In the new and sophisticated cyber attacks (mainly, advanced persistent threats) the advanced specimens of malware such that zero-day malware play a crucial role. Due to its …
LX Yang, M Draief, X Yang - Physica A: Statistical Mechanics and its …, 2016 - Elsevier
Dynamic immunizations, under which the state of the propagation network of electronic viruses can be changed by adjusting the control measures, are regarded as an alternative to …
T Dong, X Liao, H Li - Abstract and Applied Analysis, 2012 - Wiley Online Library
By considering that people may immunize their computers with countermeasures in susceptible state, exposed state and using anti‐virus software may take a period of time, a …
N Keshri, BK Mishra - Chaos, Solitons & Fractals, 2014 - Elsevier
Deployed in a hostile environment, motes of a Wireless sensor network (WSN) could be easily compromised by the attackers because of several constraints such as limited …
T Zhang, LX Yang, X Yang, Y Wu, YY Tang - Physica A: Statistical …, 2017 - Elsevier
Alerting at the early stage of malware invasion turns out to be an important complement to malware detection and elimination. This paper addresses the issue of how to dynamically …
RK Upadhyay, S Kumari - International Journal of Computer …, 2018 - Taylor & Francis
In this paper, we have formulated an e-epidemic energy efficient susceptible-infected– terminally infected-recovered (SITR) model to analyse the attacking behaviour of worms in …
Y Yao, Q Fu, W Yang, Y Wang… - Security and …, 2018 - Wiley Online Library
With rapid development of Internet, network security issues become increasingly serious. Temporary patches have been put on the infectious hosts, which may lose efficacy on …
LX Yang, X Yang - Discrete Dynamics in Nature and Society, 2012 - Wiley Online Library
All the known models describing the propagation of virus codes were based on the assumption that a computer is uninfected at the time it is being connected to the Internet. In …
T Dong, A Wang, X Liao - Applied Mathematical Modelling, 2016 - Elsevier
In this paper, by considering the development of antivirus software always lags behind the emergence of new virus and the point-to-group information propagation mode, a new …