Research Article

Attack-Defense Game between Malicious Programs and Energy-Harvesting Wireless Sensor Networks Based on Epidemic Modeling

Figure 5

Dynamic control under 3 charging strategies. (a) Strategy with solar energy harvesters; (b) strategy with UAVs; (c) strategies without charging.
(a)
(b)
(c)