
-
Y. Wang, C.X. Wang, Modeling the effect of timing parameters on virus propagation, in: 2003 ACM Workshop on Rapid Malcode, ACM, October 2003, pp. 61-66.
-
(2003)
, pp. 61-66
-
-
Wang, Y.1
Wang, C.X.2
-
23
-
-
79956061729
-
Dynamic model of worms with vertical transmission in computer network
-
Mishra Bimal Kumar, Pandey Samir Dynamic model of worms with vertical transmission in computer network. Appl. Math. Comput. 2011, 217:8438-8446.
-
(2011)
Appl. Math. Comput.
, vol.217
, pp. 8438-8446
-
-
Mishra, B.K.1
Pandey, S.2
-
24
-
-
28044469549
-
The monitoring and early detection of internet worms
-
Zou C.C., Gong W.B., Towsley D., Gao L.X. The monitoring and early detection of internet worms. IEEE/ACM Trans. Network 2005, 13(5):961-974.
-
(2005)
IEEE/ACM Trans. Network
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.C.1
Gong, W.B.2
Towsley, D.3
Gao, L.X.4
-
27
-
-
84872618748
-
-
Leill, An epidemiological model of virus spread and cleanup
-
Ma. M. Williamson, J. Leill, An epidemiological model of virus spread and cleanup, 2003, http://www.hpl.hp.com/techreports/.
-
(2003)
-
-
Ma, M.1
Williamson, J.2
-
28
-
-
37649029105
-
Email networks and spread of computer virus
-
035101-1-035101-4
-
Newman M.E.J., Forrest S., Balthrop J. Email networks and spread of computer virus. Phys. Rev. E 2002, 66. 035101-1-035101-4.
-
(2002)
Phys. Rev. E
, vol.66
-
-
Newman, M.E.J.1
Forrest, S.2
Balthrop, J.3
-
29
-
-
48849111795
-
Thresholds for virus spread on networks
-
Draief M., Ganesh A., Massouili L. Thresholds for virus spread on networks. Ann. Appl. Prob. 2008, 18(2):359-378.
-
(2008)
Ann. Appl. Prob.
, vol.18
, Issue.2
, pp. 359-378
-
-
Draief, M.1
Ganesh, A.2
Massouili, L.3
-
31
-
-
0002606747
-
A biologically inspired immune system for computers
-
in: Proceedings of International Joint Conference on Artificial Intelligence
-
J.O. Kephart, A biologically inspired immune system for computers, in: Proceedings of International Joint Conference on Artificial Intelligence, 1995.
-
(1995)
-
-
Kephart, J.O.1
-
32
-
-
2942672808
-
Immunization and epidemic dynamic in complex networks
-
Madar N., Kalisky T., Cohen R., Ben Avraham D., Havlin S. Immunization and epidemic dynamic in complex networks. Eur. Phys. J.B 2004, 38:269-276.
-
(2004)
Eur. Phys. J.B
, vol.38
, pp. 269-276
-
-
Madar, N.1
Kalisky, T.2
Cohen, R.3
Ben Avraham, D.4
Havlin, S.5
-
34
-
-
0035689341
-
Infection dynamics on scale - free networks
-
066112
-
May R.M., Lloyd A.L. Infection dynamics on scale - free networks. Phys. Rev. (E) 2001, 64(066112):1-3.
-
(2001)
Phys. Rev. (E)
, vol.64
, pp. 1-3
-
-
May, R.M.1
Lloyd, A.L.2
-
35
-
-
33751345631
-
The effectiveness of vaccination on the spread of email-borne computer virus
-
in: IEEE CCECE/CCGEI, IEE, May
-
S. Datta, H. Wang, The effectiveness of vaccination on the spread of email - borne computer virus, in: IEEE CCECE/CCGEI, IEE, May 2005, pp. 219 - 223.
-
(2005)
-
-
Datta, S.1
Wang, H.2
-
39
-
-
0015182224
-
Quantitative guidelines for communicable disease control programs
-
Sanders J.-L. Quantitative guidelines for communicable disease control programs. Biometric 1971, 27:883-893.
