References
- Mishra, B. K., and Keshri, N., “Mathematicalmodelonthetransmission of worms in wireless sensor network”, Applied Mathematical Modelling, Volume 37, Number 6, pages 4103-4111, 2013. doi: https://doi.org/10.1016/j.apm.2012.09.025
- Leo John Baptist Andrews, Linesh Raja & Suresh Shanmugasundram (2019), “Mobile android-based remote patient monitoring system through wearable sensors”, Journal of Discrete Mathematical Sciences and Cryptography, 22:4, 557-568. doi: https://doi.org/10.1080/09720529.2019.1637156
- Gopal Singh Rawat, Karan Singh, “Joint beacon frequency and beacon transmission power adaptation for internet of vehicles” Transactions on Emerging Telecommunications Technologies, 2020; e4124.
- Tayyab Khan, Karan Singh, “TASRP: a trust aware secure routing protocol for wireless sensor networks”, International Journal of Innovative Computing and Applications, Inderscience Publishers (IEL), Vol 12, issue 2, pp 108-122, 2021. doi: https://doi.org/10.1504/IJICA.2021.113750
- Ash Mohammad Abbas (2020), “Analysis of error for anchor-based localization in wireless sensor networks”, 23:2, 393-401.
- D. Arivudainambi, R. Pavithra & P. Kalyani (2021) “Cuckoo search algorithm for target coverage and sensor scheduling with adjustable sensing range in wireless sensor network”, Journal of Discrete Mathematical Sciences and Cryptography, 24:4, 975-996. doi: https://doi.org/10.1080/09720529.2020.1753301
- Chun-Ling Tang & Min Li (2018), “Location of wireless sensor networks based on port management system”, Journal of Discrete Mathematical Sciences and Cryptography, 21:2, 595–599. doi: https://doi.org/10.1080/09720529.2018.1459436
- Manju, Pawan Bhambu & Sandeep Kumar (2020), “Target K-coverage problem in wireless sensor networks”, Journal of Discrete Mathematical Sciences and Cryptography, 23:2, 651–659. doi: https://doi.org/10.1080/09720529.2020.1729511
- Ankit Gambhir, Ashish Payal & Rajeev Arya (2020), “Water cycle algorithm based optimized clustering protocol for wireless sensor network”, Journal of Interdisciplinary Mathematics, 23:2, 367-377. doi: https://doi.org/10.1080/09720502.2020.1731950
- B. Sandywell, “Monsters in cyberspace cyberphobia and cultural panic in the information age,” Information, Communication & Society, vol. 9, no. 1, pp. 39–61, 2006. doi: https://doi.org/10.1080/13691180500519407
- G. L. Jr, “Not teaching viruses and worms is harmful”, Communications of the ACM, vol. 48, no. 1, pp. 144, 2005. doi: https://doi.org/10.1145/1039539.1039575
- S. Venkatraman, “Autonomic context-dependent architecture for malware detection”, in Proceedings of the 2009 International Joint Conferences on e-CASE and e-Technology, pp. 2927–2947, Singapore, Asia, January 2009.
- G. Liang, S. R. Weller, J. Zhao, F. Luo, and Z. Y. Dong, “A framework for cyber-topology attacks: line-switching and new attack scenarios”, IEEE Transactions on Smart Grid, vol. 10, no. 2, pp. 1704–1712, 2017. doi: https://doi.org/10.1109/TSG.2017.2776325
- Kermack, W. O., and McKendrick, A. G., “A contribution to the mathematical theory of epidemics”, Volume 115, Number 772, pages 700–721. The Royal Society, 1927.
- Upadhyay, R. K., Kumari, S., and Misra, A. K., “Modeling the virus dynamics in computer network with SVEIR model and nonlinear incident rate”, Journal of Applied Mathematics and Computing, Volume 54, Number 1, pages 485-509, 2017. doi: https://doi.org/10.1007/s12190-016-1020-0
- G. Shrivastava, P. Kumar, R. P. Ojha, P. K. Srivastava, S. Mohan, and G. Srivastava, ‘‘Defensive modeling of fake news through online social networks,’’ IEEE Trans. Comput. Social Syst., vol. 7, no. 5, pp. 1159–1167, Oct. 2020. doi: https://doi.org/10.1109/TCSS.2020.3014135
- Ranjit Kumar Upadhyay & Sangeeta Kumari (2018), “Bifurcation analysis of an e-epidemic model in wireless sensor network”, International Journal of Computer Mathematics, 95:9, 1775–1805. doi: https://doi.org/10.1080/00207160.2017.1336550
- Rudra Pratap Ojha, Pramod Kumar Srivastava & Goutam Sanyal (2019), “Improving wireless sensor networks performance through epidemic model”, International Journal of Electronics, 106:6, 862–879. doi: https://doi.org/10.1080/00207217.2019.1570563
- S. Tang, “A modified SI epidemic model for combating virus spread in wireless sensor networks”, International Journal of Wireless Information Networks, vol. 18, no. 4, pp. 319–326, 2011. doi: https://doi.org/10.1007/s10776-011-0147-z
- X. Wang, Q. Li, and Y. Li, “EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks”, Journal of Combinatorial Optimization, vol. 20, no. 1, pp. 47–62, 2010. doi: https://doi.org/10.1007/s10878-008-9190-9
- N. Keshri and B. K. Mishra, “Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network”, Chaos, Solitons & Fractals, vol. 68, pp. 151–158, 2014. doi: https://doi.org/10.1016/j.chaos.2014.08.006
- L. Mo, P. C. You, X. H. Cao, Y. Q. Song, and J. M. Chen, “Decentralized multi-charger coordination for wireless rechargeable sensor networks”, in Proceedings of the IEEE 20th International Conference on High Performance Computing and Communications, pp. 1–8, Nanjing, China, 2015.
- G. Y. Liu, B. H. Peng, X. J. Zhong, and X. J. Lan, “Differential games of rechargeable wireless sensor networks against malicious programs based on SILRD propagation model”, Complexity, vol. 2020, Article ID 5686413, 13 pages, 2020.
- O. Diekmann and et al. (1990), “On the definition and the computation of the basic reproduction ratio R0 in models for infectious diseases in heterogeneous populations”, Journals of Mathematical Biology 28(4): 365-382.
- J. P. LaSalle (1976), “The stability of dynamical system”, (SIAM, Philadelphia)