Towards understanding the effectiveness of patch injection
暂无分享,去创建一个
[1] Xiaofan Yang,et al. The effect of infected external computers on the spread of viruses: A compartment modeling study , 2013 .
[2] Yamir Moreno,et al. Effects of delayed recovery and nonuniform transmission on the spreading of diseases in complex networks , 2012, Physica A: Statistical Mechanics and its Applications.
[3] Fu-xiang Gao,et al. Analysis of a Delayed Internet Worm Propagation Model with Impulsive Quarantine Strategy , 2014 .
[4] Shouhuai Xu,et al. A Stochastic Model of Active Cyber Defense Dynamics , 2015, Internet Math..
[5] Jacob Goldenberg,et al. Distributive immunization of networks against viruses using the ‘honey-pot’ architecture , 2005 .
[6] Xiaofan Yang,et al. The impact of patch forwarding on the prevalence of computer virus: A theoretical assessment approach , 2017 .
[7] Xinchu Fu,et al. SPREADING DYNAMICS OF A DISEASE-AWARENESS SIS MODEL ON COMPLEX NETWORKS , 2013 .
[8] Lu-Xing Yang,et al. A Novel Virus-Patch Dynamic Model , 2015, PloS one.
[9] Jonathan Rodriguez,et al. Fundamentals of 5G Mobile Networks , 2015 .
[10] Matthias Dehmer,et al. Interplay between SIR-based disease spreading and awareness diffusion on multiplex networks , 2018, J. Parallel Distributed Comput..
[11] Albert-László Barabási,et al. Statistical mechanics of complex networks , 2001, ArXiv.
[12] Shouming Zhong,et al. Web malware spread modelling and optimal control strategies , 2017, Scientific Reports.
[13] Lu-Xing Yang,et al. Heterogeneous virus propagation in networks: a theoretical study , 2017 .
[14] Shouhuai Xu,et al. Adaptive Epidemic Dynamics in Networks , 2013, ACM Trans. Auton. Adapt. Syst..
[15] Lu-Xing Yang,et al. The Impact of the Network Topology on the Viral Prevalence: A Node-Based Approach , 2015, PloS one.
[16] Lu-Xing Yang,et al. The pulse treatment of computer viruses: a modeling study , 2014 .
[17] Chao Li,et al. Identification of influential spreaders based on classified neighbors in real-world complex networks , 2018, Appl. Math. Comput..
[18] Quanyan Zhu,et al. Strategic Trust in Cloud-Enabled Cyber-Physical Systems With an Application to Glucose Control , 2017, IEEE Transactions on Information Forensics and Security.
[19] Shouhuai Xu,et al. A Stochastic Model of Multivirus Dynamics , 2012, IEEE Transactions on Dependable and Secure Computing.
[20] Hongyong Zhao,et al. Dynamical behaviours and control measures of rumour-spreading model with consideration of network topology , 2017, Int. J. Syst. Sci..
[21] Kathleen M. Carley,et al. The impact of countermeasure propagation on the prevalence of computer viruses , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[22] Steve R. White,et al. Computers and epidemiology , 1993, IEEE Spectrum.
[23] Xiaoying Gan,et al. An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats , 2019, IEEE Transactions on Information Forensics and Security.
[24] Wanlei Zhou,et al. To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[25] Steve Mansfield-Devine. Leaks and ransoms - the key threats to healthcare organisations , 2017, Netw. Secur..
[26] Jianguo Ren,et al. A compartmental model to explore the interplay between virus epidemics and honeynet potency , 2018, Applied Mathematical Modelling.
[27] Yong Deng,et al. Identifying influential nodes in complex networks: A node information dimension approach. , 2018, Chaos.
[28] Xiaoming Wang,et al. Bifurcation analysis of a delay reaction-diffusion malware propagation model with feedback control , 2015, Commun. Nonlinear Sci. Numer. Simul..
[29] Yuan Yan Tang,et al. Defending against the Advanced Persistent Threat: An Optimal Control Approach , 2018, Secur. Commun. Networks.
[30] R. Robinson,et al. An Introduction to Dynamical Systems: Continuous and Discrete , 2004 .
[31] Lu-Xing Yang,et al. A mixing propagation model of computer viruses and countermeasures , 2013 .
[32] P. Van Mieghem,et al. Virus Spread in Networks , 2009, IEEE/ACM Transactions on Networking.
[33] Yuan Yan Tang,et al. Security Evaluation of the Cyber Networks Under Advanced Persistent Threats , 2017, IEEE Access.
[34] Jianguo Ren,et al. A compartmental model for computer virus propagation with kill signals , 2017 .
[35] Yuan Yan Tang,et al. A Bi-Virus Competing Spreading Model with Generic Infection Rates , 2018, IEEE Transactions on Network Science and Engineering.
[36] Manisha Patil,et al. A brief study of Wannacry Threat: Ransomware Attack 2017 , 2017 .
[37] Haiyan Wang,et al. Complex dynamic behavior of a rumor propagation model with spatial-temporal diffusion terms , 2016, Inf. Sci..
[38] Liguo Fei,et al. A new method to identify influential nodes based on relative entropy , 2017 .
[39] Yuan Yan Tang,et al. On the competition of two conflicting messages , 2018 .
[40] K B Blyuss,et al. Mathematical model for the impact of awareness on the dynamics of infectious diseases. , 2017, Mathematical biosciences.
[41] Sudip Samanta,et al. Awareness programs control infectious disease - Multiple delay induced mathematical model , 2015, Appl. Math. Comput..
[42] Peter Szor,et al. The Art of Computer Virus Research and Defense , 2005 .
[43] H. Vincent Poor,et al. Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study , 2017, IEEE Journal on Selected Areas in Communications.
[44] Anupama Sharma,et al. Capturing the interplay between malware and anti-malware in a computer network , 2014, Appl. Math. Comput..
[45] Azzedine Boukerche. Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .
[46] Wanlei Zhou,et al. A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks , 2015, IEEE Transactions on Computers.
[47] Hongyong Zhao,et al. Dynamic Analysis of a Reaction-Diffusion Rumor Propagation Model , 2016, Int. J. Bifurc. Chaos.