-
1
-
-
83655201468
-
Energy-based multiple target localization and pursuit in mobile sensor networks
-
Hu J W, Xie L H, Zhang C S. Energy-based multiple target localization and pursuit in mobile sensor networks. IEEE Trans Instrum Meas, 2012, 61: 212-220.
-
(2012)
IEEE Trans Instrum Meas
, vol.61
, pp. 212-220
-
-
Hu, J.W.1
Xie, L.H.2
Zhang, C.S.3
-
2
-
-
84862831121
-
Design and analysis of delay-tolerant sensor networks for monitoring and tracking free-roaming animals
-
Ehsan S, Bradford K, Brugger M, et al. Design and analysis of delay-tolerant sensor networks for monitoring and tracking free-roaming animals. IEEE Trans Wirel Commun, 2012, 11: 1220-1227.
-
(2012)
IEEE Trans Wirel Commun
, vol.11
, pp. 1220-1227
-
-
Ehsan, S.1
Bradford, K.2
Brugger, M.3
-
3
-
-
67349129674
-
A secure mobile healthcare system using trust-based multicast scheme
-
Boukerche A, Ren Y L. A secure mobile healthcare system using trust-based multicast scheme. IEEE J Sel Area Commun, 2009, 27: 387-399.
-
(2009)
IEEE J Sel Area Commun
, vol.27
, pp. 387-399
-
-
Boukerche, A.1
Ren, Y.L.2
-
4
-
-
84859722160
-
The three-tier security scheme in wireless sensor networks with mobile sinks
-
Rasheed A, Mahapatra R N. The three-tier security scheme in wireless sensor networks with mobile sinks. IEEE Trans Paral Distr, 2012, 23: 958-965.
-
(2012)
IEEE Trans Paral Distr
, vol.23
, pp. 958-965
-
-
Rasheed, A.1
Mahapatra, R.N.2
-
5
-
-
80053630581
-
Maximum damage battery deletion attack in mobile sensor networks
-
Khouzani M H R, Sarkar S. Maximum damage battery deletion attack in mobile sensor networks. IEEE Trans Automat Contr, 2011, 56: 2358-2368.
-
(2011)
IEEE Trans Automat Contr
, vol.56
, pp. 2358-2368
-
-
Khouzani, M.H.R.1
Sarkar, S.2
-
6
-
-
84861197180
-
A scalable code dissemination protocol in heterogeneous wireless sensor networks
-
Peng S L, Li S S, Liao X K, et al. A scalable code dissemination protocol in heterogeneous wireless sensor networks. Sci China Inf Sci, 2012, 55: 1323-1336.
-
(2012)
Sci China Inf Sci
, vol.55
, pp. 1323-1336
-
-
Peng, S.L.1
Li, S.S.2
Liao, X.K.3
-
8
-
-
84255190735
-
A malware detection model based on a negative selection algorithm with penalty factor
-
Zhang P T, Wang W, Tan Y. A malware detection model based on a negative selection algorithm with penalty factor. Sci China Inf Sci, 2010, 53: 2461-2471.
-
(2010)
Sci China Inf Sci
, vol.53
, pp. 2461-2471
-
-
Zhang, P.T.1
Wang, W.2
Tan, Y.3
-
9
-
-
84865614588
-
A spatial-temporal model for the malware propagation in MWSNs based on the reaction-diffusion equations
-
He Z B, Wang X M. A spatial-temporal model for the malware propagation in MWSNs based on the reaction-diffusion equations. In: Proceedings of WAIM 2012 Workshops, Harbin, 2012. 45-56.
-
(2012)
Proceedings of WAIM 2012 Workshops, Harbin
, pp. 45-56
-
-
He, Z.B.1
Wang, X.M.2
-
10
-
-
0034486891
-
The mathematics of infectious diseases
-
Hethcote H W. The mathematics of infectious diseases. SIAM Rev, 2000, 42: 599-653.
-
(2000)
SIAM Rev
, vol.42
, pp. 599-653
-
-
Hethcote, H.W.1
-
11
-
-
26844473415
-
Spatial-temporal modeling of malware propagation in networks
-
Chen S Z, Ji C Y. Spatial-temporal modeling of malware propagation in networks. IEEE Trans Neural Netw, 2005, 16: 1291-1303.
-
(2005)
IEEE Trans Neural Netw
, vol.16
, pp. 1291-1303
-
-
Chen, S.Z.1
Ji, C.Y.2
-
12
-
-
58849089560
-
An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks
-
De P, Liu Y H, Das S K. An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks. IEEE Trans Mob Comput, 2009, 8: 413-425.
-
(2009)
IEEE Trans Mob Comput
, vol.8
, pp. 413-425
-
-
De, P.1
Liu, Y.H.2
Das, S.K.3
-
13
-
-
84861096936
-
Malware characteristics and threats on the Internet ecosystem
-
Chen Z Q, Roussopoulos M, Liang Z Y, et al. Malware characteristics and threats on the Internet ecosystem. J Syst Softw, 2012, 85: 1650-1672.
-
(2012)
J Syst Softw
, vol.85
, pp. 1650-1672
-
-
Chen, Z.Q.1
Roussopoulos, M.2
Liang, Z.Y.3
-
14
-
-
77957705451
-
Markov random fields for malware propagation: the case of chain networks
-
Karyotis V. Markov random fields for malware propagation: the case of chain networks. IEEE Commun Lett, 2010, 14: 875-877.
-
(2010)
IEEE Commun Lett
, vol.14
, pp. 875-877
-
-
Karyotis, V.1
-
15
-
-
70350136704
-
Wireless malware propagation: a reality check
-
Zanero S. Wireless malware propagation: a reality check. IEEE Secur Priv, 2009, 7: 70-74.
-
(2009)
IEEE Secur Priv
, vol.7
, pp. 70-74
-
-
Zanero, S.1
-
17
-
-
79251600457
-
A study of self-propagating mal-packets in sensor networks: attacks and defenses
-
Gu Q J, Ferguson C, Noorani R. A study of self-propagating mal-packets in sensor networks: attacks and defenses. Comput Secur, 2011, 30: 13-27.
-
(2011)
Comput Secur
, vol.30
, pp. 13-27
-
-
Gu, Q.J.1
Ferguson, C.2
Noorani, R.3
-
19
-
-
77955012721
-
EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks
-
Wang X M, Li Q L, Li Y S. EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks. J Comb Optim, 2010, 20: 47-62.
-
(2010)
J Comb Optim
, vol.20
, pp. 47-62
-
-
Wang, X.M.1
Li, Q.L.2
Li, Y.S.3
-
20
-
-
59049100560
-
An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks
-
Wang X M, Li Y S. An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks. Chin J Electron, 2009, 18: 8-12.
-
(2009)
Chin J Electron
, vol.18
, pp. 8-12
-
-
Wang, X.M.1
Li, Y.S.2
|