2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design ((CSCWD)) 2018
DOI: 10.1109/cscwd.2018.8465280
|View full text |Cite
|
Sign up to set email alerts
|

The Study on the Botnet and its Prevention Policies in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…Ji et al [19] focused their work on Mirai's architecture to study its propagation patterns. They based their propagation model on the SIR format, with N defined as the total IoT population, S as IoT nodes with weak logins, I as infected nodes, and R as immune nodes.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Ji et al [19] focused their work on Mirai's architecture to study its propagation patterns. They based their propagation model on the SIR format, with N defined as the total IoT population, S as IoT nodes with weak logins, I as infected nodes, and R as immune nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Wang et al [14] focus specifically on the mobile actuator scenario, demonstrating how the IoT space may present unique vulnerabilities and exploitation opportunities. Ji et al [19] provide a specialised model for the Mirai botnet, driven by a need to understand the propagation of this prevalent threat. Singh et al [20] and Feng et al [23] focus on defining 0 -based thresholds, using the epidemic-based metric to determine the limits of spread.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Taking derivatives of F and V with respect to I and E, F and V can be respectively transformed in equation (10) and (11)…”
Section: Determination Of Basic Reproductive Number R0mentioning
confidence: 99%