[HTML][HTML] Research communities in cyber security vulnerability assessments: A comprehensive literature review
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic
fields of study. Still, it is sometimes unclear what research areas are included in the …
fields of study. Still, it is sometimes unclear what research areas are included in the …
[HTML][HTML] Modeling time delay, external noise and multiple malware infections in wireless sensor networks
The essentiality of wireless sensor networks (WSNs) in military and health applications
cannot be overemphasized, and this has made these tiny sensors soft targets for malware …
cannot be overemphasized, and this has made these tiny sensors soft targets for malware …
A review article on wireless sensor networks in view of e-epidemic models
Epidemic simulations have recently been used to model the dynamics of malicious codes in
the network of wireless sensors. This is because of its open existence, which offers a simple …
the network of wireless sensors. This is because of its open existence, which offers a simple …
[HTML][HTML] Lyapunov-based analysis and worm extinction in wireless networks using stochastic SVEIR model
In this study, we present a novel stochastic SVEIR (Susceptible–Vaccinated–Exposed–
Infectious–Recovered) model specifically designed to analyze worm propagation in wireless …
Infectious–Recovered) model specifically designed to analyze worm propagation in wireless …
[HTML][HTML] Delay effect of an e-epidemic SEIRS malware propagation model with a generalized non-monotone incidence rate
Malware such as virus, worm, and Trojan horse, is a software designed to pose harmful and
undesirable effects on communication networks. It can cause numerous sever damage like …
undesirable effects on communication networks. It can cause numerous sever damage like …
Analysis of delay-aware worm propagation model in wireless iot systems with ratio-dependent functional response
V Madhusudanan, R Geetha, BSN Murthy… - IEEE …, 2023 - ieeexplore.ieee.org
This article presents a delayed susceptibility, exposure, infectivity, recovery, and vaccination
(SEIRV) model with nonlinear incidence and ratio-dependent functional responses. Model …
(SEIRV) model with nonlinear incidence and ratio-dependent functional responses. Model …
SEIRS model with spatial correlation for analyzing dynamic of virus spreading in event-driven wireless sensor networks
In Event-driven wireless systems, mostly data transmission depends on events occurring in
the sensor field. Most of the time, sensor nodes are silent or in sleep mode. When events …
the sensor field. Most of the time, sensor nodes are silent or in sleep mode. When events …
Delayed dynamics analysis of SEI2RS malware propagation models in cyber–Physical systems
D Nithya, V Madhusudanan, BSN Murthy, R Geetha… - Computer Networks, 2024 - Elsevier
Cyber-physical systems facilitate seamless interaction between the physical and digital
elements for improved efficiency, automation, and real-time monitoring across domains. This …
elements for improved efficiency, automation, and real-time monitoring across domains. This …
Predicting Propagation of Stealthy Worm for Unknown Source in Mobile Edge Computing
Y Sun, F Ren, J Sun, Z Liang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
While improving network performance, Mobile Edge Computing (MEC) faces significant
security threats due to User Equipment (UE) vulnerabilities and insecure communication …
security threats due to User Equipment (UE) vulnerabilities and insecure communication …
[HTML][HTML] The Dynamical Behaviors of a Fractional-Order Malware Propagation Model in Information Networks
X Shi, A Luo, X Chen, Y Huang, C Huang, X Yin - Mathematics, 2024 - mdpi.com
With the swift progress in communication and IT, information networks are increasingly
integrated into our work and everyday life. This paper is dedicated to the study of the …
integrated into our work and everyday life. This paper is dedicated to the study of the …