-
161
An Adversarial Dynamic Game to Controlling Information Diffusion under Typical Strategies on Online Social Networks
Published 2022-08-01“…The diffusion of negative information, such as rumours, misinformation and computer viruses on Online Social Networks (OSNs), may lead to serious losses and consequences. …”
Get full text
Article -
162
Assessment of Cybersecurity Awareness among Students of Majmaah University
Published 2021-05-01“…Safety concerns for electronic emails, computer viruses, phishing, forged ads, popup windows, and supplementary outbreaks on the Internet were well-examined in this study. …”
Get full text
Article -
163
An algorithm based on artificial intelligence for solving information security tasks
Published 2023-01-01“…The number and variety of attacks on information systems is growing every year, and financial losses from the introduction of computer viruses and unauthorized access to the system are growing proportionally. …”
Get full text
Article -
164
Experimental Investigation of Frozen Solid State Drive on Digital Evidence with Static Forensic Methods
Published 2018-12-01“…Freezing software on computer systems is often carried out by computer technicians, because it can save a computer maintenance costs due to errors, be exposed to computer viruses or malware. This software is used to prevent unwanted changes to the computer system, when the computer is restarted changes that occur in the computer system will not be stored on storage media. …”
Get full text
Article -
165
Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures
Published 2023-01-01“…Computer viruses, malicious, and other hostile attacks can affect a computer network. …”
Get full text
Article -
166
An innovative influenza vaccination policy: targeting last season's patients.
Published 2014-05-01“…Our approach can also be generalized for other infectious disease, computer viruses, or ecological networks.…”
Get full text
Article -
167
Screening Potential Drugs for COVID-19 Based on Bound Nuclear Norm Regularization
Published 2021-10-01“…Third, complete genomic sequences and Gaussian association profiles are integrated to compute virus similarities; chemical structures and Gaussian association profiles are integrated to calculate drug similarities. …”
Get full text
Article -
168
Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model
Published 2022-02-01“…Nowadays,the spread of negative influences such as internet rumors,infectious diseases and computer viruses has caused huge hidden dangers to social stability,human health and information security.It is of great significance to identify the source of their propagation to control the harm caused by the negative influence.However,most of the existing methods only focus on locating a single propagation source,while in the real world network,negative influence often comes from multiple sources.And the methods require time consuming simulation of the propagation process.In addition,due to ignoring the difference of topology features between the nodes,the accuracy of propagation source locating is not high and large amount of computation time is required.In order to solve these problems,a maximum likelihood based method is proposed to locate multiple sources using the information provided by a small number of observation points.Firstly,the concept of propagation graph is defined,and a method for constructing propagation graph is proposed.In the propagation graph,nodes in the network are divided into several levels according to their degrees and the weight of the edges.The edges with low propagation probability are removed,and the propagation graph is formed by combining observation nodes.Then,the activation probability of each node in each layer of the propagation graph is calculated,and the k nodes with the maximum likelihood relative to the observation points are selected to form the source node set.The simulation results show that the proposed method can accurately identify multiple propagation sources in the network,and the results of source location is higher than other similar algorithms.At the same time,it is verified that the selection of observation points and the network structure also affect the positioning results of propagation sources to varying degrees.…”
Get full text
Article -
169
RepVGG-SimAM: An Efficient Bad Image Classification Method Based on RepVGG with Simple Parameter-Free Attention Module
Published 2023-10-01“…In addition, some criminals use bad images to induce users to download software containing computer viruses, which also greatly endanger the security of cyberspace. …”
Get full text
Article -
170
Defense Strategies for Epidemic Cyber Security Threats: Modeling and Analysis by Using a Machine Learning Approach
Published 2024-01-01“…In this computational model, we are studying the factors (i.e., computer viruses, disease infections, and cyberattacks) that affect connected devices. …”
Get full text
Article -
171
Outbreak detection for temporal contact data
Published 2021-02-01“…While the classical context of epidemic spreading refers to pathogens transmitted among humans or animals, it is straightforward to apply similar ideas to the spread of information (e.g., a rumor) or the spread of computer viruses. This paper addresses the question of how to optimally select nodes for monitoring in a network of timestamped contact events between individuals. …”
Get full text
Article -
172
Using STAMP to understand recent increases in malicious software activity
Published 2006Get full text
Thesis -
173
Numerical Assessments Employing Neural Networks for a Novel Drafted Anti-Virus Subcategory in a Nonlinear Fractional-Order SIR Differential System
Published 2022-01-01“…Whereas computer viruses (CVs) are a terrible threat to individual and corporate computer structures. …”
Get full text
Article -
174
The influence of education on the attitude of students to the Internet
Published 2024-03-01“…But they are more likely than others to be repelled by the threat of the spread of computer viruses and fraud. Economists are more attracted than others to the ease of use of the Internet. …”
Article -
175