A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Evaluating the Performance of a Static Patching Strategy against Computer Viruses
2020
Complexity
On this basis, we evaluate the performances of a few static patching strategies. Finally, we examine the influences of a few parameters on the performance of a static patching strategy. ...
A static patching strategy consists of a fixed patch injection rate and a fixed patch forwarding rate. This paper focuses on evaluating the performance of a static patching strategy. ...
Next, we evaluate the performances of a few static patching strategies. Finally, we examine the e ects of a few parameters on the performance of a static patching strategy. ...
doi:10.1155/2020/9408942
fatcat:bzavvv4jhfc5rik2esvsholgia
Exploiting temporal complex network metrics in mobile malware containment
2011
2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
Then we introduce a time-aware containment strategy that spreads a patch message starting from nodes with high temporal closeness centrality and show its effectiveness using three real-world datasets. ...
the same time, a complete containment of the malware in a limited amount of time. ...
ACKNOWLEDGEMENTS The authors thank our shepherd Stratis Ioannidis and the anonymous reviewers for their insightful comments which have helped in significantly improving our paper. ...
doi:10.1109/wowmom.2011.5986463
dblp:conf/wowmom/TangMML11
fatcat:nokhf7zhhfes7hcyin4zzpwuka
Applications of Temporal Graph Metrics to Real-World Networks
[chapter]
2013
Understanding Complex Systems
of a virus depends on the network of human contacts throughout the day. ...
Firstly, we analyse the roles of key individuals of a corporate network ranked according to temporal centrality within the context of a bankruptcy scandal; secondly, we present how such temporal metrics ...
Acknowledgements This work was funded in part through EPSRC Project MOLTEN (EP/I017321/1) and the EU LASAGNE Project, Contract No.318132 (STREP). ...
doi:10.1007/978-3-642-36461-7_7
fatcat:hp7ljutoenab3gimev4btwxrfm
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention
[chapter]
2013
IFIP Advances in Information and Communication Technology
Lastly, as a way of illustration, we apply our models on the well studied Code-Red worm. L.J. Janczewski, H. ...
We also propose a cost-benefit model that describes optimal strategies the defender could follow when cost is taken into account. ...
Malware includes a variety of malicious software such as computer viruses, worms, trojan horses, key-loggers and many others. ...
doi:10.1007/978-3-642-39218-4_3
fatcat:pxz3vaqr3rh7latw3rq73ef354
Execution transactions for defending against software failures: use and evaluation
2006
International Journal of Information Security
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. ...
Our performance benchmarks indicate a slow-down of 20% for Apache in full-protection mode, and 1.2% with selective protection. ...
Cohen was the first to define and describe computer viruses in their present form. In [19] , he gave a theoretical basis for the spread of computer viruses. ...
doi:10.1007/s10207-006-0083-6
fatcat:6wtsvxahznbill35gog3pjm4lm
Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach
[article]
2016
arXiv
pre-print
We prove that the patching rate required to remove all viruses is bounded above by the passivity index of the coupled system, and formulate the problem of selecting the minimum-cost mitigation strategy ...
When the propagation dynamics are unknown or uncertain, however, the static rate that is chosen may be either insufficient to remove all viruses or too high, incurring additional performance cost. ...
of the viruses while minimizing performance overhead. ...
arXiv:1603.04374v2
fatcat:am2pto5ohjb67pjrrmn6zpqfu4
STOP: Socio-Temporal Opportunistic Patching of short range mobile malware
2012
2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
An alternative and more efficient strategy is to distribute the patch to the key nodes so that they can opportunistically disseminate it to the rest of the network via short range encounters; but how can ...
manner and report to a central server which processes and targets delivery of hot fixes to a small subset of k devices at runtime; in turn mobile devices spread the patch opportunistically. ...
be devised to predict the best devices to start spreading a patch (see Sections III-B & III-C). • We evaluate node selection based on temporal closeness centrality against those founded on static closeness ...
doi:10.1109/wowmom.2012.6263711
dblp:conf/wowmom/TangKMM12
fatcat:72itt74dt5fljhfpc3mv4lylue
Analysis and detection of computer viruses and worms
2002
SIGPLAN notices
This annotated bibliography reviews research in analyzing and detecting computer viruses and worms. ...
This paper proposes two heuristic tools the use static analysis and verification techniques for detecting computer viruses in a UNIX environment. ...
