Citation: | WANG Xiaoming, HE Zaobo, ZHANG Lichen, “A Pulse Immunization Model for Inhibiting Malware Propagation in Mobile Wireless Sensor Networks,” Chinese Journal of Electronics, vol. 23, no. 4, pp. 810-815, 2014, |
S. Ehsan, K. Bradford, M. Brugger and B. Hamdaoui, Design and analysis of delay-tolerant sensor networks for monitoring and tracking free-roaming animals, IEEE Transactions on Wireless Communications, Vol.11, No.3, pp.1220-1227, 2012.
|
J.J. Guo, C. Cho, Y. Wang and K.M. Lee, Wireless mobile sensor network for the system identification of a space frame bridge, IEEE/ASME Transactions on Mechatronics, Vol.17, No.3, pp.499-507, 2012.
|
D.R. Zhu, J.H. Han, J. Ou and J. Min, Single beacon cruise positioning algorithm in wireless sensor networks, Chinese Journal of Electronics, Vol.22, No.3, pp.559-562, 2013.
|
S.L. Xu and S.S. Lee, Route optimization algorithm for vehicle to vehicle communication using location information, Chinese Journal of Electronics, Vol.21, No.4, pp.583-588, 2012.
|
M.Y. Ko and N. Gautam, Epidemic-based information dissemination in wireless mobile sensor networks, IEEE/ACM Transactions on Networking, Vol.18, No.6, pp.1738-1751, 2010.
|
P. Li and R.C. Wang, Research of malicious code attack effect based on synthetic entropy method, Chinese Journal of Electronics, Vol.22, No.3, pp.449-454, 2013.
|
S. Zanero, Wireless malware propagation: A reality check, IEEE Security & Privacy, Vol.7, No.5, pp.70-74, 2009.
|
M.H.R. Khouzani and S. Sarkar, Maximum damage battery deletion attack in mobile sensor networks, IEEE Transactions on Automatic Control, Vol.56, No.10, pp.2358-2368, 2011.
|
X.M. Wang, Z.B. He, X.Q. Zhao, C. Lin, Y. Pan and Z.P. Cai, Reaction-diffusion modeling of the malware propagation in mobile wireless sensor networks, Science China Information Sciences, Vol.56, No.9, pp.092303:1-092303:18, 2013.
|
J. Zong, A. Li and L.S. Wen, SHIS model of e-mail virus propagation, Chinese Journal of Electronics, Vol.21, No.4, pp.619-622, 2012.
|
Y. Yao, L. Guo, H. Guo, G. Yu, F. Gao and X. Tong, Pulse quarantine strategy of Internet worm propagation: Modeling and analysis, Computers and Electrical Engineering, Vol.38, pp.1047-1061, 2012.
|
F. Verbust, Nonlinear Differential Equations and Dynamical Systems, Springer-Verlag, Berlin, Germany, 2000.
|