-
(1971)
Biometric
, vol.27
, pp. 883-893
-
-
Sanders, J.-L.1
-
40
-
-
0018247773
-
An immunization model for a heterogeneous population
-
Hethcote H.W. An immunization model for a heterogeneous population. Theor. Popul. Biol. 1978, 14:338-349.
-
(1978)
Theor. Popul. Biol.
, vol.14
, pp. 338-349
-
-
Hethcote, H.W.1
-
42
-
-
41349106348
-
Spread of epidemic disease on networks
-
Newman M.E.J. Spread of epidemic disease on networks. Phys. Rev. E 2002, 66:1-11.
-
(2002)
Phys. Rev. E
, vol.66
, pp. 1-11
-
-
Newman, M.E.J.1
-
43
-
-
42749108922
-
Efficiency and reliability of epidemic data dissemination in complex networks
-
Moreno Y., Nekovee M., Vespignani A. Efficiency and reliability of epidemic data dissemination in complex networks. Phys. Rev. E 2004, 69:1-4.
-
(2004)
Phys. Rev. E
, vol.69
, pp. 1-4
-
-
Moreno, Y.1
Nekovee, M.2
Vespignani, A.3
-
44
-
-
0036983264
-
Directed-graph epidemiological models of computer viruses
-
in: Proc. Fivth ACM Int. Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems
-
A. Khelil, C. Becker, J. Tian, K. Rothermel, Directed-graph epidemiological models of computer viruses, in: Proc. Fivth ACM Int. Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2002, pp. 54-60.
-
(2002)
, pp. 54-60
-
-
Khelil, A.1
Becker, C.2
Tian, J.3
Rothermel, K.4
-
45
-
-
67249098349
-
A topologically-aware worm propagation model for wireless sensor networks
-
workshop on Security in Distributed Computing Systems
-
S.A. Khayam, H. Radha, A topologically-aware worm propagation model for wireless sensor networks, in: Proc. Second Int. workshop on Security in Distributed Computing Systems, 2005, pp. 210-216.
-
(2005)
Proc. Second Int.
, pp. 210-216
-
-
Khayam, S.A.1
Radha, H.2
-
46
-
-
38649083121
-
An epidemic model of mobile phone virus
-
First Int. Symposium on Pervasive Computing and Applications
-
H. Zheng, D. Li, Z. Gao, An epidemic model of mobile phone virus, in: First Int. Symposium on Pervasive Computing and Applications, 2006, pp. 1-5.
-
(2006)
, pp. 1-5
-
-
Zheng, H.1
Li, D.2
Gao, Z.3
-
47
-
-
33845945205
-
Modeling node compromise spreading in wireless sensor networks using epidemic theory
-
Proc. IEEE WoWMoM 2006, (Niagara-Falls, NY), June
-
P. De, Y. Liu, S.K. Das, Modeling node compromise spreading in wireless sensor networks using epidemic theory, in: Proc. IEEE WoWMoM 2006, (Niagara-Falls, NY), June 2006.
-
(2006)
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
48
-
-
50249113871
-
An epidemic theoretic framework for evaluating broadcast protocols in wireless sensor networks
-
Proc. IEEE (Int'l Conf. on Mobile Adhoc and sensor systems (MASS), (Pisa, Italy), Oct
-
P. De, Y. Liu, S.K. Das, An epidemic theoretic framework for evaluating broadcast protocols in wireless sensor networks, in: Proc. IEEE (Int'l Conf. on Mobile Adhoc and sensor systems (MASS), (Pisa, Italy), Oct. 2007.
-
(2007)
-
-
De, P.1
Liu, Y.2
Das, S.K.3
-
50
-
-
84872613654
-
Effect of quarantine nodes in SEQIAmS model for the transmission of malicious objects in computer network
-
Mishra Bimal Kumar, Nayak Prasant Kumar, Jha Navnit Effect of quarantine nodes in SEQIAmS model for the transmission of malicious objects in computer network. Int. J. Math. Model. Simul. Appl. 2009, 2(1):102-113.
-
(2009)
Int. J. Math. Model. Simul. Appl.
, vol.2
, Issue.1
, pp. 102-113
-
-
Mishra, B.K.1
Nayak, P.K.2
Jha, N.3
|