The paper defines Worms and Viruses. It discusses the flaws in computer systems that were exploited by the Worm to spread across the Internet. Patches to these flaws are also discussed. ...
doi:10.1145/568600.568608
fatcat:twubnev3czhv3djwf6ua2ygrii
A Study of Malcode-Bearing Documents
[chapter]
2007
Lecture Notes in Computer Science
We investigate the possibility of detecting embedded malcode in Word documents using two techniques: static content analysis using statistical models of typical document content, and run-time dynamic tests ...
Such attacks can be very selective and difficult to detect compared to the typical network worm threat, owing to the complexity of these applications and data formats, as well as the multitude of document-exchange ...
However, instead of computing a set of centroid models, they compute a single representative fingerprint for the entire class. This strategy may be unwise. ...
doi:10.1007/978-3-540-73614-1_14
fatcat:r4xyai2zyvcmpezufyi4chujye
Nanoparticle Classification Using Frequency Domain Analysis on Resource-Limited Platforms
2019
Sensors
A biosensor called PAMONO (for Plasmon Assisted Microscopy of Nano-sized Objects) represents a viable technology for mobile real-time detection of viruses and virus-like particles. ...
A mobile system that can detect viruses in real time is urgently needed, due to the combination of virus emergence and evolution with increasing global travel and transport. ...
The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results. ...
doi:10.3390/s19194138
fatcat:bqougau7d5am3cknpx7g5nh4qa
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention
2015
Information Security Journal
A game theoretical method for cost-benefit analysis of malware dissemination prevention. ...
Acknowledgments The authors would like to express their appreciation to the anonymous reviewers for their valuable comments and suggestions. ...
As a static game, each player has a pre-computed move list (each move denoted as a strategy) from which the best move is chosen to maximise their personal benefit. ...
doi:10.1080/19393555.2015.1092186
fatcat:qx5rdr6g5bak7pugchm6cvcqcy
Implementation of the QoS framework using fog computing to predict COVID-19 disease at early stage
2021
World Journal of Engineering
The machine learning algorithms are used to evaluate the past medical details of the patients and forecast COVID-19 positive cases, which can aid in lowering costs and distinctively enhance the standard ...
Findings The performance of the framework is checked with various quality of service parameters such as delay, network usage, RAM usages and energy consumption, whereas classification accuracy, recall, ...
Proposed framework evaluation iFogSim is chosen as a test-bed for performance evaluation of the proposed framework. It uses the libraries of CloudSim to perform the simulation. ...
doi:10.1108/wje-12-2020-0636
fatcat:d6dpmt3rgzarlpde5szaisilgq
An Efficient Approach towards Assessment of Zero-day Attacks
2019
International Journal of Computer Applications
It's very challenging to protect against zero-day attack yet sometime defense can't distinguish because of unknown signature and it performs action. ...
The biggest threat to the security of any organization is a zero-day attack, a large portion of the most significant organizations don't have a clue or notice the attack and thus, the contamination spread ...
The IDS/IPS module performs significant profound packets evaluation and names the stream whether it has a spot with some risk. ...
doi:10.5120/ijca2019919742
fatcat:2z52ldm2xbfflitsvchmp2oxfm
Enabling Technologies of Cyber Crime: Why Lawyers Need to Understand It
2011
Pittsburgh Journal of Technology Law and Policy
It demonstrates the translation of traditional legal principles to a novel technological environment in a way that preserves their meaning and policy rationale. ...
This Article discusses the enabling technologies of cyber crime and analyzes their role in the resolution of related legal issues. ...
& ZELTSER, supra note 38, at 84-87; JOSE NAZARIO, DEFENSES AND STRATEGIES AGAINST
INTERNET WORMS 14 (2004). ...
doi:10.5195/tlp.2011.62
fatcat:c4onmpf7b5c4haish3kx75xpum
Malware Containment Using Weight based on Incremental PageRank in Dynamic Social Networks
2015
KSII Transactions on Internet and Information Systems
A graph is formed to analyze the structure of a social network, and subgroups are formed in the graph for the distributed patch strategy. ...
In this paper, an effective patch strategy is proposed to deal with malicious worms based on social networks. ...
performance evaluation, and experiments on the infected rate through a patch for the methods. ...
doi:10.3837/tiis.2015.01.026
fatcat:6nr4txa2w5elfiskdwo2gagdqa
« Previous
Showing results 1 — 15 out of 2,201 results