To see the other types of publications on this topic, follow the link: Computer viruses. Cyberterrorism. Computer networks.

Journal articles on the topic 'Computer viruses. Cyberterrorism. Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer viruses. Cyberterrorism. Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Klebanov, Lev R., and Svetlana V. Polubinskaya. "COMPUTER TECHNOLOGIES FOR COMMITTING SABOTAGE AND TERRORISM." RUDN Journal of Law 24, no. 3 (December 15, 2020): 717–34. http://dx.doi.org/10.22363/2313-2337-2020-24-3-717-734.

Full text
Abstract:
The article discusses the problems that arise in connection with the crimes against state and public security committed by use of computer and network technologies. This topic is becoming relevant because some states have already experienced the effects of combat computer viruses, which can be regarded as waging war using cyber weapons. The most famous example is the attack by the Stuxnet computer virus on an Iranian uranium enrichment plant. The virus was created specifically to disable industrial control systems. The use of unmanned ground and air vehicles to carry out terrorist acts is of particular danger. The Russian military in Syria is constantly confronted with terrorist attacks: the Khmeimim aerospace forces base is regularly attacked with unmanned air vehicles - drones. Terrorist acts with the use of computer and network technologies are no less dangerous. The destructive potential of cyberterrorism is determined by the widespread computerization of state and public life, the implementation of projects to create smart cities, including smart transportation, as well as the intensive development of the Internet of things. The purpose of the article is to analyze new criminal threats to state and public security, as well as to study high-tech ways of committing crimes such as sabotage, terrorist acts, and other crimes of a terrorist nature. The cost of their consequences for society is very high, and criminals do not always need to attack social objects directly - it is enough to spread panic among the population using online media, social networks and websites of authorities of various levels, after obtaining illegal access to them. The article describes some of the techniques already used to commit crimes of sabotage and terrorism. The authors draw attention to the priority of cybersecurity both for engineers of devices with elements of artificial intelligence, and for lawmakers who should pay attention to methods of technical forecasting when developing legal norms aimed at prevention of new ways of committing such crimes. When writing the article, the authors used a wide range of Russian and foreign sources of legal, statistical, sociological and other information. The authors used such research methods as analysis, synthesis, deduction, induction, formal legal method as well as comparative legal method.
APA, Harvard, Vancouver, ISO, and other styles
2

Schöneburg, E. "Neural networks hunt computer viruses." Neurocomputing 2, no. 5-6 (July 1991): 243–48. http://dx.doi.org/10.1016/0925-2312(91)90027-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grover, Derrick. "Computer viruses." Computer Law & Security Review 8, no. 1 (January 1992): 30–31. http://dx.doi.org/10.1016/0267-3649(92)90122-p.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

FitzGerald, Jerry. "Detecting Computer Viruses." EDPACS 16, no. 9 (March 1989): 1–6. http://dx.doi.org/10.1080/07366988909450532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Górka, Marek. "Wybrane aspekty definicyjne cyberterroryzmu i ich znaczenie w perspektywie polityki bezpieczeństwa." Cywilizacja i Polityka 15, no. 15 (October 26, 2017): 295–315. http://dx.doi.org/10.5604/01.3001.0010.5473.

Full text
Abstract:
Cyberterrorism creates serious and rapidly growing threats to society and the critical infrastructure of the state. This creates significant changes in the prevention and fight against terrorism. The digital world in which society is lived provides a wide range of opportunities for cybercrime as it initiates and encourages the use of hidden Internet capabilities. Cyberterrorism is a crime that is directed against the state and its citizens. Currently, computer networks are at risk and are attacked daily due to inter alia. The inability to maintain dynamic development of web services and widely available hacking tools and techniques. This is the most difficult challenge in the fight against cyberterrorism. However, the term itself is often misused and abused. Understanding the dangers of cyberterrorism must begin with a clear definition of its definition.
APA, Harvard, Vancouver, ISO, and other styles
6

Balthrop, J. "COMPUTER SCIENCE: Technological Networks and the Spread of Computer Viruses." Science 304, no. 5670 (April 23, 2004): 527–29. http://dx.doi.org/10.1126/science.1095845.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Shah, Devavrat, and Tauhid Zaman. "Detecting sources of computer viruses in networks." ACM SIGMETRICS Performance Evaluation Review 38, no. 1 (June 12, 2010): 203–14. http://dx.doi.org/10.1145/1811099.1811063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fan, W., and K. H. Yeung. "Online social networks—Paradise of computer viruses." Physica A: Statistical Mechanics and its Applications 390, no. 2 (January 2011): 189–97. http://dx.doi.org/10.1016/j.physa.2010.09.034.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Piqueira, Jose Roberto Castilh, Betyna Fernandez Navarro, and Luiz Henrique Alves Monteiro. "Epidemiological Models Applied to Viruses in Computer Networks." Journal of Computer Science 1, no. 1 (January 1, 2005): 31–34. http://dx.doi.org/10.3844/jcssp.2005.31.34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Highland, Harold Joseph. "Computer Viruses Can Be Deadly!" EDPACS 15, no. 12 (June 1988): 1–6. http://dx.doi.org/10.1080/07366988809450491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ford, R. "The wrong stuff? [computer viruses]." IEEE Security & Privacy Magazine 2, no. 3 (May 2004): 86–89. http://dx.doi.org/10.1109/msp.2004.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Wilding, Edward. "Computer viruses — a management overview." Computer Law & Security Review 8, no. 2 (March 1992): 66–69. http://dx.doi.org/10.1016/0267-3649(92)90090-v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Yang, Xiaofan, and Lu-Xing Yang. "Towards the Epidemiological Modeling of Computer Viruses." Discrete Dynamics in Nature and Society 2012 (2012): 1–11. http://dx.doi.org/10.1155/2012/259671.

