1. M. E. Keskin, “A Column Generation Heuristic for Optimal Wireless Sensor Network Design with Mobile Sinks,” European Journal of Operational Research, Vol. 260, No. 1, pp. 291-304, 2016 2. S. Yu, L. Shuai,J. Peng, “A High-Efficiency Uneven Cluster Deployment Algorithm based on Network Layered for Event Coverage in UWSNs,” Sensors, Vol. 16, No. 12, pp. 2103, 2016 3. T. Gao, D. Greenspan, M. Welsh, R. R. Juang,A. Alm, “Vital Signs Monitoring and Patient Tracking over a Wireless Network,” inProceedings of International Conference of the Engineering in Medicine & Biology Society, pp. 102, 2005 4. A. Rasheed and R. N. Mahapatra, “The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks,” IEEE Press, pp. 958-965, 2012 5. M. H. R.Khouzani and S. Sarkar, “Maximum Damage Battery Depletion Attack in Mobile Sensor Networks,” IEEE Transactions on Automatic Control, Vol. 56, No. 10, pp. 2358-2368, 2011 6. C. Karlof and D. Wagner, “Secure Routing in Sensor Networks: Attacks and Countermeasures,” inProceedings of IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113-127, 2003 7. Y. C. Hu, A. Perrig,D. B. Johnson, “Packet Leashes: A Defense Against Wormhole Attacks in Wireless Networks,” in Proceedings of Joint Conference of the IEEE Computer and Communications, IEEE Societies, Vol. 3, pp. 1976-1986, 2003 8. M. H. R.Khouzani, S. Sarkar, and E. Altman, “Optimal Control of Epidemic Evolution,” IEEE INFOCOM, Vol. 8, No. 1, pp. 1683-1691, 2011 9. L. Zhu, H. Zhao,X. Wang, “Bifurcation Analysis of A Delay Reaction-Diffusion Malware Propagation Model with Feedback Control,”Communications in Nonlinear Science & Numerical Simulation, Vol. 22, pp. 747-768, 2015 10. J. G. Ren, X. F. Yang, L. X. Yang, et al., “A Delayed Computer Virus Propagation Model and its Dynamics,”Chaos Solitons & Fractals, Vol. 45, pp. 74-79, 2011 11. L. Zhu, H. Zhao,X. Wang, “Stability and Bifurcation Analysis in a Delayed Reaction-Diffusion Malware Propagation Model,” Pergamon Press, Inc., pp. 852-875, 2015 12. Z. Zhang and F. Si, “Dynamics of a Delayed SEIRS-V Model on the Transmission of Worms in a Wireless Sensor Network,” Advances in Difference Equations, Vol.2014, No. 1, pp. 1-15, 2014 13. M. E. J.Newman, “The Structure and Function of Complex Networks,” SIAM Review, Vol. 45, No. 2, pp. 167-256, 2003 14. B. K.Mishra and N. Jha, “Fixed Period of Temporary Immunity after Run of Anti-Malicious Software on Computer Nodes,” Applied Mathematics & Computation, Vol. 190, No. 2, pp. 1207-1212, 2007 15. B. K.Mishra and S. K. Pandey, “Fuzzy Epidemic Model for the Transmission of Worms in Computer Network,” Nonlinear Analysis Real World Applications, Vol. 11, No. 5, pp. 4335-4341, 2010 16. X. Han and Q. Tan, “Dynamical Behavior of Computer Virus on Internet,” Applied Mathematics & Computation, Vol. 217, No. 6, pp. 2520-2526, 2010 17. H. Yuan, G. Q. Chen, J. J. Wu,H. Xiong, “Towards Controlling Virus Propagation in Information Systems with Point-to-Group Information Sharing,” Decision Support Systems, Vol. 48, No. 1, pp. 57-68, 2009 18. B. K.Mishra and S. K. Pandey, “Dynamic Model of Worms with Vertical Transmission in Computer Network,” Applied Mathematics & Computation, Vol. 217, No. 21, pp. 8438-8446, 2011 19. B. K.Mishra and D. K. Saini, “SEIRS Epidemic Model with Delay for Transmission of Malicious Objects in Computer Network,” Applied Mathematics & Computation, Vol. 188, No. 2, pp. 1476-1482, 2007 20. B. K.Mishra and N. Jha, “SEIQRS Model for the Transmission of Malicious Objects in Computer Network,” Applied Mathematical Modelling, Vol. 34, No. 3, pp. 710-715, 2010 21. B. K.Mishra and N. Keshri, “Mathematical Model on the Transmission of Worms in Wireless Sensor Network,” Applied Mathematical Modelling, Vol. 37, No. 6, pp. 4103-4111, 2013 22. X. Wang, Q. Li,Y. Li, “EiSIRS: a Formal Model to Analyze the Dynamics of Worm Propagation in Wireless Sensor Networks,” Journal of Combinatorial Optimization, Vol. 20, No. 1, pp. 47-62, 2010 23. L. P.Song and R. P. Zhang, “Dynamical Analysis for a Malware Propagation Model in Wireless Sensor Network,”Journal of Measurement Science and Instrumentation, 2016 24. C. Q. Gan, X. F. Yang, Q. Y. Zhu, J. Jin,L. He, “The Spread of Computer Virus under the Effect of External Computers,” Nonlinear Dynamics, Vol. 73, No. 3, pp. 1615-1620, 2013 25. L. P. Feng, X. F. Liao, H. Q. Li,Q. Han, “Hopf Bifurcation Analysis of a Delayed Viral Infection Model in Computer Networks,” Mathematical & Computer Modelling, Vol. 56, No.7-8, pp, 167-179, 2012 26. J. G. Ren, Y. H. Xu, Y. C. Zhang, Y. Q. Dong,G. S. Hao,“Dynamics of a Delay-Varying Computer Virus Propagation Model,” Discrete Dynamics in Nature and Society, Vol. 2012, No. 6, pp. 857-868, 2012 27. T. Dong, X. Liao,H. Li, “Stability and Hopf Bifurcation in a Computer Virus Model with Multistate Antivirus,” Abstract & Applied Analysis, Vol.2012, No. 2, pp. 374-388, 2012 28. H. R.Thieme and P. Van den Driessche, “Global Stability in Cyclic Epidemic Models with Disease Fatalities,”Differential Equations with Applications to Biology, pp. 459-472, 1998 29. B. D. Hassard, N. D. Kazarinoff,Y. H. Wan, “Theory and Applications of Hopf Bifurcation,” Cambridge University Press, pp. 961-969, 1981 |