2012
DOI: 10.1016/j.phpro.2012.05.062
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Passive Propagation of Malwares on the WWW

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…In recent times epidemiological researchers of network security have highlighted the sameness in connectivity realities between biological viruses and malware equivalents. This has resulted to the use of epidemic models for the understanding of malware spread in networks (computer networks [4], peer-to-peer (P2P) [5], wireless sensor networks [6] and the WWW [7] or the internet [8]). These epidemic models compartmentalize the hosts according to their disease/infection status.…”
Section: Related Workmentioning
confidence: 99%
“…In recent times epidemiological researchers of network security have highlighted the sameness in connectivity realities between biological viruses and malware equivalents. This has resulted to the use of epidemic models for the understanding of malware spread in networks (computer networks [4], peer-to-peer (P2P) [5], wireless sensor networks [6] and the WWW [7] or the internet [8]). These epidemic models compartmentalize the hosts according to their disease/infection status.…”
Section: Related Workmentioning
confidence: 99%
“…Usually referred to as "Epidemic models", these system(s) of equations that implement the epidemic theory can be ordinary differential, partial differential, or difference (depending on the intention of the modeler). Aside its application, in public health, they are also evident in the characterization of computer networks [11], peer-to-peer (P2P) [12], wireless sensor networks [13] and the WWW [14] or the internet [15].…”
Section: Related Workmentioning
confidence: 99%
“…The effort of many scientists and mathematicians in the area of computer technology and its security is magnetized many authors. The projected model and its similar development are analysed by many scholars [48][49][50][51][52][53][54][55].…”
Section: Introductionmentioning
confidence: 99%