A predator–prey model on the attacking behavior of malicious objects in wireless nanosensor networks

Nano Communication Networks - Tập 15 - Trang 1-16 - 2018
Ajit Kumar Keshri1, Bimal Kumar Mishra2, Dheeresh K. Mallick1
1Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, Jharkhand, 835215, India
2Jagannath Jain College, Jhumritelaiya, Jharkhand, 825409, India

Tài liệu tham khảo

Anwar, 2015, Wireless nanosensor networks: A basic review, Int. J. Emerg. Technol. Adv. Eng., 5 Baruah, 2009, Nanotechnology applications in pollution sensing and degradation in agriculture: a review, Environ. Chem. Lett., 7, 191, 10.1007/s10311-009-0228-8 Akyildiz, 2010, Electromagnetic wireless nanosensor networks, Nano Commun. Netw., 1, 3, 10.1016/j.nancom.2010.04.001 Akyildiz, 2010, The Internet of nano things, IEEE Wirel. Commun., 58, 10.1109/MWC.2010.5675779 Greenhalgh, 2017, An eco-epidemiological predator–prey model where predators distinguish between susceptible and infected prey, Math. Methods Appl. Sci., 40, 146, 10.1002/mma.3974 Hethcote, 2004, A predator–prey model with infected prey, Theor. Popul. Biol., 66, 259, 10.1016/j.tpb.2004.06.010 Mishra, 2009, Predator-Prey models for the attack of malicious objects in computer network, J. Eng. Appl. Sci., 4, 215 Mishra, 2014, Stability analysis of a predator–prey model in wireless sensor network, Int. J. Comput. Math., 91, 928, 10.1080/00207160.2013.809070 Keshri, 2016, Library formation of known malicious attacks and their future variants, Int. J. Adv. Sci. Technol., 94, 1, 10.14257/ijast.2016.94.01 Kermack, 1927, A contribution to the mathematical theory of epidemics, Proc. Roy. Soc. London Ser. A, 115, 700, 10.1098/rspa.1927.0118 Kermack, 1932, Contributions of mathematical theory to epidemics, Proc. Roy. Soc. London Ser. A, 138, 55, 10.1098/rspa.1932.0171 Kermack, 1933, Contributions of mathematical theory to epidemics, Proc. Roy. Soc. London Ser. A, 141, 94, 10.1098/rspa.1933.0106 Gelenbe, 2007, Dealing with software viruses: a biological paradigm, Inf. Secur. Tech. Rep., 12, 242, 10.1016/j.istr.2007.11.002 Zhu, 2013, A mixing propagation model of computer viruses and counter measures, Nonlinear Dynam., 73, 1433, 10.1007/s11071-013-0874-z Gan, 2013, The spread of computer virus under the effect of exernal computers, Nonlinear Dynam., 73, 1615, 10.1007/s11071-013-0889-5 Yang, 2013, The effect of infected external computers on the spread of viruses: a compartment model study, Physica A, 392, 6523, 10.1016/j.physa.2013.08.024 Gan, 2014, Propagation of computer virus both across the Internet and external computers: A complex-network approach, Commun. Nonlinear Sci. Numer. Simul., 19, 2785, 10.1016/j.cnsns.2013.12.026 Mishra, 2013, Mathematical model on the transmission of worms in wireless sensor network, Appl. Math. Model., 37, 4103, 10.1016/j.apm.2012.09.025 Johari, 2016, Packet size optimization for wireless nanosensor networks in the terahertz band, 1 Wang, 2013, Energy and spectrum–aware MAC protocol for perpetual wireless nanosensor networks in the tahertz band Slijepcevic, 2001, Power efficient organization of wireless sensor networks Demirkol, 2006, MAC protocols for wireless sensor networks: a survey, IEEE Commun. Mag., 44, 115, 10.1109/MCOM.2006.1632658 Gan, 2013, An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate, Appl. Math. Comput., 222, 265 Hale, 1980