Effect of anti-malware software on infectious nodes in cloud environment
暂无分享,去创建一个
[1] W. O. Kermack,et al. Contributions to the mathematical theory of epidemics—II. The problem of endemicity , 1991, Bulletin of mathematical biology.
[2] J. B. Shukla,et al. Modeling and analysis of the effects of antivirus software on an infected computer network , 2014, Appl. Math. Comput..
[3] Anupama Sharma,et al. Modeling and analysis of effects of awareness programs by media on the spread of infectious diseases , 2011, Math. Comput. Model..
[4] J. Watmough,et al. Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. , 2002, Mathematical biosciences.
[5] Ashraf A. Shahin. Polymorphic Worms Collection in Cloud Computing , 2014, ArXiv.
[6] Engin Kirda,et al. A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).
[7] Anupama Sharma,et al. Capturing the interplay between malware and anti-malware in a computer network , 2014, Appl. Math. Comput..
[8] Yunkai Zhang,et al. Stability analysis of an e-SEIAR model with point-to-group worm propagation , 2015, Commun. Nonlinear Sci. Numer. Simul..
[9] William H. Sanders,et al. Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment , 2010, SafeConfig '10.
[10] David Hutchison,et al. Malware analysis in cloud computing: Network and system characteristics , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[11] W. O. Kermack,et al. Contributions to the Mathematical Theory of Epidemics. II. The Problem of Endemicity , 1932 .
[12] Paul D. Ezhilchelvan,et al. Evaluating the Probability of Malicious Co-Residency in Public Clouds , 2017, IEEE Transactions on Cloud Computing.
[13] Benny Rochwerger,et al. Scalable Cloud Defenses for Detection, Analysis and Mitigation of DDoS Attacks , 2010, Future Internet Assembly.
[14] Ralf Steinmetz,et al. Threat as a Service?: Virtualization's Impact on Cloud Security , 2012, IT Professional.
[15] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[16] Athanasios V. Vasilakos,et al. Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..
[17] Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[18] José Roberto Castilho Piqueira,et al. Dynamic models for computer viruses , 2008, Comput. Secur..
[19] Bimal Kumar Mishra,et al. Effect of anti-virus software on infectious nodes in computer network: A mathematical model , 2012 .
[20] Jianxin Li,et al. CyberGuarder: A virtualization security assurance architecture for green cloud computing , 2012, Future Gener. Comput. Syst..
[21] Dan C. Marinescu,et al. Cloud Computing: Theory and Practice , 2013 .
[22] Mark Coates,et al. Epidemiological Modelling of Peer-to-Peer Viruses and Pollution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[23] Stefan Katzenbeisser,et al. Detecting Computer Worms in the Cloud , 2011, iNetSeC.
[24] Bimal Kumar Mishra,et al. A mathematical model for a distributed attack on targeted resources in a computer network , 2014, Commun. Nonlinear Sci. Numer. Simul..
[25] Bimal Kumar Mishra,et al. Mathematical model on the transmission of worms in wireless sensor network , 2013 .
[26] Navnit Jha,et al. SEIQRS model for the transmission of malicious objects in computer network , 2010 .
[27] Bimal Kumar Mishra,et al. Dynamic model of worm propagation in computer network , 2014 .
[28] David Hutchison,et al. Towards a Distributed, Self-organising Approach to Malware Detection in Cloud Computing , 2013, IWSOS.