Epidemic Source Detection over Dynamic Networks
نویسندگان
چکیده
منابع مشابه
Epidemic Processes over Adaptive State-Dependent Networks
In this paper we study the dynamics of epidemic processes taking place in adaptive networks of arbitrary topology. We focus our study on the adaptive susceptible-infected-susceptible (ASIS) model, where healthy individuals are allowed to temporarily cut edges connecting them to infected nodes in order to prevent the spread of the infection. In this paper we derive a closed-form expression for a...
متن کاملWireless Epidemic Spread in Dynamic Human Networks
The emergence of Delay Tolerant Networks (DTNs) has culminated in a new generation of wireless networking. New communication paradigms, which use dynamic interconnectedness as people encounter each other opportunistically, lead towards a world where digital traffic flows more easily. We focus on humanto-human communication in environments that exhibit the characteristics of social networks. Thi...
متن کاملEpidemic Threshold in Dynamic Switching Networks
In this paper, we analyze dynamic switching networks where the networks switch arbitrarily among a set of topologies. For this class of dynamic networks, we derive an epidemic threshold considering the SIS epidemic model. First, an epidemic probabilistic model based on assumption of independence between states of nodes is developed. We identify conditions for the epidemic dying out by linearizi...
متن کاملEpidemic thresholds in dynamic contact networks.
The reproductive ratio, R0, is a fundamental quantity in epidemiology, which determines the initial increase in an infectious disease in a susceptible host population. In most epidemic models, there is a specific value of R0, the epidemic threshold, above which epidemics are possible, but below which epidemics cannot occur. As the complexity of an epidemic model increases, so too does the diffi...
متن کاملEpidemic Node Replica Detection in Sensor Networks
A node replication attack against a wireless sensor network involves surreptitious efforts by an adversary to insert duplicate sensor nodes into the network while avoiding detection. Due to the lack of tamper resistant hardware and the low cost of sensor nodes, launching replication attacks takes little effort to carry out. Naturally, detecting these replica nodes is a very important task and h...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2020
ISSN: 2079-9292
DOI: 10.3390/electronics9061018