Full text
Abstract:
Epidemic dynamics of computer viruses is an emerging discipline aiming to understand the way that computer viruses spread on networks. This paper is intended to establish a series of rational epidemic models of computer viruses. First, a close inspection of some common characteristics shared by all typical computer viruses clearly reveals the flaws of previous models. Then, a generic epidemic model of viruses, which is named as the SLBS model, is proposed. Finally, diverse generalizations of the SLBS model are suggested. We believe this work opens a door to the full understanding of how computer viruses prevail on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
14

Piqueira, José R. C., and Felipe Barbosa Cesar. "Dynamical Models for Computer Viruses Propagation." Mathematical Problems in Engineering 2008 (2008): 1–11. http://dx.doi.org/10.1155/2008/940526.

Full text
Abstract:
Nowadays, digital computer systems and networks are the main engineering tools, being used in planning, design, operation, and control of all sizes of building, transportation, machinery, business, and life maintaining devices. Consequently, computer viruses became one of the most important sources of uncertainty, contributing to decrease the reliability of vital activities. A lot of antivirus programs have been developed, but they are limited to detecting and removing infections, based on previous knowledge of the virus code. In spite of having good adaptation capability, these programs work just as vaccines against diseases and are not able to prevent new infections based on the network state. Here, a trial on modeling computer viruses propagation dynamics relates it to other notable events occurring in the network permitting to establish preventive policies in the network management. Data from three different viruses are collected in the Internet and two different identification techniques, autoregressive and Fourier analyses, are applied showing that it is possible to forecast the dynamics of a new virus propagation by using the data collected from other viruses that formerly infected the network.
APA, Harvard, Vancouver, ISO, and other styles
15

Zajac, Bernard P. "Computer viruses can they be prevented?" Computer Law & Security Review 5, no. 1 (May 1989): 18–21. http://dx.doi.org/10.1016/0267-3649(89)90167-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ahmad, Ashraf, Yousef Abu Hour, and Mahmoud H. DarAssi. "Effects of computer networks' viruses under the of removable devices." International Journal of Dynamical Systems and Differential Equations 10, no. 3 (2020): 233. http://dx.doi.org/10.1504/ijdsde.2020.10030022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ahmad, Ashraf, Yousef Abu Hour, and Mahmoud H. DarAssi. "Effects of computer networks' viruses under the of removable devices." International Journal of Dynamical Systems and Differential Equations 10, no. 3 (2020): 233. http://dx.doi.org/10.1504/ijdsde.2020.107808.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Lesko, S. A., A. S. Alyoshkin, and V. V. Filatov. "Stochastic and Percolating Models of Blocking Computer Networks Dynamics during Distribution of Epidemics of Evolutionary Computer Viruses." Russian Technological Journal 7, no. 3 (June 9, 2019): 7–27. http://dx.doi.org/10.32362/2500-316x-2019-7-3-7-27.

Full text
Abstract:
The paper presents a complex model of the dynamics of virus epidemies propagation in computer networks, based on topological properties of computer networks and mechanisms of the viruses spread. On one hand, this model is based on the use of percolation theory methods, which makes it possible to determine such structural-information characteristics of networks as the dependence of the percolation threshold on the average number of connections per one node (network density). On the other hand, the dynamic processes of stochastic propagation in computer networks of evolving viruses are observed when anti-virus programs become outdated and postponed. The paper discusses the concept of percolation threshold, provides an equation for the dependence of the percolation threshold of a network on its density obtained by analyzing numerical simulation data. The dynamics of virus epidemies were studied through two approaches. The first one is based on the description of transition diagrams between states of nodes, after which a system of kinetic differential equations for the virus epidemies is constructed. The second is based on considering the probabilities of transitions between possible states of the entire network. A second-order differential equation is obtained in this article, and a boundary value problem is formulated. Its solution describes the dependence of the network blocking probability on the blocking probability of an individual node. The solution also makes it possible to estimate the time required to reach the percolation threshold. The model incorporates the evolutionary properties of viruses: previously immunized or disinfected nodes can be infected again after a certain time interval. Besides, the model incorporates a lag of the anti-virus protection. Analysis of the solutions obtained for the models created shows the possibility of various modes of virus propagation. Moreover, with some sets of values of differential equation coefficients, an oscillating and almost periodic nature of virus epidemies is observed, which largely coincides with real observations.
APA, Harvard, Vancouver, ISO, and other styles
19

Walden, Ian. "Harmonising Computer Crime Laws in Europe." European Journal of Crime, Criminal Law and Criminal Justice 12, no. 4 (2004): 321–36. http://dx.doi.org/10.1163/1571817042523095.

