Zobrazeno 1 - 10
of 33
pro vyhledávání: '"Fu Xiang Gao"'
Publikováno v:
Intelligent Automation & Soft Computing. 22:651-666
Internet worms, a great threat to network security can spread quickly via networks. Many worms can also easily propagate via removable devices, which have become a key method for such worms to stealthily invade those computers not connected to the In
Publikováno v:
Applied Mechanics and Materials. :1030-1036
In deep research and analysis on WSN security routing protocols and according to the rational development trend of the sensor nodes, this paper proposes a new WSN security routing protocol based on the theory of the static game—GBR. GBR describes t
Publikováno v:
Mathematical and Computer Modelling. 57:2635-2646
Internet worm attacks reduce network security and cause economic losses. The use of a quarantine strategy is prominent in defending against worms, and it has been applied to various worm propagation models. Although theoretical analysis suggests that
Publikováno v:
Journal of Applied Mathematics, Vol 2013 (2013)
J. Appl. Math.
J. Appl. Math.
A delayed worm propagation model with birth and death rates is formulated. The stability of the positive equilibrium is studied. Through theoretical analysis, a critical valueτ0of Hopf bifurcation is derived. The worm propagation system is locally a
Publikováno v:
Computers & Electrical Engineering. 38:1047-1061
Worms can spread throughout the Internet very quickly and are a great security threat. Constant quarantine strategy is a defensive measure against worms, but its reliability in current imperfect intrusion detection systems is poor. A pulse quarantine
Publikováno v:
Advanced Engineering Forum. :599-603
Aiming at the limited resources and the security issues in wireless sensor networks, a routing approach is proposed. In this approach, the factors of reputation, remaining energy, and the distance to the destination are taken into considered while se
Publikováno v:
Procedia Engineering. 15:4162-4167
In this paper, discrete-time simulation method for worm propagation model with pulse quarantine strategy is proposed. Such method is firstly applied to traditional Kermack-Mckendrick model and is verified to be effective. Then, considering practical
Publikováno v:
Key Engineering Materials. :799-804
It is a significant challenge to design a secure routing protocol for wireless sensor network (WSN), because a WSN has dynamic topology, limited energy, confined computing ability and small memory size. This study explores the algorithm of ensuring s
Publikováno v:
Mathematical Problems in Engineering, Vol 2014 (2014)
Both vaccination and quarantine strategy are adopted to control the Internet worm propagation. By considering the interaction infection between computers and external removable devices, a worm propagation dynamical system with time delay under quaran
Publikováno v:
Mathematical Problems in Engineering, Vol 2014 (2014)
Internet worms exploiting zero-day vulnerabilities have drawn significant attention owing to their enormous threats to Internet in the real world. To begin with, a worm propagation model with time delay in vaccination is formulated. Through theoretic