Showing 121 - 140 results of 175 for search '"computer virus"', query time: 0.33s Refine Results
  1. 121

    The virus plague / Nur Zakri Haji Zakaria and Marini Haji Othman

    Published 1991
    “…This paper attempts to shed some light on the subject of the computer virus. Most of the confusion amongst computer users regarding viruses is due mainly to the lack of technical know-how or misinformation.…”
    Get full text
    Article
  2. 122

    KONTROL OPTIMAL PADA MODEL PENYEBARAN VIRUS KOMPUTER DENGAN KLASIFIKASI PENGAMANAN by PANGESTUTI PRIMA DARAJAT, TYAS HUSADANINGSIH

    Published 2019-11-01
    “…In this paper, a model of the spread of computer viruses  with security classification and nonlinear infection rates is formulated. …”
    Get full text
    Article
  3. 123

    Traffic-driven epidemic spreading and its control strategies by Yanqing Wu, Cunlai Pu, Lunbo Li, Gongxuan Zhang

    Published 2019-02-01
    “…Many epidemics or viruses in real life spread by taking advantage of other dynamic processes, e.g., the computer virus propagates with the transmission of packets. …”
    Get full text
    Article
  4. 124

    Translation, solving scheme, and implementation of a periodic and optimal impulsive state control problem by Ying Song, Yongzhen Pei, Miaomiao Chen, Meixia Zhu

    Published 2018-03-01
    “…Finally, three examples involving the marine ecosystem, computer virus, and resource administration are illustrated to confirm the validity of our approaches.…”
    Get full text
    Article
  5. 125

    An analysis of the offences under the computer crimes act 1997 / Ahmad Kamal Roslan, Syazana Abd. Lajis and Maria ak Ugak by Roslan, Ahmad Kamal, Abd. Lajis, Syazana, Ugak, Maria

    Published 2006
    “…For example, the Computer Crimes Act 1997 provides a mean of protection to the Internet users, from the threats of activities of computer criminal such as computer virus and hacking. It is hope that this thesis will give an idea to the public generally and law students especially on the major offences and the adequacy of the penalties under the Computer Crimes Act 1997.…”
    Get full text
    Student Project
  6. 126

    Analysis and effectiveness of signature based in detecting metamorphic virus by Md. Sharif, Syahrizal Azmir

    Published 2010
    “…Computer viruses and other forms of malware have viewed as a threat to any software system. …”
    Get full text
    Thesis
  7. 127

    TROUBLE TICKET SYSTEM BERBASIS WEB DAN ANDROID DI PT. Len Industri (Persero) Bandung by , ULFA NOOR AISYAH, , Nur Rohman Rosyid,S.T.,M.T.,D.Eng

    Published 2013
    “…It can be caused of the Internet connectivity failure, software failure due to the computer virus, cabling problems, and so on. Failure for managing problems will trigger a snow ball trouble that decreases corporation productivity. …”
    Thesis
  8. 128
  9. 129

    Language of Scientific Communication: the Most Frequent Conceptual Mechanisms in Observing and Describing Scientific Phenomena in Information Science by Milijana Mičunović

    Published 2012-12-01
    “…Application of conceptual mechanisms in the language of information science is presented through the examples of often, almost daily used terms, such as database, gadget race, information architecture, intellectual property, print revolution, computer virus, artificial life, etc. The observing and describing of these terms has been followed, both in popular discourse (such as on various web pages), as well as in available scientific and professional literature. …”
    Get full text
    Article
  10. 130

    A Virus Infected Your Laptop. Let’s Play an Escape Game by Araceli Queiruga-Dios, María Jesús Santos Sánchez, Marián Queiruga Dios, Víctor Gayoso Martínez, Ascensión Hernández Encinas

    Published 2020-01-01
    “…The first time students watched a video that contextualizes this stressful situation, they thought that they had been attacked by a computer virus. Fortunately, the panic only lasted a few seconds. …”
    Get full text
    Article
  11. 131

    A stochastic computational scheme for the computer epidemic virus with delay effects by Wajaree Weera, Thongchai Botmart, Teerapong La-inchua, Zulqurnain Sabir, Rafaél Artidoro Sandoval Núñez, Marwan Abukhaled, Juan Luis García Guirao

    Published 2023-01-01
    “…The LMBP-NNs approach has been used to numerically simulate three cases of the computer virus epidemic system with delay effects. The stochastic framework for the computer epidemic virus system with the time delay effects is provided using the selection of data with 11%, 13%, and 76% for testing, training, and verification together with 15 neurons. …”
    Get full text
    Article
  12. 132

    Secure the IoT Networks as Epidemic Containment Game by Juntao Zhu, Hong Ding, Yuchen Tao, Zhen Wang, Lanping Yu

