Predicting Spread Probability of Learning‐Effect Computer Virus

WC Yeh, E Lin, CL Huang - Complexity, 2021 - Wiley Online Library
With the rapid development of network technology, computer viruses have developed at a
fast pace. The threat of computer viruses persists because of the constant demand for …

[PDF][PDF] Cyber Attack Link Formation in a Network

S Rawther, S Sathyalakshmi - International Journal of Engineering …, 2023 - researchgate.net
The threat of cyber-attacks has become a major concern for organizations of all sizes. The
linkage between different components is an important factor in detecting and mitigating …

Entropy Analysis of Cyber-Attack Propagation in Network

S Rawther, S Sathyalakshmi - 2022 13th International …, 2022 - ieeexplore.ieee.org
The cyber-attack propagates in a network by forming the attack link with other nodes.
Though the choice of forming link is probabilistic, at equilibrium there is a tendency to form a …

Evolutionary virus immune strategy for temporal networks based on community vitality

M Li, C Fu, XY Liu, J Yang, T Zhu, L Han - Future Generation Computer …, 2017 - Elsevier
Preventing viruses spreading in networks is a hot topic. Existing immune strategies are
mainly designed for static networks, which become ineffective for temporal networks. In this …

Search engine: A hidden power for virus propagation in community networks

J Yang, C Fu, D Xu, L Han… - 2015 IEEE 2nd …, 2015 - ieeexplore.ieee.org
The propagation methods of viruses are diverse and studying the virus propagation is a hot
topic. There appears a new way that the search engine quickly spreads network viruses, and …

[PDF][PDF] Propagation of Cyber-Attacks in Computer Network: A simulation study

S Rawther, S Sathyalakshmi - Available at SSRN 4210706, 2022 - papers.ssrn.com
The propagation of attacks of malicious objects in the computer network can be realized like
the spreading of epidemic diseases such that each node of the complex computer network …

[PDF][PDF] Entropy of a Computer Network Under Propagation of Cyber-Attacks

S Rawther, S Sathyalakshmi - researchgate.net
With the increasing reliance on computer networks for critical infrastructure and information
exchange, the security of these networks has become a paramount concern. Cyber-attacks …

A Coarse-to-Fine Method for Near-Duplicate Image Retrieval with Matching Probability Model

J Shi, Y Ma, H Zhou - 2017 International Conference on Green …, 2017 - ieeexplore.ieee.org
Image retrieval has attracted increasing interests in recent years. This paper proposes a
coarse-to-fine method for fast indexing with marching probability model. We first use a vector …