-
121
The virus plague / Nur Zakri Haji Zakaria and Marini Haji Othman
Published 1991“…This paper attempts to shed some light on the subject of the computer virus. Most of the confusion amongst computer users regarding viruses is due mainly to the lack of technical know-how or misinformation.…”
Get full text
Article -
122
KONTROL OPTIMAL PADA MODEL PENYEBARAN VIRUS KOMPUTER DENGAN KLASIFIKASI PENGAMANAN
Published 2019-11-01“…In this paper, a model of the spread of computer viruses with security classification and nonlinear infection rates is formulated. …”
Get full text
Article -
123
Traffic-driven epidemic spreading and its control strategies
Published 2019-02-01“…Many epidemics or viruses in real life spread by taking advantage of other dynamic processes, e.g., the computer virus propagates with the transmission of packets. …”
Get full text
Article -
124
Translation, solving scheme, and implementation of a periodic and optimal impulsive state control problem
Published 2018-03-01“…Finally, three examples involving the marine ecosystem, computer virus, and resource administration are illustrated to confirm the validity of our approaches.…”
Get full text
Article -
125
An analysis of the offences under the computer crimes act 1997 / Ahmad Kamal Roslan, Syazana Abd. Lajis and Maria ak Ugak
Published 2006“…For example, the Computer Crimes Act 1997 provides a mean of protection to the Internet users, from the threats of activities of computer criminal such as computer virus and hacking. It is hope that this thesis will give an idea to the public generally and law students especially on the major offences and the adequacy of the penalties under the Computer Crimes Act 1997.…”
Get full text
Student Project -
126
Analysis and effectiveness of signature based in detecting metamorphic virus
Published 2010“…Computer viruses and other forms of malware have viewed as a threat to any software system. …”
Get full text
Thesis -
127
TROUBLE TICKET SYSTEM BERBASIS WEB DAN ANDROID DI PT. Len Industri (Persero) Bandung
Published 2013“…It can be caused of the Internet connectivity failure, software failure due to the computer virus, cabling problems, and so on. Failure for managing problems will trigger a snow ball trouble that decreases corporation productivity. …”
Thesis -
128
Survey on Personality Recognition Based on Social Media Data
Published 2023-05-01Get full text
Article -
129
Language of Scientific Communication: the Most Frequent Conceptual Mechanisms in Observing and Describing Scientific Phenomena in Information Science
Published 2012-12-01“…Application of conceptual mechanisms in the language of information science is presented through the examples of often, almost daily used terms, such as database, gadget race, information architecture, intellectual property, print revolution, computer virus, artificial life, etc. The observing and describing of these terms has been followed, both in popular discourse (such as on various web pages), as well as in available scientific and professional literature. …”
Get full text
Article -
130
A Virus Infected Your Laptop. Let’s Play an Escape Game
Published 2020-01-01“…The first time students watched a video that contextualizes this stressful situation, they thought that they had been attacked by a computer virus. Fortunately, the panic only lasted a few seconds. …”
Get full text
Article -
131
A stochastic computational scheme for the computer epidemic virus with delay effects
Published 2023-01-01“…The LMBP-NNs approach has been used to numerically simulate three cases of the computer virus epidemic system with delay effects. The stochastic framework for the computer epidemic virus system with the time delay effects is provided using the selection of data with 11%, 13%, and 76% for testing, training, and verification together with 15 neurons. …”
Get full text
Article -
132
Secure the IoT Networks as Epidemic Containment Game
Published 2021-01-01“…The spread of a computer virus among the Internet of Things (IoT) devices can be modeled as an Epidemic Containment (EC) game, where each owner decides the strategy, e.g., installing anti-virus software, to maximize his utility against the susceptible-infected-susceptible (SIS) model of the epidemics on graphs. …”
Get full text
Article -
133
Defense strategy of industrial control worm based on SEIPQR model
Published 2022-06-01“…Computer viruses keep evolving with the development of society and progress of technologies, and they become more complex and hidden.The worm virus is the earliest computer virus, which has evolved to an industrial control worm virus and caused a great impact on the safety of the industrial system.Neither the single network isolation nor the patching immunity is unable to keep up with the spreading of the worm virus.The propagation mode and characteristics of the worm virus in the industrial control system were analyzed.Based on the related works of network isolation and patching, a defense strategy against the worm virus was proposed.This strategy was originated from the fundamental infectious disease model, and then a mathematics model (SEIPQR) was proposed to simulate the trend of worm virus propagation.The model included six situations: Susceptible, Exposed, Infected, Quarantine and Recovered.The state transition diagrams of the model was created, and the calculus equations were obtained from the state transition diagrams.Under the condition that the number of system equipment is fixed, the equations were transformed.The equations were solved by solving the basic regeneration number R0, and six equation expressions of the model ware analyzed when the number of exposed hosts and infected hosts is zero.According to the principle of the Routh-Hurwitz, the system is asymptotically stable when R0<1, and unstable if R0>1.Then the dynamic characteristics of the SEIPQR model under different patching probability, different isolation rate and different infection rate were compared by numerical simulation.Furthermore, the disease-free equilibrium point and endemic equilibrium point of the model were obtained.The simulation results showed that, when the whole system is infected with worm virus, timely patching the susceptible devices and isolating the network can effectively inhibit the spread of industrial control worm virus.…”
Get full text
Article -
134
Cyber security laws and safety in e-commerce in India
Published 2023-06-01“…The Indian Penal Code addresses unauthorized access, hacking, identity theft, phishing, and computer virus dissemination. The Reserve Bank of India oversees online payment and financial security, mandating two-factor authentication, encryption, and secure payment channels. …”
Get full text
Article -
135
Identifying infection sources and regions in large networks
Published 2019“…Identifying the infection sources in a network, including the index cases that introduce a contagious disease into a population network, the servers that inject a computer virus into a computer network, or the individuals who started a rumor in a social network, plays a critical role in limiting the damage caused by the infection through timely quarantine of the sources. …”
Get full text
Get full text
Journal Article -
136
Infection Spreading and Source Identification: A Hide and Seek Game
Published 2017“…The goal of an infection source node (e.g., a rumor or computer virus source) in a network is to spread its infection to as many nodes as possible, while remaining hidden from the network administrator. …”
Get full text
Get full text
Journal Article -
137
Analysis of Epidemic Models in Complex Networks and Node Isolation Strategie Proposal for Reducing Virus Propagation
Published 2024-01-01“…In such models, the conditions that lead to a rapid extinction of the spread of a computer virus have been calculated and its dependence on some parameters inherent to the mathematical model has been observed. …”
Get full text
Article -
138
Development and Practical Applications of Computational Intelligence Technology
Published 2024-02-01“…AISs have been used to solve problems that require identification and learning, such as computer virus identification and removal, image identification, and function optimization problems. …”
Get full text
Article -
139
PEMODELAN MATEMATIKA TERHADAP PENYEBARAN VIRUS KOMPUTER DENGAN PROBABILITAS KEKEBALAN
Published 2021-09-01“…The increase in the number of computer viruses can be modeled with a mathematical model of the spread of SEIR type of diseases with immunity probability. …”
Get full text
Article -
140
An exact relationship between invasion probability and endemic prevalence for Markovian SIS dynamics on networks.
Published 2013-01-01“…Understanding models which represent the invasion of network-based systems by infectious agents can give important insights into many real-world situations, including the prevention and control of infectious diseases and computer viruses. Here we consider Markovian susceptible-infectious-susceptible (SIS) dynamics on finite strongly connected networks, applicable to several sexually transmitted diseases and computer viruses. …”
Get full text
Article