Full text
Abstract:
AbstractAs the ‘Information Society’ emerges, the European economy and its citizens have become dependent on computers and communication networks. However, with the ravages of the viruses MyDoom and MS Blaster still being felt around the world, the vulnerability of computer systems and networks to criminal crime, as well as potentially terrorist activity, is still fresh in our minds. There is no agreed definition of what constitutes a ‘computer crime’. A computer may constitute the instrument of the crime, such as in murder and fraud; the object of the crime, such as the theft of processor chips; or the subject of the crime, such as ‘hacking’ or ‘cracking’. The involvement of computers may challenge traditional criminal concepts, such as fraud, as well as facilitating particular types of crime, such as child pornography. This article is concerned with the computer as the subject of the crime and with laws that have been established to specifically address activities that attack the integrity of computer and communications networks, such as the distribution of computer viruses. This article examines various initiatives to harmonise substantive criminal law to address the threat of computer integrity crimes, focusing specifically on a draft Council Framework Decision on ‘attacks against information systems’. Consideration is given to the impact the Decision may have when transposed into UK law, through an amendment of existing legislation, the Computer Misuse Act 1990.
APA, Harvard, Vancouver, ISO, and other styles
20

Bamaarouf, O., A. Ould Baba, S. Lamzabi, A. Rachadi, and H. Ez-Zahraouy. "Effects of maximum node degree on computer virus spreading in scale-free networks." International Journal of Modern Physics B 31, no. 26 (October 17, 2017): 1750182. http://dx.doi.org/10.1142/s021797921750182x.

Full text
Abstract:
The increase of the use of the Internet networks favors the spread of viruses. In this paper, we studied the spread of viruses in the scale-free network with different topologies based on the Susceptible–Infected–External (SIE) model. It is found that the network structure influences the virus spreading. We have shown also that the nodes of high degree are more susceptible to infection than others. Furthermore, we have determined a critical maximum value of node degree [Formula: see text], below which the network is more resistible and the computer virus cannot expand into the whole network. The influence of network size is also studied. We found that the network with low size is more effective to reduce the proportion of infected nodes.
APA, Harvard, Vancouver, ISO, and other styles
21

Castillo-Zúñiga, Iván, Francisco Javier Luna-Rosas, Laura C. Rodríguez-Martínez, Jaime Muñoz-Arteaga, Jaime Iván López-Veyna, and Mario A. Rodríguez-Díaz. "Internet Data Analysis Methodology for Cyberterrorism Vocabulary Detection, Combining Techniques of Big Data Analytics, NLP and Semantic Web." International Journal on Semantic Web and Information Systems 16, no. 1 (January 2020): 69–86. http://dx.doi.org/10.4018/ijswis.2020010104.

Full text
Abstract:
This article presents a methodology for the analysis of data on the Internet, combining techniques of Big Data analytics, NLP and semantic web in order to find knowledge about large amounts of information on the web. To test the effectiveness of the proposed method, webpages about cyberterrorism were analyzed as a case study. The procedure implemented a genetic strategy in parallel, which integrates (Crawler to locate and download information from the web; to retrieve the vocabulary, using techniques of NLP (tokenization, stop word, TF, TFIDF), methods of stemming and synonyms). For the pursuit of knowledge was built a dataset through the description of a linguistic corpus with semantic ontologies, considering the characteristics of cyber-terrorism, which was analyzed with the algorithms, Random Forests (parallel), Boosting, SVM, neural network, K-nn and Bayes. The results reveal a percentage of the 95.62% accuracy in the detection of the vocabulary of cyber-terrorism, which were approved through cross validation, reaching 576% time savings with parallel processing.
APA, Harvard, Vancouver, ISO, and other styles
22

Yeh, Wei-Chang, Edward Lin, and Chia-Ling Huang. "Predicting Spread Probability of Learning-Effect Computer Virus." Complexity 2021 (July 10, 2021): 1–17. http://dx.doi.org/10.1155/2021/6672630.