    Published 2021-01-01
    “…The spread of a computer virus among the Internet of Things (IoT) devices can be modeled as an Epidemic Containment (EC) game, where each owner decides the strategy, e.g., installing anti-virus software, to maximize his utility against the susceptible-infected-susceptible (SIS) model of the epidemics on graphs. …”
    Get full text
    Article
  13. 133

    Defense strategy of industrial control worm based on SEIPQR model by Jie PAN, Lan YE, He ZHAO, Xinlei ZHANG

    Published 2022-06-01
    “…Computer viruses keep evolving with the development of society and progress of technologies, and they become more complex and hidden.The worm virus is the earliest computer virus, which has evolved to an industrial control worm virus and caused a great impact on the safety of the industrial system.Neither the single network isolation nor the patching immunity is unable to keep up with the spreading of the worm virus.The propagation mode and characteristics of the worm virus in the industrial control system were analyzed.Based on the related works of network isolation and patching, a defense strategy against the worm virus was proposed.This strategy was originated from the fundamental infectious disease model, and then a mathematics model (SEIPQR) was proposed to simulate the trend of worm virus propagation.The model included six situations: Susceptible, Exposed, Infected, Quarantine and Recovered.The state transition diagrams of the model was created, and the calculus equations were obtained from the state transition diagrams.Under the condition that the number of system equipment is fixed, the equations were transformed.The equations were solved by solving the basic regeneration number R0, and six equation expressions of the model ware analyzed when the number of exposed hosts and infected hosts is zero.According to the principle of the Routh-Hurwitz, the system is asymptotically stable when R0<1, and unstable if R0>1.Then the dynamic characteristics of the SEIPQR model under different patching probability, different isolation rate and different infection rate were compared by numerical simulation.Furthermore, the disease-free equilibrium point and endemic equilibrium point of the model were obtained.The simulation results showed that, when the whole system is infected with worm virus, timely patching the susceptible devices and isolating the network can effectively inhibit the spread of industrial control worm virus.…”
    Get full text
    Article
  14. 134

    Cyber security laws and safety in e-commerce in India by A. K. Kashyap, M. Chaudhary

    Published 2023-06-01
    “…The Indian Penal Code addresses unauthorized access, hacking, identity theft, phishing, and computer virus dissemination. The Reserve Bank of India oversees online payment and financial security, mandating two-factor authentication, encryption, and secure payment channels. …”
    Get full text
    Article
  15. 135

    Identifying infection sources and regions in large networks by Luo, Wuqiong, Tay, Wee Peng, Leng, Mei

    Published 2019
    “…Identifying the infection sources in a network, including the index cases that introduce a contagious disease into a population network, the servers that inject a computer virus into a computer network, or the individuals who started a rumor in a social network, plays a critical role in limiting the damage caused by the infection through timely quarantine of the sources. …”
    Get full text
    Get full text
    Journal Article
  16. 136

    Infection Spreading and Source Identification: A Hide and Seek Game by Luo, Wuqiong, Tay, Wee Peng, Leng, Mei

    Published 2017
    “…The goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator. …”
    Get full text
    Get full text
    Journal Article
  17. 137

    Analysis of Epidemic Models in Complex Networks and Node Isolation Strategie Proposal for Reducing Virus Propagation by Carlos Rodríguez Lucatero

    Published 2024-01-01
    “…In such models, the conditions that lead to a rapid extinction of the spread of a computer virus have been calculated and its dependence on some parameters inherent to the mathematical model has been observed. …”
    Get full text
    Article
  18. 138

    Development and Practical Applications of Computational Intelligence Technology by Yasunari Matsuzaka, Ryu Yashiro

    Published 2024-02-01
    “…AISs have been used to solve problems that require identification and learning, such as computer virus identification and removal, image identification, and function optimization problems. …”
    Get full text
    Article
  19. 139

    PEMODELAN MATEMATIKA TERHADAP PENYEBARAN VIRUS KOMPUTER DENGAN PROBABILITAS KEKEBALAN by Neni Nur Laili Ersela Zain, Pardomuan Robinson Sihombing

    Published 2021-09-01
    “…The increase in the number of computer viruses can be modeled with a mathematical model of the spread of SEIR type of diseases with immunity probability. …”
    Get full text
    Article
  20. 140

    An exact relationship between invasion probability and endemic prevalence for Markovian SIS dynamics on networks. by Robert R Wilkinson, Kieran J Sharkey

    Published 2013-01-01
    “…Understanding models which represent the invasion of network-based systems by infectious agents can give important insights into many real-world situations, including the prevention and control of infectious diseases and computer viruses. Here we consider Markovian susceptible-infectious-susceptible (SIS) dynamics on finite strongly connected networks, applicable to several sexually transmitted diseases and computer viruses. …”
    Get full text
    Article