Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
85,003 result(s) for "COMPUTER VIRUSES"
Sort by:
Combating computer viruses
Explains electronic infections and viruses, including Trojan horses and worms, and includes safety guidelines to help combat and prevent the spread of these damaging computer programs.
Stochastic fractional order model for the computational analysis of computer virus
This work presents a novel mathematical framework for analyzing the propagation dynamics of computer viruses by formulating a fractional-order model. The classical integer-order differential model of computer virus spread is reformulated using Caputo fractional derivatives, yielding a fractional computer virus model that captures the inherent memory and persistence characteristics of digital infection processes. A comprehensive analytical investigation is conducted, including the verification of fundamental properties such as positivity and boundedness of the system. The existence and uniqueness of the solutions are rigorously established using the Banach fixed-point theorem. The model exhibits two equilibrium states whose global stability is thoroughly analyzed. To incorporate the stochastic behavior of networked systems, such as fluctuating traffic, random user activity, and unpredictable system responses, the fractional computer virus model is extended into a stochastic fractional computer virus model by introducing white noise terms. Unlike previous studies, which often neglect the combined impact of stochasticity and memory, this research provides a rigorous treatment of both, ensuring the unique solvability of the stochastic fractional computer virus model. A Grunwald–Letnikov-based nonstandard finite difference scheme is developed to obtain reliable numerical approximations of the model while preserving essential qualitative features such as solution positivity and boundedness. Numerical simulations, based on realistic test scenarios, support the theoretical findings and illustrate the complex dynamics introduced by both fractional-order behavior and stochastic influences. This study provides a robust and realistic framework for understanding and predicting the spread of computer viruses in complex digital environments.
A Numerical Study Based on Haar Wavelet Collocation Methods of Fractional-Order Antidotal Computer Virus Model
Computer networks can be alerted to possible viruses by using kill signals, which reduces the risk of virus spreading. To analyze the effect of kill signal nodes on virus propagation, we use a fractional-order SIRA model using Caputo derivatives. In our model, we show how a computer virus spreads in a vulnerable system and how it is countered by an antidote. Using the Caputo operator, we fractionalized the model after examining it in deterministic form. The fixed point theory of Schauder and Banach is applied to the model under consideration to determine whether there exists at least one solution and whether the solution is unique. In order to calculate the approximate solution to the model, a general numerical algorithm is established primarily based on Haar collocations and Broyden’s method. In addition to being mathematically fast, the proposed method is also straightforward and applicable to different mathematical models.
Analysis of computer virus propagation behaviors over complex networks: a case study of Oregon routing network
This paper mainly aims to explore the propagation behaviors of computer virus over complex networks under the combined effects of network topology and removable storage media. To this end, a dynamical model is established and analyzed theoretically, including the outbreak threshold, equilibria and their global dynamics. It is found from the systematic analysis that the virus will die out or persist in the network depending on the outbreak threshold, which is associated with the network topology and removable storage media. Moreover, a set of well-designed experiments are performed over the Oregon routing network to verify the proposed model and its theoretical analysis results. Experimental results show that the predicted results of the model are in good agreement with the simulation results over the above network, and the removable storage media have a great effect on viral spread. To this regard, some preventive measures against virus infection are recommended.
Rules of engagement
\"Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war.\"-- Publisher's description.
Computer Network Security Based on Prevention and Control of Network Virus
With the advent of the 21st century and the rapid development of science and technology, the concept of information technology (IT) penetrates into people's minds gradually. What's comes with it is the large-scale utilization of the network. It is exactly the development, continuous popularity and openness feature of the network that allow the extensive and fast spread of network virus, which has destroyed the connectivity of network resources. To solve this problem, the author explored the features of computer virus as well as the prevention and treatment to improve the computer cybersecurity.
An Investigation Through Stochastic Procedures for Solving the Fractional Order Computer Virus Propagation Mathematical Model with Kill Signals
In this study, the numerical investigations through the stochastic procedures for solving a class of fractional order (FO) computer virus propagation (CVP) mathematical model with kill signals (KS), i.e., CVP-KS is presented. The KS gets alert about those viruses, which can be infected through the computer system to decrease the virus propagation danger. The mathematical model of the CVP-KS is based on the SEIR-KS model. The focus of these investigations is to present the numerical solutions of the FO-SEIR-KS model using the sense of Levenberg–Marquardt backpropagation scheme (LMBS) together with the neural networks (NNs), i.e., LMBS-NNs. The use of the one dynamic of the other makes the model nonlinear. Three different FO values have been used to check the performances of the designed scheme for this FO-SEIR-KS nonlinear mathematical model. The statics used in this study is 80%, 10% and 10% for training, testing and certification for solving the FO-SEIR-KS nonlinear mathematical model. The numerical simulations are performed through the stochastic LMBS-NNs scheme for solving the FO-SEIR-KS nonlinear mathematical model. The obtained results will be compared with the design of database reference solutions based on the Adams–Bashforth–Moulton. In order to accomplish the validity, capability, consistency, competence and accuracy of the LMBS-NNs, the numerical results using the error histograms, regression, mean square error, state transitions and correlation have been provided.