2014
DOI: 10.15803/ijnc.4.1_151
|View full text |Cite
|
Sign up to set email alerts
|

Decontaminating a Network from a Black Virus

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 44 publications
0
12
0
Order By: Relevance
“…For other distributed searching models and algorithms for specific network topologies see [8,20,26,35].…”
Section: Related Workmentioning
confidence: 99%
“…For other distributed searching models and algorithms for specific network topologies see [8,20,26,35].…”
Section: Related Workmentioning
confidence: 99%
“…An interesting variation to the black-hole search problem has been recently introduced in [19], where the network must be decontaminated from black-viruses. A black-virus is a harmful process which destroys any agent arriving at the node where it resides; when that occurs, a black-virus moves, spreading to all the neighboring nodes, thus increasing its presence in the network.…”
Section: Related Workmentioning
confidence: 99%
“…where q denotes the dimension of the network, and n and m denote the numbers of nodes and of links, respectively. The results of this chapter appeared in [18,19]. In next chapter, the investigation of the BVD problem is extended to arbitrary graph.…”
Section: Discussionmentioning
confidence: 99%
“…The simulation disclosed many interesting behaviors of the solution protocol. Simulation demonstrates the worst case complexity analysis in [19]. In addition to proving the analytical results, simulation provides deep understanding on influence of graph connectivity density and size on complexities (movement, time, and agent size).…”
mentioning
confidence: 82%
See 1 more Smart Citation