[1] 宋佳,门宇博,雷丹丹,等.无线自组织网络MAC协议研究综述[J].数字技术与应用, 2019, 37(6): 31-33.
[2] Benyamina D, Hafid A, Gendreau M. Wireless mesh networks design: A survey[J]. IEEE Communications Surveys & Tutorials, 2012, 14(2):299-310.
[3] Sgora A, Vergados D, Chatzimisios P. A survey on security and privacy issues in wireless mesh networks[J]. Security and Communication Networks, 2013, 9(13): 1877-1889.
[4] 何鸿君, 罗莉, 董黎明,等. 广义病毒的形式化定义及识别算法[J]. 计算机学报, 2010, 33(3):562-568.
[5] 方堃宇. 计算机病毒及防范措施初探[J]. 数字通信世界, 2018 (1): 221.
[6] Chen Q, Bridges R A. Automated behavioral analysis of malware: A case study of wannacry ransomware[C]//2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA). IEEE, 2017: 454-460. [7] Rodriguez A, Okamura K. Generating Real Time Cyber Situational Awareness Information Through Social Media Data Mining[C]// 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019, 2: 502-507.
[8] Chandan R R, Mishra P K. A review of security challenges in AdHoc network[J]. International Journal of Applied Engineering Research, 2018, 13(22): 16117-16126.
[9] Upadhyay R K, Kumari S. Bifurcation analysis of an Eepidemic model in wireless sensor network[J]. International Journal of Computer Mathematics, 2018, 95(9): 1775-1805.
[10] Liu B, Zhou W, Gao L, et al. Malware propagations in wireless ad hoc networks[J]. IEEE Transactions on Dependable and Secure Computing, 2018, 15(6): 1016-1026.