When is a network epidemic hard to eliminate?

K Drakopoulos, A Ozdaglar… - … of Operations Research, 2017 - pubsonline.informs.org
We consider the propagation of a contagion process (“epidemic”) on a network and study
the problem of dynamically allocating a fixed curing budget to the nodes of the graph, at …

Suppressing epidemics in networks using priority planning

K Scaman, A Kalogeratos… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In this paper, we analyze a large class of dynamic resource allocation (DRA) strategies,
named priority planning, that aim to suppress SIS epidemics taking place in a network. This …

Optimal curing policy for epidemic spreading over a community network with heterogeneous population

S Ottaviano, F De Pellegrini… - Journal of Complex …, 2018 - academic.oup.com
The design of an efficient curing policy, able to stem an epidemic process at an affordable
cost, has to account for the structure of the population contact network supporting the …

Error correction coding meets cyber-physical systems: Message-passing analysis of self-healing interdependent networks

A Behfarnia, A Eslami - IEEE Transactions on Communications, 2017 - ieeexplore.ieee.org
Coupling cyber and physical systems gives rise to numerous engineering challenges and
opportunities. An important challenge is the contagion of failure from one system to another …

Universality of the SIS prevalence in networks

P Van Mieghem - arXiv preprint arXiv:1612.01386, 2016 - arxiv.org
Epidemic models are increasingly used in real-world networks to understand diffusion
phenomena (such as the spread of diseases, emotions, innovations, failures) or the …

Inference, prediction and control of networked epidemics

NJ Watkins, C Nowzari… - 2017 American Control …, 2017 - ieeexplore.ieee.org
We develop a feedback control method for networked epidemic spreading processes. In
contrast to most prior works which consider mean field, open-loop control schemes, the …

Distributed adaptive patching strategies against malware propagation: a passivity approach

P Lee, A Clark, B Alomair, L Bushnell… - 2016 IEEE 55th …, 2016 - ieeexplore.ieee.org
A computer malware is a malicious code that compromises a node and then attempts to
infect the node's neighbors in order to mount further attacks. Strategies for mitigating …

[PDF][PDF] APPLICATION OF PROBABILISTIC INFERENCE TO RESILIENCY AND SECURITY ANALYSIS OF CYBER-PHYSICAL SYSTEMS

A Behfarnia - 2020 - researchgate.net
This dissertation studies two important topics regarding the resiliency and the security of
cyber-physical systems (CPSs). In the first work, a self-healing graphical representation is …

[引用][C] An Heterogeneous SIS Model for Directed Networks and Optimal Curing Policy

S Ottaviano, F De Pellegrini, S Bonaccorsi… - arXiv preprint arXiv …, 2016

[引用][C] Control of contagion processes on networks