Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Lipeng Song"'
Autor:
Wenjie Yang, Lipeng Song
Publikováno v:
IEEE Access, Vol 12, Pp 105148-105164 (2024)
Coalition cooperative investment behavior and power allocation mechanism are key issues in the study of shared energy storage station (SESS). This paper proposes an effective alliance investment and allocation strategy to incentivize charging station
Externí odkaz:
https://doaj.org/article/3f042f07dc6c4e68bc7c9378485fe906
Publikováno v:
Sensors, Vol 20, Iss 1, p 165 (2019)
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the presence of malicious nodes. For each relay node in the route, assoc
Externí odkaz:
https://doaj.org/article/58caa7f82bfb4ce681a58755cbaf99d4
Publikováno v:
Discrete Dynamics in Nature and Society, Vol 2017 (2017)
Internal attack is a crucial security problem of WSN (wireless sensor network). In this paper, we focus on the internal attack detection which is an important way to locate attacks. We propose a state transition model, based on the continuous time Ma
Externí odkaz:
https://doaj.org/article/b7310f02aa794e889f5b921a98aada85
Publikováno v:
Discrete Dynamics in Nature and Society, Vol 2015 (2015)
The Flash Disk worms, spreading via both Web-based scanning and removable devices between multiple subnets, have become a serious threat to the Internet, especially those physically isolated subnets. We present a model which incorporates specific fea
Externí odkaz:
https://doaj.org/article/758f541a6aa24d23a9d7dcdb350730fa
Publikováno v:
Abstract and Applied Analysis, Vol 2014 (2014)
Peer-to-peer (P2P) botnets have emerged as one of the serious threats to Internet security. To prevent effectively P2P botnet, in this paper, a mathematical model which combines the scale-free trait of Internet with the formation of P2P botnet is pre
Externí odkaz:
https://doaj.org/article/5001994f530848b3b429093f2e262cea
Publikováno v:
Abstract and Applied Analysis, Vol 2013 (2013)
Computer users’ reactions to the outbreak of Internet worm directly determine the defense capability of the computer and play an important role in the spread of worm. In this paper, in order to characterize the impacts of adaptive user protection b
Externí odkaz:
https://doaj.org/article/4058f3c06fba4ae78152a878f44e850c
Publikováno v:
Discrete Dynamics in Nature and Society, Vol 2012 (2012)
Peer-to-Peer (P2P) botnets have emerged as one of the most serious threats to Internet security. To effectively eliminate P2P botnets, in this paper, the authors present two novel dynamical models to portray the process of formation of P2P botnets, o
Externí odkaz:
https://doaj.org/article/fe40688adeca46ef9119da1e8aacb6c4
Autor:
Songyang Wu, Lipeng Song
Publikováno v:
IEEE Systems Journal. 17:306-313
Publikováno v:
Neural Computing and Applications. 35:1279-1301
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Wireless Internet of Things (IoT) devices densely populate our daily life, but also attract many attackers to attack them. In this paper, we propose a new Heterogeneous Susceptible-Exposed-Infected-Recovered (HSEIR) epidemic model to characterize the