In this paper, we analyze a large class of dynamic resource allocation (DRA) strategies, named priority planning, that aim to suppress SIS epidemics taking place in a network. This …
The design of an efficient curing policy, able to stem an epidemic process at an affordable cost, has to account for the structure of the population contact network supporting the …
A Behfarnia, A Eslami - IEEE Transactions on Communications, 2017 - ieeexplore.ieee.org
Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another …
P Van Mieghem - arXiv preprint arXiv:1612.01386, 2016 - arxiv.org
Epidemic models are increasingly used in real-world networks to understand diffusion phenomena (such as the spread of diseases, emotions, innovations, failures) or the …
NJ Watkins, C Nowzari… - 2017 American Control …, 2017 - ieeexplore.ieee.org
We develop a feedback control method for networked epidemic spreading processes. In contrast to most prior works which consider mean field, open-loop control schemes, the …
A computer malware is a malicious code that compromises a node and then attempts to infect the node's neighbors in order to mount further attacks. Strategies for mitigating …
This dissertation studies two important topics regarding the resiliency and the security of cyber-physical systems (CPSs). In the first work, a self-healing graphical representation is …