Full text
Abstract:
With the rapid development of network technology, computer viruses have developed at a fast pace. The threat of computer viruses persists because of the constant demand for computers and networks. When a computer virus infects a facility, the virus seeks to invade other facilities in the network by exploiting the convenience of the network protocol and the high connectivity of the network. Hence, there is an increasing need for accurate calculation of the probability of computer-virus-infected areas for developing corresponding strategies, for example, based on the possible virus-infected areas, to interrupt the relevant connections between the uninfected and infected computers in time. The spread of the computer virus forms a scale-free network whose node degree follows the power rule. A novel algorithm based on the binary-addition tree algorithm (BAT) is proposed to effectively predict the spread of computer viruses. The proposed BAT utilizes the probability derived from PageRank from the scale-free network together with the consideration of state vectors with both the temporal and learning effects. The performance of the proposed algorithm was verified via numerous experiments.
APA, Harvard, Vancouver, ISO, and other styles
23

Zhang, Chunming. "Global Behavior of a Computer Virus Propagation Model on Multilayer Networks." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/2153195.

Full text
Abstract:
This paper presents a new linear computer viruses propagation model on multilayer networks to explore the mechanism of computer virus propagation. Theoretical analysis demonstrates that the maximum eigenvalue of the sum of all the subnetworks is a vital factor in determining the viral prevalence. And then, a new sufficient condition for the global stability of virus-free equilibrium has been obtained. The persistence of computer virus propagation system has also been proved. Eventually, some numerical simulation results verify the main conclusions of the theoretical analysis.
APA, Harvard, Vancouver, ISO, and other styles
24

Zhang, Chunming, Tianliang Feng, Yun Zhao, and Guifeng Jiang. "A New Model for Capturing the Spread of Computer Viruses on Complex-Networks." Discrete Dynamics in Nature and Society 2013 (2013): 1–9. http://dx.doi.org/10.1155/2013/956893.

Full text
Abstract:
Based on complex network, this paper proposes a novel computer virus propagation model which is motivated by the traditional SEIRQ model. A systematic analysis of this new model shows that the virus-free equilibrium is globally asymptotically stable when its basic reproduction is less than one, and the viral equilibrium is globally attractive when the basic reproduction is greater than one. Some numerical simulations are finally given to illustrate the main results, implying that these results are applicable to depict the dynamics of virus propagation.
APA, Harvard, Vancouver, ISO, and other styles
25

Whitson, Roger. "Review: Jussi Parikka, Digital Contagions: A Media Archaeology of Computer Viruses." Theory, Culture & Society 34, no. 7-8 (October 27, 2017): 293–98. http://dx.doi.org/10.1177/0263276417736593.

Full text
Abstract:
The second edition of Jussi Parikka’s Digital Contagions: A Media Archaeology of Computer Viruses is both a welcome reissue of a canonical text in media archaeology and an important intervention into contemporary techno-political crises like cyberwarfare. Parikka’s book shows how viruses are central to the history of networked computing, while articulating their social connections to political, medical, and cultural discourses. For him, the notion of contagion in digital networks is inseparable from the rise of the computing security industry and the spread of what he calls ‘viral capitalism’: a system of value that leverages viral methodologies to colonize new markets and appropriate revolutionary impulses. Against the purity and commercialism of contemporary consumer electronics, Digital Contagions instead looks to the experiments of early viral programming as offering alternative histories of digital media.
APA, Harvard, Vancouver, ISO, and other styles
26

Qin, Peng. "Analysis of a Model for Computer Virus Transmission." Mathematical Problems in Engineering 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/720696.

Full text
Abstract:
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation of new computers to the network and the removing of old computers from the network are considered. Meanwhile, the computers are equipped with antivirus software on the computer network. The computer virus model is established. Through the analysis of the model, disease-free and endemic equilibrium points are calculated. The stability conditions of the equilibria are derived. To illustrate our theoretical analysis, some numerical simulations are also included. The results provide a theoretical basis to control the spread of computer virus.
APA, Harvard, Vancouver, ISO, and other styles
27

Deng, Shiguo, Qianshun Yuan, Jing Zhang, and Huijie Yang. "Response of gene regulatory networks after infection of H3N2 virus." Journal of Bioinformatics and Computational Biology 19, no. 04 (July 21, 2021): 2150017. http://dx.doi.org/10.1142/s0219720021500177.

Full text
Abstract:
Viral infection is a complicated dynamic process, in which viruses intrude into cells to duplicate themselves and trigger succeeding biological processes regulated by genes. It may lead to a serious disaster to human’s health. A scheme is proposed to monitor the response of cells after being infected by viruses. Co-expression levels of genes measured at successive time points form a gene expression profile sequence, which is mapped to a temporal gene regulatory network. The fission and fusion of the communities of the networks are used to find the active parts. We investigated an experiment of injection of flu viruses into a total of 17 healthy volunteers, which develop into an infected group and a survival group. The survival group is much more chaotic, i.e. there occur complicated fissions and fusions of communities over the whole network. For the infected group, the most active part of the regulatory network forms a single community, but it is included in one of the large communities and completely conservative in the survival group. There are a total of six and seven genes in the active structure that take part in the Parkinson’s disease and the ribosome pathways, respectively. Actually, a total of 30 genes (covering [Formula: see text]) of the genes in the active structure participate in the neuro-degeneration and its related pathways. This scheme can be extended straightforwardly to extract characteristics of trajectories of complex systems.
APA, Harvard, Vancouver, ISO, and other styles
28

Neagu, Florentina Stefania, and Anca Savu. "The costs of cyberterrorism for the national economy: United States of America vs Egypt." Proceedings of the International Conference on Business Excellence 13, no. 1 (May 1, 2019): 983–93. http://dx.doi.org/10.2478/picbe-2019-0086.

