Computer viruses: theory and experiments
Computers and Security
Epidemic algorithms for replicated database maintenance
PODC '87 Proceedings of the sixth annual ACM Symposium on Principles of distributed computing
Security audit trail analysis using inductively generated predictive rules
Proceedings of the sixth conference on Artificial intelligence applications
Consistency and orderability: semantics-based correctness criteria for databases
ACM Transactions on Database Systems (TODS)
Ant-based load balancing in telecommunications networks
Adaptive Behavior
Swarm intelligence: from natural to artificial systems
Swarm intelligence: from natural to artificial systems
Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Towards Sensor Database Systems
MDM '01 Proceedings of the Second International Conference on Mobile Data Management
Sequential Dynamical Systems and Applications to Simulations
SS '00 Proceedings of the 33rd Annual Simulation Symposium
TAG: a Tiny AGgregation service for ad-hoc sensor networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
ARA - The Ant-Colony Based Routing Algorithm for MANETs
ICPPW '02 Proceedings of the 2002 International Conference on Parallel Processing Workshops
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Epidemic Algorithms for Replicated Databases
IEEE Transactions on Knowledge and Data Engineering
Inferring Internet denial-of-service activity
ACM Transactions on Computer Systems (TOCS)
Parametric probabilistic routing in sensor networks
Mobile Networks and Applications
A preliminary investigation of worm infections in a bluetooth environment
Proceedings of the 4th ACM workshop on Recurring malcode
CarTel: a distributed mobile sensor computing system
Proceedings of the 4th international conference on Embedded networked sensor systems
Bluetooth Worms: Models, Dynamics, and Defense Implications
ACSAC '06 Proceedings of the 22nd Annual Computer Security Applications Conference
PRESTO: feedback-driven data management in sensor networks
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Can you infect me now?: malware propagation in mobile phone networks
Proceedings of the 2007 ACM workshop on Recurring malcode
Proceedings of the 2008 ACM/IEEE conference on Supercomputing
Bio-inspired algorithms for dynamic resource allocation in cognitive wireless networks
Mobile Networks and Applications
What a cognitive radio network could learn from a school of fish
WICON '07 Proceedings of the 3rd international conference on Wireless internet
EpiNet: a simulation framework to study the spread of malware in wireless networks
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
A sense of self for Unix processes
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A survey on spectrum management in cognitive radio networks
IEEE Communications Magazine
Hi-index | 0.00 |
Biological and social analogies have been long applied to complex systems. Inspiration has been drawn from biological solutions to solve problems in engineering products and systems, ranging from Velcro to camouflage to robotics to adaptive and learning computing methods. In this paper, we present an overview of recent advances in understanding biological systems as networks and use this understanding to design and analyse wireless communication networks. We expand on two applications, namely cognitive sensing and control and wireless epidemiology. We discuss how our work in these two applications is motivated by biological metaphors. We believe that recent advances in computing and communications coupled with advances in health and social sciences raise the possibility of studying coupled bio-social communication networks. We argue that we can better utilise the advances in our understanding of one class of networks to better our understanding of the other.