2016
DOI: 10.14257/ijsia.2016.10.1.17
|View full text |Cite
|
Sign up to set email alerts
|

Predator-Prey Models on Interaction between Computer Worms, Trojan Horse and Antivirus Software Inside a Computer System

Abstract: In this paper an attempt has been made to develop Predator-prey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 7 publications
0
3
0
1
Order By: Relevance
“…Penelitian tentang model predator prey atau modifikasinya di antaranya adalah analisis kestabilan model predator prey dengan infeksi penyakit pada prey dan pemanenan proporsional pada predator. [4] meneliti model mangsa pemangsa dengan infeksi pola SIS dan mengikutsertakan pemanenan untuk populasi mangsa serta menganalisis kestabilan dengan NGM. Model mangsa pemangsa denga studi kasus pada penyebaran worm, trojan horse dan antivirus dikomputer.…”
Section: Model Matematikaunclassified
“…Penelitian tentang model predator prey atau modifikasinya di antaranya adalah analisis kestabilan model predator prey dengan infeksi penyakit pada prey dan pemanenan proporsional pada predator. [4] meneliti model mangsa pemangsa dengan infeksi pola SIS dan mengikutsertakan pemanenan untuk populasi mangsa serta menganalisis kestabilan dengan NGM. Model mangsa pemangsa denga studi kasus pada penyebaran worm, trojan horse dan antivirus dikomputer.…”
Section: Model Matematikaunclassified
“…Internet Service Provider stated in its survey that there is an average of 28 spywares installed on each computer. Spyware includes adware, keystroke loggers and trojan horses [37]. Adware [38] is a software that monitors the user's activity on the browser and sends advertisements to the target user based on his/her browsing activity.…”
Section: Spywarementioning
confidence: 99%
“…Indeed, conceptualising solutions is informed by identified specific problems, which in turn informs the choice of the problem-solving approach and tool Existing analogical design approaches rely largely on thematic mapping processes and subjective choices of the components of a biological system or sub-systems. For instance, by focusing upon the impact of ecological diversification [173], population dynamics [174], or simple constructs of an arms race [175]. This suggests the wrong notion that analogical design requires comprehensive understanding of cyber security technologies, but just the basics of the arms race [176].…”
Section: Research Directions In Survivability Assurance In Cyberspacementioning
confidence: 99%