Multistage signaling game-based optimal detection strategies for suppressing malware diffusion in fog-cloud-based IoT networks
S Shen, L Huang, H Zhou, S Yu… - IEEE Internet of Things …, 2018 - ieeexplore.ieee.org
We consider the Internet of Things (IoT) with malware diffusion and seek optimal malware
detection strategies for preserving the privacy of smart objects in IoT networks and …
detection strategies for preserving the privacy of smart objects in IoT networks and …
Propagation modeling and defending of a mobile sensor worm in wireless sensor and actuator networks
WSANs (Wireless Sensor and Actuator Networks) are derived from traditional wireless
sensor networks by introducing mobile actuator elements. Previous studies indicated that …
sensor networks by introducing mobile actuator elements. Previous studies indicated that …
HSIRD: A model for characterizing dynamics of malware diffusion in heterogeneous WSNs
S Shen, H Zhou, S Feng, L Huang, J Liu, S Yu… - Journal of Network and …, 2019 - Elsevier
Heterogeneous wireless sensor networks (HWSNs), as blocks of the Internet of Things, are
vulnerable to malware diffusion breaking the data confidentiality and service availability …
vulnerable to malware diffusion breaking the data confidentiality and service availability …
A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion
Abstract We consider Heterogeneous Wireless Sensor Networks (HWSNs) with malware
diffusion and find a solution to assess their dependability in order to guarantee dependable …
diffusion and find a solution to assess their dependability in order to guarantee dependable …
SNIRD: Disclosing rules of malware spread in heterogeneous wireless sensor networks
S Shen, H Zhou, S Feng, J Liu, Q Cao - IEEE Access, 2019 - ieeexplore.ieee.org
Heterogeneous wireless sensor networks (WSNs) are widely deployed, owing to their good
capabilities in terms of network stability, dependability, and survivability. However, they are …
capabilities in terms of network stability, dependability, and survivability. However, they are …
An epidemiology-based model for disclosing dynamics of malware propagation in heterogeneous and mobile WSNs
S Shen, H Zhou, S Feng, J Liu, H Zhang, Q Cao - IEEE Access, 2020 - ieeexplore.ieee.org
Heterogeneous and mobile wireless sensor networks (HMWSNs) are generally practical in
constructing smart Internet of Things. However, malware can easily propagate itself over …
constructing smart Internet of Things. However, malware can easily propagate itself over …
Nodes Availability Analysis of NB‐IoT Based Heterogeneous Wireless Sensor Networks under Malware Infection
X Wu, Q Cao, J Jin, Y Li, H Zhang - … and Mobile Computing, 2019 - Wiley Online Library
The Narrowband Internet of Things (NB‐IoT) is a main stream technology based on mobile
communication system. The combination of NB‐IoT and WSNs can active the application of …
communication system. The combination of NB‐IoT and WSNs can active the application of …
Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks
Abstract Mobile Wireless Sensor Networks (MWSNs) are employed in many fields, such as
intelligent transportation, community health monitoring, and animal behavior monitoring …
intelligent transportation, community health monitoring, and animal behavior monitoring …
An epidemic model for the investigation of multi‐malware attack in wireless sensor network
S Awasthi, PK Srivastava, N Kumar… - IET …, 2023 - Wiley Online Library
The protection of wireless sensor networks (WSN) against malware attacks is crucial. The
paper discusses the issue of malware attacks in WSN, which are commonly used for …
paper discusses the issue of malware attacks in WSN, which are commonly used for …
[PDF][PDF] Review Study on Different Attack Strategies of Worm in a Network.
In today's era Internet worm is a giant threat to the network infrastructure. Although there are
different strategies to sense those hazard at early stages. They detect using some signature …
different strategies to sense those hazard at early stages. They detect using some signature …