Full text
Abstract:
Abstract In recent years cyber terrorism has become increasingly used with the globalization of technology and people’s access to high-speed internet. It takes place exclusively in the online environment, the advantage being that it offers an increased level of anonymity to users. Terrorist groups are targeting the misappropriation of social media accounts, focused on Distributed Denial of Service activities, exploiting communications services and banking services for fraudulent misappropriation of financial accounts. Cyberterrorism generates very high costs for the national economy, such as the involvement of specialists for detecting and correcting intrusion, declining productivity and income, costs of information theft, regaining the reputation of an institution or company, the costs relating to the resumption of production and the provision of services, the loss of information concerning intellectual property, financial manipulation using stolen information, the cost of securing computer networks and assuring them in the event of intrusion, costs generated by the time spent on recovering stolen data. In 2018 both the US and Egypt took action on these activities, the US modified its national cyber strategy and Egypt adopted the new law project to combat cybercrime. The main cyber threats they face are: threats of intrusion and sabotage of IT infrastructures, cyberterrorism and cyberwar, threats to digital identity and theft of private data, malware programs. The targets of the attacks were public sector entities, financial organizations, health care organizations, retail and accommodation. The reasons for why hackers attack these organizations are money-related, malware infected by emails, commercial and industrial espionage.
APA, Harvard, Vancouver, ISO, and other styles
29

Sandham, D. "Will viruses leap to mobiles?" Communications Engineer 4, no. 2 (April 1, 2006): 24–27. http://dx.doi.org/10.1049/ce:20060203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Aisyah, Siti. "Computer Networking Company in Business Area." International Research Journal of Management, IT & Social Sciences 2, no. 7 (July 1, 2015): 1. http://dx.doi.org/10.21744/irjmis.v2i7.67.

Full text
Abstract:
Computer Networking is not something new today. Almost every company there is a Computer Network to facilitate the flow of Information within the company. Internet increasingly popular today is a giant Computer Network of Computers that are connected and can interact. This can occur because of the network technology development is very rapid. But in some ways connected to the internet can be dangerous threat, many attacks that can occur both within and outside such as Viruses, Trojans, and Hackers. In the end the security of computers and computer networks will play an important role in this case. A good firewall configuration and optimized to reduce these threats. Firewall configuration there are 3 types of them are screened host firewall system (Single- homed bastion), screened host firewall system (Dual-homed bastion), and screened subnet firewall. And also configure the firewall to open the ports Port right to engage connect to the Internet, because the ports to configure a firewall that can filter packets incoming data in accordance with the policy or policies. This firewall architecture that will be used to optimize a firewall on the network.
APA, Harvard, Vancouver, ISO, and other styles
31

Kyurkchiev, Nikolay. "A New Class of “Growth Functions” with Polynomial Variable Transfer Generated by Real Reaction Networks." Cybernetics and Information Technologies 20, no. 6 (December 1, 2020): 74–81. http://dx.doi.org/10.2478/cait-2020-0062.

Full text
Abstract:
Abstract In [4, 5], two classes of growth models with “exponentially variable transfer” and “correcting amendments of Bateman-Gompertz-Makeham-type” based on a specific extended reaction network have been studied [1]. In this article we will look at the new scheme with “polynomial variable transfer”. The consideration of such a dynamic model in the present article is dictated by our passionate desire to offer an adequate model with which to well approximate specific data in the field of computer viruses propagation, characterized by rapid growth in the initial time interval. Some numerical examples, using CAS Mathematica illustrating our results are given.
APA, Harvard, Vancouver, ISO, and other styles
32

Al-zubidi, Azhar, Nadia F. AL-Bakri, Rajaa K. Hasoun, Soukaena Hassan Hashim, and Haider Th Salim Alrikabi. "Mobile Application to Detect Covid-19 Pandemic by Using Classification Techniques: Proposed System." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 16 (August 23, 2021): 34. http://dx.doi.org/10.3991/ijim.v15i16.24195.

