2016
DOI: 10.1007/978-3-319-44636-3_18
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Malware Propagation in Wireless Sensor Networks with Individual-Based Models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 14 publications
0
7
0
2
Order By: Relevance
“…Del Rey et al [ 38 ] proposed an improved individual-based model, which used characteristics of three types of nodes and complex topology. The states of the model were susceptible, infected, recovered, damaged, and out-of-order.…”
Section: Related Workmentioning
confidence: 99%
“…Del Rey et al [ 38 ] proposed an improved individual-based model, which used characteristics of three types of nodes and complex topology. The states of the model were susceptible, infected, recovered, damaged, and out-of-order.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of Reference [19] proposed an improved individual-based model that use particular features of three types of nodes and complex topology. The compartments of the model are susceptible, infected, recovered, damaged, and out-of-order.…”
Section: Related Workmentioning
confidence: 99%
“…In previously proposed models, system characteristics such as the different types of sensor nodes, the malware and, in some recent, cases the topology have been considered as actors [19]. The SEIRS-D agent-based model proposed in this study takes into account other essential characteristics of these actors and new actors that have still not considered.…”
Section: Introductionmentioning
confidence: 99%
“…Due to distributed structure and weak defence mechanism malware attack in WSN is easy. Malware attack on WSN leads to the various threats such as authentication of information, availability of services, confidentiality of information, and energy exhaustion of sensor nodes [9]. Malware attacker launches the attack by targeting WSN and executes intentional malicious process on sensor node of WSN and makes them infectious.…”
Section: Introductionmentioning
confidence: 99%