[HTML][HTML] Research communities in cyber security vulnerability assessments: A comprehensive literature review

F Heiding, S Katsikeas, R Lagerström - Computer Science Review, 2023 - Elsevier
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic
fields of study. Still, it is sometimes unclear what research areas are included in the …

[HTML][HTML] Modeling time delay, external noise and multiple malware infections in wireless sensor networks

CNH Nwokoye, V Madhusudanan, MN Srinivas… - Egyptian Informatics …, 2022 - Elsevier
The essentiality of wireless sensor networks (WSNs) in military and health applications
cannot be overemphasized, and this has made these tiny sensors soft targets for malware …

A review article on wireless sensor networks in view of e-epidemic models

MN Srinivas, V Madhusudanan, A Murty… - Wireless Personal …, 2021 - Springer
Epidemic simulations have recently been used to model the dynamics of malicious codes in
the network of wireless sensors. This is because of its open existence, which offers a simple …

[HTML][HTML] Lyapunov-based analysis and worm extinction in wireless networks using stochastic SVEIR model

A Alkhazzan, J Wang, Y Nie, SMA Shah… - Alexandria Engineering …, 2025 - Elsevier
In this study, we present a novel stochastic SVEIR (Susceptible–Vaccinated–Exposed–
Infectious–Recovered) model specifically designed to analyze worm propagation in wireless …

[HTML][HTML] Delay effect of an e-epidemic SEIRS malware propagation model with a generalized non-monotone incidence rate

J Liu, T Saeed, A Zeb - Results in Physics, 2022 - Elsevier
Malware such as virus, worm, and Trojan horse, is a software designed to pose harmful and
undesirable effects on communication networks. It can cause numerous sever damage like …

Analysis of delay-aware worm propagation model in wireless iot systems with ratio-dependent functional response

V Madhusudanan, R Geetha, BSN Murthy… - IEEE …, 2023 - ieeexplore.ieee.org
This article presents a delayed susceptibility, exposure, infectivity, recovery, and vaccination
(SEIRV) model with nonlinear incidence and ratio-dependent functional responses. Model …

SEIRS model with spatial correlation for analyzing dynamic of virus spreading in event-driven wireless sensor networks

RK Shakya, TH Ayane, FD Diba, P Mamoria - International Journal of …, 2022 - Springer
In Event-driven wireless systems, mostly data transmission depends on events occurring in
the sensor field. Most of the time, sensor nodes are silent or in sleep mode. When events …

Delayed dynamics analysis of SEI2RS malware propagation models in cyber–Physical systems

D Nithya, V Madhusudanan, BSN Murthy, R Geetha… - Computer Networks, 2024 - Elsevier
Cyber-physical systems facilitate seamless interaction between the physical and digital
elements for improved efficiency, automation, and real-time monitoring across domains. This …

Predicting Propagation of Stealthy Worm for Unknown Source in Mobile Edge Computing

Y Sun, F Ren, J Sun, Z Liang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
While improving network performance, Mobile Edge Computing (MEC) faces significant
security threats due to User Equipment (UE) vulnerabilities and insecure communication …

[HTML][HTML] The Dynamical Behaviors of a Fractional-Order Malware Propagation Model in Information Networks

X Shi, A Luo, X Chen, Y Huang, C Huang, X Yin - Mathematics, 2024 - mdpi.com
With the swift progress in communication and IT, information networks are increasingly
integrated into our work and everyday life. This paper is dedicated to the study of the …