Mathematical Models for Malware Propagation

Rey, Ángel Martín del; Yang, Lu-Xing; Karyotis, Vasileios A.
January 2019
Security & Communication Networks;1/2/2019, p1
Academic Journal
The article examines the design and computational implementation of mathematical models for simulating propagation of malware. Y. Yao and colleagues proposed a time-delayed worm propagation model which examined a variable infection rate. A computer virus propagation model was presented by C. Zhang to know the mechanism of computer virus propagation.


Related Articles

  • Research on the Model of Distributed Trojan Horses Cooperative Concealment. LIU Lan; YUAN Dao-hua // International Proceedings of Computer Science & Information Tech;2012, Vol. 50, p175 

    The concealing technology of Trojan horses which determines the concealing capability and the life cycle of Trojan is one of the most important technologies in Trojan horse. This paper puts forward a model of distributed Trojan Horses cooperative concealment. This model can reflect the variation...

  • Trust Model Based on P2P Network. Ouyang Guang; Chen Xiang // Journal of Networks;Sep2013, Vol. 8 Issue 9, p2013 

    In order to change the defect of traditional trust model, the research on trust model based on P2P network is proposed in this paper. It is based on the theoretical characteristic of P2P network and analyzes the trust mechanism and application model and set up a kind of new trust model. This...

  • Mathematical simulation of containment of molten fuel in the vessel of fast reactor under conditions of heavy accident: Results of calculation using the BRUT computer codes. Kashcheev, M.; Kuznetsov, I. // High Temperature;Oct2009, Vol. 47 Issue 5, p731 

    The developed numerical model is realized in the form of BRUT computer codes. Individual blocks of the computer codes are verified. The BRUT computer codes are used for performing numerical investigation of containment of molten fuel in the vessel of a fast reactor under conditions of...

  • URAV Simulation Training System Based on Aerosim and Google Earth. Zengyan Li; Xiaomin Li; Junwei Lv; Yingsong Li // Journal of Signal & Information Processing;May2012, Vol. 3 Issue 2, p169 

    In order to solve the difficulties of traditional simulation training method on unmanned reconnaissance aerial vehicle, such as the low environment fidelity, difficulty of modeling and long cycle of development, a simulation training method based on Google Earth is put forward. The 6-DOF motion...

  • A Practical Guide for the Creation of Random Number Sequences from Aggregated Correlation Data for Multi-Agent Simulations. Nissen, Volker; Saft, Danilo // Journal of Artificial Societies & Social Simulation;Oct2014, Vol. 17 Issue 4, p1 

    This article describes a scalable way to initialise a simulation model with correlated random numbers. The focus is on the nontrivial issue of creating predefined multidimensional correlations amongst those numbers. A multi-agent model serves as a basis for practical demonstrations in this...

  • Unified Series-Shunt Compensator for PQ Analysis using Dynamic Phasor Modeling and EMT Simulation. Hannan, M. A.; Mohamed, Azah; Hussain, Aini // AIP Conference Proceedings;6/17/2010, Vol. 1247 Issue 1, p122 

    Modeling of unified series-shunt compensator (USSC) and its PQ analysis of a simple test system is simulated based on dynamic phasor model and EMT program. Its aim is to investigate the overall efficiency of USSC for power quality (PQ) analysis and results will be compared with EMTP like...

  • RESULTS OF THE 2009 UT MODELING BENCHMARK OBTAINED WITH CIVA: RESPONSES OF NOTCHES, SIDE-DRILLED HOLES AND FLAT-BOTTOM HOLES OF VARIOUS SIZES. Raillon, R.; Bey, S.; Dubois, A.; Mahaut, S.; Darmon, M. // AIP Conference Proceedings;2/22/2010, Vol. 1211 Issue 1, p2157 

    This communication presents the results obtained on the configurations proposed in the 2009 UT modelling benchmark with the ultrasonic models implemented in the CIVA software platform. The aim, this year, is to study the relative amplitudes and the shapes of specular and corner echoes for...

  • RADIOGRAPHIC BENCHMARK PROBLEM 2009—SCATTER CALCULATIONS IN MODELLING. Jaenisch, G.-R.; Bellon, C.; Schumm, A.; Tabary, J.; Duvauchelle, Ph. // AIP Conference Proceedings;2/22/2010, Vol. 1211 Issue 1, p2117 

    Code Validation is a permanent concern in computer simulation, and has been addressed repeatedly in eddy current and ultrasonic modelling. A good benchmark problem is sufficiently simple to be taken into account by various codes without strong requirements on geometry representation...

  • Using algebraic models of programs for detecting metamorphic malwares. Podlovchenko, R.; Kuzyurin, N.; Shcherbina, V.; Zakharov, V. // Journal of Mathematical Sciences;Feb2011, Vol. 172 Issue 5, p740 

    Polymorphic and metamorphic viruses are the most sophisticated malicious programs that give a lot of trouble to virus scanners. Each time when these viruses infect new executables or replicate themselves, they completely modify (obfuscate) their signature to avoid being detected. This...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics