-
141
Information technology (IT) security. The Impact of malicious software : role of software characteristics and security response of developers/ anti-virus vendors
Published 2008“…This research takes a multiple-case study approach to examine damage caused by seven prominent computer viruses, including mass mailing worms as well as exploits that target software vulnerabilities. …”
Get full text
Final Year Project (FYP) -
142
Information diffusion in social networks
Published 2017“…We are interested in knowing how a piece of information (knowledge) is spread through a network. These may be computer viruses spreading on the Internet or a network of computers, diseases through a social network, or rumors and ideas through a social network. …”
Book Section -
143
Attacking cryptosystems by means of virus machines
Published 2023-12-01“…The paper focuses on the computing paradigm of virus machines within the area of Unconventional Computing and Natural Computing. Virus machines, which incorporate concepts of virology and computer science, are considered as number computing devices with the environment. …”
Get full text
Article -
144
A New Class of “Growth Functions” with Polynomial Variable Transfer Generated by Real Reaction Networks
Published 2020-12-01“…The consideration of such a dynamic model in the present article is dictated by our passionate desire to offer an adequate model with which to well approximate specific data in the field of computer viruses propagation, characterized by rapid growth in the initial time interval. …”
Get full text
Article -
145
Malware phylogeny oriented to libraries analysis
Published 2016-03-01“…The use of these phylogeny techniques with a focus on computer viruses has allowed the finding of similarities between different malware families. …”
Get full text
Article -
146
Percolation centrality: quantifying graph-theoretic impact of nodes during percolation in networks.
Published 2013-01-01“…However, the existing centrality measures are not adequate in network percolation scenarios (such as during infection transmission in a social network of individuals, spreading of computer viruses on computer networks, or transmission of disease over a network of towns) because they do not account for the changing percolation states of individual nodes. …”
Get full text
Article -
147
Transient Phenomena in Information Technology for Branching Processes with an Infinite Set of Types
Published 2024-03-01“…In information technology, branching processes can be used to model and analyze various scenarios, such as the propagation of data or information in a network, the growth of computer viruses, the spread of software bugs, and more. …”
Get full text
Article -
148
Gender Differences in Computer Ethics among Business Administration Students
Published 2010-12-01“…Even though the pervasive use of computers and the Internet has many benefits for almost everyone, but it has also increased the use of these technologies for illegal purposes or unethical activities such as spamming, making illegal copies of software, violations of privacy, hacking and computer viruses. The main purpose of this study is to explore gender differences in computer ethics among Business Administration students and examine their attitudes towards ethical use of computers. …”
Get full text
Article -
149
On Analysis and Effectiveness of Signature Based in Detecting Metamorphic Virus
Published 2013“…Computer viruses and other forms of malware have viewed as a threat to any software system. …”
Get full text
Article -
150
Dynamic properties of the multimalware attacks in wireless sensor networks: Fractional derivative analysis of wireless sensor networks
Published 2024-02-01“…This problem is caused by worms entering the networks, which can spread uncontrollably to nearby nodes from a single node infected with computer viruses, worms, trojans, and other malicious software, which can compromise the network’s integrity and functionality. …”
Get full text
Article -
151
Cyberspace and Cybersecurity: Problems, Perspectives, Technologies
Published 2018-06-01“…It is indicated that computer viruses are one of the aspects of cyber threats. …”
Get full text
Article -
152
A Differential Game Approach to Patch Injection
Published 2018-01-01“…To fight against the evolving computer viruses, we must constantly inject new virus patches into the computer networks. …”
Get full text
Article -
153
Optimal Resource Allocation to Reduce an Epidemic Spread and Its Complication
Published 2019-06-01“…Moreover, the same representation could efficiently describe different epidemic scenarios, involving, for example, computer viruses spreading in the network. In this paper, a new model describing an infectious disease and a possible complication is proposed; after deep-model analysis discussing the role of the reproduction number, an optimal control problem is formulated and solved to reduce the number of dead patients, minimizing the control effort. …”
Get full text
Article -
154
Discerning Influential Spreaders in Complex Networks by Accounting the Spreading Heterogeneity of the Nodes
Published 2019-01-01“…Centrality is driven immunization is one of the best ways to prevent massive outbreaks (e.g., rumors and computer viruses) on complex networks, for it can effectively block the important diffusion paths to delay the propagation process. …”
Get full text
Article -
155
A Fractional SAIDR Model in the Frame of Atangana–Baleanu Derivative
Published 2021-04-01“…It is possible to produce mobile phone worms, which are computer viruses with the ability to command the running of cell phones by taking advantage of their flaws, to be transmitted from one device to the other with increasing numbers. …”
Get full text
Article -
156
Lexical sorting centrality to distinguish spreading abilities of nodes in complex networks under the Susceptible-Infectious-Recovered (SIR) model
Published 2022-09-01“…The spreading of a virus (such as SARS-CoV-2) in a community, spreading computer viruses in communication networks, or spreading gossip on a social network is the subject of epidemic modeling. …”
Get full text
Article -
157
Complex Cases of Source Code Authorship Identification Using a Hybrid Deep Neural Network
Published 2022-09-01“…Another application field is information security—in particular, identifying the author of computer viruses. We apply our technique based on a hybrid of Inception-v1 and Bidirectional Gated Recurrent Units architectures on heterogeneous source codes and consider the most common commercial development complex cases that negatively affect the authorship identification process. …”
Get full text
Article -
158
EMERGENCY ONLINE TEACHING: EARLY CHILDHOOD EDUCATION LECTURERS' PERCEPTION OF BARRIER AND PEDAGOGICAL COMPETENCY
Published 2020-10-01“…Then, third barriers are computer viruses, the quality of course content, and reliability of the online assessment instrument. …”
Get full text
Article -
159
Malware data collection and analysis
Published 2013“…Millions of hosts on the Internet are infected with malware, ranging from classic computer viruses to Internet worms and bot networks. A huge increase in the number of malware samples are collected by anti-virus vendors. …”
Get full text
Final Year Project (FYP) -
160
Cloud Computing: a tool for effective records and information management system in Nigerian academic libraries
Published 2023-11-01“…It argued that information stored in this format is susceptible to loss by theft, fire or computer viruses, hard drive collapse as well as the destruction of local library internet server due to poor maintenance culture on the part of the personnel. …”
Get full text
Article