2020
DOI: 10.1016/j.physa.2019.122617
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and control of computer virus attack on a targeted network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…In [9], a model with two different structures-attacking class and target class-is presented to study the mobility of viruses when attacking a target network. The concept of optimal control is introduced to regulate the spread of the virus, and the use of a firewall is also suggested.…”
Section: Backroundmentioning
confidence: 99%
“…In [9], a model with two different structures-attacking class and target class-is presented to study the mobility of viruses when attacking a target network. The concept of optimal control is introduced to regulate the spread of the virus, and the use of a firewall is also suggested.…”
Section: Backroundmentioning
confidence: 99%
“…The result is affirming to the claim of M. Zhang et al [18] that large-scale and rapid virus dissemination occurs during the most frequent access to emails. As Upadhyay et al [5] puts it, if susceptible computers come into contact with infected computers, the virus can spread swiftly…”
Section: Simulationmentioning
confidence: 99%
“…In most circumstances, this could result in severe crises like concens about security. Therefore, it is very important to understand how malware spreads and affects the networks [5], [6]. In the era of information and communication technology (ICT) systems, everyone thinks as to how life is going to be carried out as ICT and communication devices play a crucial role in the different fields of our daily life particularly in this time of pandemic crisis.…”
Section: Introductionmentioning
confidence: 99%
“…Meanwhile, in [12,13], antidotal computers are expressed as a separate compartment generating an SAIR model. Recently, Upadhyay and Singh [18] proposed a model with two different classes of computer nodes, the attacking and targeting nodes. They studied the virus propagation from an attack node into the targeted system.…”
Section: Introductionmentioning
confidence: 99%