253
Views
9
CrossRef citations to date
0
Altmetric
Section B

Stability analysis of a predator–prey model in wireless sensor network

&
Pages 928-943 | Received 14 Feb 2013, Accepted 21 May 2013, Published online: 01 Jul 2013

References

  • G. Birkoff and G. C. Rota, Ordinary Differential Equations, Ginn, Waltham, MA, 1982
  • F. Castaneda, E. C. Sezer and J. Xu, Worm vs. worm: Preliminary study of an active counter-attack mechanism, Proceedings of the 2004 ACM Work-Shop on Rapid Malcode, Washington, DC, 2004, pp. 83–93
  • Z. Chen, L. Gao and K. Kwiat, Modeling the spread of active worms, Proceedings of INFOCOM 2003, San Francisco, CA, April, 2003
  • H. I. Freedman and P. Waltman, Persistence in model of three interacting predator-prey populationMath. Biosci. 68 (1984), pp. 213–231 doi: 10.1016/0025-5564(84)90032-4
  • T. K. Kar and A. Batabyal, Persistence and stability of a two prey one predator systemIJEST 2(2) (2010), pp. 174–190
  • T. K. Kar and K. S. Chaudhury, Harvesting in a two-prey one-predator fisheryANZIAM J. 45 (2004), pp. 443–456 doi: 10.1017/S144618110001347X
  • B. K. Mishra and G. M. Ansari, Predator–prey models for the attack of malicious objects in computer networkJ. Eng. Appl. Sci. 4(3) (2009), pp. 215–220
  • B. K. Mishra and N. Keshri, Mathematical model on the transmission of worms in wireless sensor networkAppl. Math. Model. 37(11) (2013), pp. 4103–4111 doi: 10.1016/j.apm.2012.09.025
  • D. Nicol and M. Liljenstam, Models and analysis of active worm defense, Proceeding of Mathematical Methods, Models and Architecture for Computer Networks Security Workshop, St. PetersburgRussia, 2005, pp. 38–53
  • R. Rathna and A. Sivasubramanian, Improving energy efficiency in wireless sensor networks through scheduling and routingIJASSN 2(1) (2012), pp. 21–27 doi: 10.5121/ijassn.2012.2103
  • H. Toyoizumi and A. Kara, Predators: Good will mobile codes combat against computer viruses, Proceedings of the 2002, Workshop on New security Paradigms (NSPW’02), Virginia Beach, VA, 2002, pp. 11–17

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.