Full text
Abstract:
<p class="0abstract">Various mobile applications such as Mobile Health (mHealth) have been developed and spread across the world which has played an important role in mitigating the Coronavirus pandemic (COVID-19). As the COVID-19 pandemic spreads, several people have drawn parallels to influenza. While both viruses cause respiratory infections, they propagate in very different ways. This has a major impact on the public health measures that can be used to fight each virus. These viruses are pandemic-causing in the same way. That is, they both cause respiratory disease, and can present themselves in several ways, ranging from asymptomatic to severe and deadly. A proposal is presented in this paper that uses two algorithms to define and classify these pandemics, they are: The Back Propagation (BP) classification algorithm and the Fuzzy C-Mean (FCM) clustering algorithm. Two stages are implemented in the proposed system: in the first step, the FCM algorithm is used to find out the type of virus, and this algorithm is capable of handling ambiguous features of viruses. In the second step, a BP neural network is used as a classifier to detect the pandemic class. The proposed system was trained and tested using a well-known dataset (covid-19 vs influenza). Information Gain (IG) is used to optimize the related features that affect the classification process to improve speed and accuracy. The proposed mobile application is developed to support users easily detecting the COVID-19 infection by inputting the medical tests as significant features to the proposed system. The proposed system's accuracy is up to (89%), the framework was created using the Matlab programming environment and an Android Studio for Mobil application designing.</p>
APA, Harvard, Vancouver, ISO, and other styles
33

Alqahtani, Abdulrahman. "Towards a framework for the potential cyber-terrorist threat to critical national infrastructure." Information & Computer Security 23, no. 5 (November 9, 2015): 532–69. http://dx.doi.org/10.1108/ics-09-2014-0060.

Full text
Abstract:
Purpose – The main purpose of this research is to produce the most accurate theoretical framework of the potential threat of cyberterrorism to the national security, compared to conventional terrorism. So it aims to identify the theoretical framework that best explains the threat of cyberterrorism and conventional terrorism to national security derived from empirical data, using grounded theory, and to validate the developed grounded theory statistically by quantitative data. Design/methodology/approach – This paper presents the results of the quantitative study survey. It provides in the beginning basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA), were performed. Then, structural equation modelling was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set. Findings – The first study, as a qualitative exploratory study, gives a rich data set that provides the foundation of the development of the second study, as a quantitative confirmatory study. In the researcher’s previous qualitative study, it provides a better theoretical understanding of the potential threat of cyber and conventional terrorism to Saudi national security. Also, it provides the development of the grounded theory of the study (Figure 1). It also has led to the development of the conceptual framework and the hypotheses for the second phase of the study (i.e. survey). Originality/value – It is original study based on empirical data collected from Saudi military and security officials and experts in the critical infrastructures.
APA, Harvard, Vancouver, ISO, and other styles
34

Liu, Lan, Ryan K. L. Ko, Guangming Ren, and Xiaoping Xu. "Malware Propagation and Prevention Model for Time-Varying Community Networks within Software Defined Networks." Security and Communication Networks 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/2910310.

Full text
Abstract:
As the adoption of Software Defined Networks (SDNs) grows, the security of SDN still has several unaddressed limitations. A key network security research area is in the study of malware propagation across the SDN-enabled networks. To analyze the spreading processes of network malware (e.g., viruses) in SDN, we propose a dynamic model with a time-varying community network, inspired by research models on the spread of epidemics in complex networks across communities. We assume subnets of the network as communities and links that are dense in subnets but sparse between subnets. Using numerical simulation and theoretical analysis, we find that the efficiency of network malware propagation in this model depends on the mobility rate q of the nodes between subnets. We also find that there exists a mobility rate threshold qc. The network malware will spread in the SDN when the mobility rate q>qc. The malware will survive when q>qc and perish when q<qc. The results showed that our model is effective, and the results may help to decide the SDN control strategy to defend against network malware and provide a theoretical basis to reduce and prevent network security incidents.
APA, Harvard, Vancouver, ISO, and other styles
35

Yin, Rui, Yu Zhang, Xinrui Zhou, and Chee Keong Kwoh. "Time series computational prediction of vaccines for influenza A H3N2 with recurrent neural networks." Journal of Bioinformatics and Computational Biology 18, no. 01 (February 2020): 2040002. http://dx.doi.org/10.1142/s0219720020400028.

Full text
Abstract:
Influenza viruses are persistently threatening public health, causing annual epidemics and sporadic pandemics due to rapid viral evolution. Vaccines are used to prevent influenza infections but the composition of the influenza vaccines have to be updated regularly to ensure its efficacy. Computational tools and analyses have become increasingly important in guiding the process of vaccine selection. By constructing time-series training samples with splittings and embeddings, we develop a computational method for predicting suitable strains as the recommendation of the influenza vaccines using recurrent neural networks (RNNs). The Encoder-decoder architecture of RNN model enables us to perform sequence-to-sequence prediction. We employ this model to predict the prevalent sequence of the H3N2 viruses sampled from 2006 to 2017. The identity between our predicted sequence and recommended vaccines is greater than 98% and the [Formula: see text] indicates their antigenic similarity. The multi-step vaccine prediction further demonstrates the robustness of our method which achieves comparable results in contrast to single step prediction. The results show significant matches of the recommended vaccine strains to the circulating strains. We believe it would facilitate the process of vaccine selection and surveillance of seasonal influenza epidemics.
APA, Harvard, Vancouver, ISO, and other styles
36

Feng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.

