A real-time sequential deep extreme learning machine cybersecurity intrusion detection system

A Haider, M Adnan Khan, A Rehman… - Computers …, 2021 - publications.polymtl.ca
In recent years, cybersecurity has attracted significant interest due to the rapid growth of the
Internet of Things (IoT) and the widespread development of computer infrastructure and …

Security countermeasures of a SCIRAS model for advanced malware propagation

JDH Guillen, AM Del Rey, R Casado-Vara - IEEE Access, 2019 - ieeexplore.ieee.org
In the new and sophisticated cyber attacks (mainly, advanced persistent threats) the
advanced specimens of malware such that zero-day malware play a crucial role. Due to its …

Numerical treatment for stochastic computer virus model

A Raza, MS Arif, M Rafiq, M Bibi… - … in Engineering & …, 2019 - ingentaconnect.com
This writing is an attempt to explain a reliable numerical treatment for stochastic computer
virus model. We are comparing the solutions of stochastic and deterministic computer virus …

Numerical modeling of susceptible latent breaking-out quarantine computer virus epidemic dynamics

U Fatima, M Ali, N Ahmed, M Rafiq - Heliyon, 2018 - cell.com
This work is concerned with the numerical modeling of susceptible-latent-breakingout-
quarantine-susceptible (SLBQRS) computer virus dynamics. The SLBQRS epidemic system …

[PDF][PDF] Numerical simulations for stochastic computer virus propagation model

MS Arif, A Raza, M Rafiq, M Bibi, JN Abbasi… - Comput. Mater …, 2020 - researchgate.net
We are presenting the numerical simulations for the stochastic computer virus propagation
model in this manuscript. We are comparing the solutions of stochastic and deterministic …

[PDF][PDF] A Stochastic Numerical Analysis for Computer Virus Model with Vertical Transmission Over the Internet.

MS Arif, A Raza, W Shatanawi, M Rafiq… - Computers, Materials & …, 2019 - researchgate.net
A Stochastic Numerical Analysis for Computer Virus Model with Vertical Transmission Over the
Internet Page 1 Computers, Materials & Continua CMC, vol.61, no.3, pp.1025-1043, 2019 …

SIHQR model with time delay for worm spread analysis in IIoT-enabled PLC network

G Wu, Y Zhang, H Zhang, S Yu, S Yu, S Shen - Ad Hoc Networks, 2024 - Elsevier
Abstract Industrial Internet of Things (IIoT) is a product of deep integration between Internet
of Things (IoT) and industrial control networks. As an important component of IIoT …

Malware propagation in clustered computer networks

JRC Piqueira, MAM Cabrera, CM Batistela - Physica A: Statistical …, 2021 - Elsevier
Previous studies have been dedicated to strategies for combating malware propagation in
data networks. One method to combat these deleterious actions is to establish preventive …

SIR1R2: Characterizing Malware Propagation in WSNs With Second Immunization

X Ye, S Xie, S Shen - IEEE Access, 2021 - ieeexplore.ieee.org
As an infrastructure of Internet of Things, WSNs (Wireless Sensor Networks) play a more and
more important role. However, WSNs are vulnerable to malware and malware can destroy …

Mathematical analysis of the effectiveness of control strategies to prevent the autorun virus transmission propagation

KS Kim, MM Ibrahim, IH Jung, S Kim - Applied Mathematics and …, 2020 - Elsevier
In this work, a deterministic model for autorun computer virus propagation is presented and
discussed. Two new control parameters; vaccination rate and perfect recovery rate are …