Full text
Abstract:
Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In this paper, an optimal control measure is proposed based on the SEIR virus propagation model in point-to-group information networks. First, considering the need for antivirus measures in reality, an optimal control problem is introduced, and then a controlled computer virus spread model in point-to-group information networks is established. Second, the optimal control measure is formulated by making a tradeoff between control cost and network loss caused by virus intrusion. Third, optimal control strategies are theoretically investigated by Pontryagin’s maximum principle and the Hamiltonian function. Finally, through numerical simulations, effective measures for controlling virus spread in point-to-group information networks are proposed.
APA, Harvard, Vancouver, ISO, and other styles
37

Zajac, Bernard P. "The legal implications of viruses." Computer Law & Security Review 4, no. 4 (November 1988): 36–37. http://dx.doi.org/10.1016/0267-3649(88)90153-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Tu, Xiao, Guo-Ping Jiang, Yurong Song, and Xiaoling Wang. "Control of Multiple Viruses Interacting and Propagating in Multilayer Networks." Mathematical Problems in Engineering 2020 (July 10, 2020): 1–14. http://dx.doi.org/10.1155/2020/9014353.

Full text
Abstract:
Experimental studies involving control against virus propagation have attracted the interest of scientists. However, most accomplishments have been constrained by the simple assumption of a single virus in various networks, but this assumption apparently conflicts with recent developments in complex network theory, which details that each node might play multiple roles in different topological connections. Multiple viruses propagate through individuals via different routes, and thus, each individual component could be located in various positions of differing importance in each virus propagation process in each network. Therefore, we propose several control strategies for establishing a multiple-virus interaction and propagation model involving multiplex networks, including a novel Multiplex PageRank target control model and a multiplex random control model. Using computer experiments and simulations derived from actual examples, we exploit several actual cases to determine the relationship of the relative infection probability with the immunization probability. The results demonstrate the differences between our multiple-virus interaction and propagation model and the single-virus propagation model and verify the effectiveness of our novel Multiplex PageRank target control strategy. Moreover, we use parallel computing for simulating and identifying the relationships of the immunization thresholds with both interaction coefficients, which is beneficial for further practical applications because it can reduce the multiple interactions between viruses and allows achieving a greater effect through the immunization of fewer nodes in the multilayer networks.
APA, Harvard, Vancouver, ISO, and other styles
39

Achahbar, Abdelfattah, and Mohamed Essouifi. "Discrete stochastic modelling of computer viruses prevalence on a reduced scale-free network." International Journal of Computer Applications in Technology 63, no. 3 (2020): 257. http://dx.doi.org/10.1504/ijcat.2020.10031588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Essouifi, Mohamed, and Abdelfattah Achahbar. "Discrete stochastic modelling of computer viruses prevalence on a reduced scale-free network." International Journal of Computer Applications in Technology 63, no. 3 (2020): 257. http://dx.doi.org/10.1504/ijcat.2020.109353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

WANG, Wei, Peng-Tao ZHANG, Ying TAN, and Xin-Gui HE. "A Feature Extraction Method of Computer Viruses Based on Artificial Immune and Code Relevance." Chinese Journal of Computers 34, no. 2 (May 19, 2011): 204–15. http://dx.doi.org/10.3724/sp.j.1016.2011.00204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Paul, N. "A Closer Look at Viruses and Worms." IEEE Security and Privacy Magazine 3, no. 4 (July 2005): 7. http://dx.doi.org/10.1109/msp.2005.86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Essouifi, Mohamed, and Abdelfattah Achahbar. "A mixed SIR-SIS model to contain a virus spreading through networks with two degrees." International Journal of Modern Physics C 28, no. 09 (September 2017): 1750114. http://dx.doi.org/10.1142/s0129183117501145.

Full text
Abstract:
Due to the fact that the “nodes” and “links” of real networks are heterogeneous, to model computer viruses prevalence throughout the Internet, we borrow the idea of the reduced scale free network which was introduced recently. The purpose of this paper is to extend the previous deterministic two subchains of Susceptible-Infected-Susceptible (SIS) model into a mixed Susceptible-Infected-Recovered and Susceptible-Infected-Susceptible (SIR–SIS) model to contain the computer virus spreading over networks with two degrees. Moreover, we develop its stochastic counterpart. Due to the high protection and security taken for hubs class, we suggest to treat it by using SIR epidemic model rather than the SIS one. The analytical study reveals that the proposed model admits a stable viral equilibrium. Thus, it is shown numerically that the mean dynamic behavior of the stochastic model is in agreement with the deterministic one. Unlike the infection densities [Formula: see text] and [Formula: see text] which both tend to a viral equilibrium for both approaches as in the previous study, [Formula: see text] tends to the virus-free equilibrium. Furthermore, since a proportion of infectives are recovered, the global infection density [Formula: see text] is minimized. Therefore, the permanent presence of viruses in the network due to the lower-degree nodes class. Many suggestions are put forward for containing viruses propagation and minimizing their damages.
APA, Harvard, Vancouver, ISO, and other styles
44

Swanson, Don R., Neil R. Smalheiser, and A. Bookstein. "Information discovery from complementary literatures: Categorizing viruses as potential weapons." Journal of the American Society for Information Science and Technology 52, no. 10 (2001): 797–812. http://dx.doi.org/10.1002/asi.1135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

AL-HANANI, ALI, and VENUS W. SAMAWI. "virus Detection Using Cryptography Algorithm." Iraqi Journal for Computers and Informatics 27, no. 1 (June 30, 1996): 8–15. http://dx.doi.org/10.25195/ijci.v27i1.220.

Full text
Abstract:
Many papers have been published about manipulating computer viruses; instructions that impact a computer system and after a period of incubation and reproducion, activate and demonstrate their presence. mest Viruses were designed to attack microcomputers, sincce microcomputers are widely used nowadays, and have simple operating systems which result in lack of quality of their security systern. Connecting computers with networks and using copies of programs from unreliable sources such as bullet in board systems will increase the :of viral contact and the spread of viruses. Data Encryption disguises data flowing through a network so that it is unintelligible to any one monitor the data, Encryption techniques can also be used to detect file modification which may caused either by unithorized users or by viruses. This paper concern in viruses atracking users on system files (.exe and com) in microcomputer sytems, where viruses Types, how they work, and anti-virus streiagies are going o scussed. Finally, a dccction stralegy depending on Encryption techniques built the operating sysiems Suggested to improve PCs Security and preventing unauthorized users from inserting into programas commands that will cause system corruption.
APA, Harvard, Vancouver, ISO, and other styles
46

SHANKER, O., and TAD HOGG. "EPIDEMIOLOGY MODEL ON SHORTCUT AND SMALL WORLD NETWORKS." Modern Physics Letters B 23, no. 10 (April 20, 2009): 1249–62. http://dx.doi.org/10.1142/s0217984909019387.

Full text
Abstract:
We show that the behavior of an epidemiology model depends sensitively on the shortcut density in the shortcut network. This is consistent with an earlier work on other processes on the shortcut network. We analytically study the reason for the sensitivity. The shortcut network is similar to the small world network, and it has the advantage that the model dependence on the shortcut density can be analytically studied. The model would be relevant to the spread of diseases in human, animal, plant or other populations, to the spread of viruses in computer networks, or to the spread of social contagion in social networks. It would also be relevant in understanding the variations in the load on routers connecting different computer networks, as the network topology gets extended by the addition of new links, and in analyzing the placement of certain special sensors in a sensor network laid out in a non-random way with some shortcut links.
APA, Harvard, Vancouver, ISO, and other styles
47

Palmieri, Francesco, and Ugo Fiore. "Automated detection and containment of worms and viruses into heterogeneous networks: a simple network immune system." International Journal of Wireless and Mobile Computing 2, no. 1 (2007): 47. http://dx.doi.org/10.1504/ijwmc.2007.013795.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gelenbe, Erol. "Dealing with software viruses: A biological paradigm." Information Security Technical Report 12, no. 4 (2007): 242–50. http://dx.doi.org/10.1016/j.istr.2007.11.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Chu, Hai-Cheng, Der-Jiunn Deng, and Han-Chieh Chao. "Potential cyberterrorism via a multimedia smart phone based on a web 2.0 application via ubiquitous Wi-Fi access points and the corresponding digital forensics." Multimedia Systems 17, no. 4 (November 14, 2010): 341–49. http://dx.doi.org/10.1007/s00530-010-0216-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Liu, Guiyun, Junqiang Li, Zhongwei Liang, and Zhimin Peng. "Analysis of Time-Delay Epidemic Model in Rechargeable Wireless Sensor Networks." Mathematics 9, no. 9 (April 27, 2021): 978. http://dx.doi.org/10.3390/math9090978.

Full text
Abstract:
With the development of wireless rechargeable sensor networks (WRSNs), many scholars began to attach attention to network security under the spread of viruses. This paper mainly studies a novel low-energy-status-based model SISL (Susceptible, Infected, Susceptible, Low-Energy). The conversion process from low-energy nodes to susceptible nodes is called charging. It is noted that the time delay of the charging process in WRSNs should be considered. However, the charging process and its time delay have not been investigated in traditional epidemic models in WRSNs. Thus, the model SISL is proposed. The basic reproduction number, the disease-free equilibrium point, and the endemic equilibrium point are discussed here. Meanwhile, local stability and global stability of the disease-free equilibrium point and the endemic equilibrium point are analyzed. The addition of the time-delay term needs to be analyzed to determine whether it affects the stability. The intervention treatment strategy under the optimal control is obtained through the establishment of the Hamiltonian function and the application of the Pontryagin principle. Finally, the theoretical results are verified by simulations.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography