메뉴 건너뛰기




Volumn 35, Issue 8, 2011, Pages 3777-3787

A mathematical model for the effect of malicious object on computer network immune system

Author keywords

Computer network; Immune response; Malicious object; Stability

Indexed keywords

CYBER DEFENSE; GLOBAL STABILITY; IMMUNE RESPONSE; IMMUNE SYSTEMS; LOCAL STABILITY; MALICIOUS OBJECT; NONLINEAR MATHEMATICAL MODEL;

EID: 79955090308     PISSN: 0307904X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.apm.2011.02.025     Document Type: Article
Times cited : (10)

References (21)
  • 1
    • 79955085310 scopus 로고    scopus 로고
    • Directed graph epidemiology models of computer virus, in: Proceedings of the 1991 Computer Society Symposium on Research in Security and Privacy
    • J. Kephart, S. White, Directed graph epidemiology models of computer virus, in: Proceedings of the 1991 Computer Society Symposium on Research in Security and Privacy, pp. 342-359.
    • Kephart, J.1    White, S.2
  • 2
    • 0034187881 scopus 로고    scopus 로고
    • A distributed approach against computer viruses inspired by immune system
    • Okamoto T., Ishida Y. A distributed approach against computer viruses inspired by immune system. IEICE Trans. Commun. 2000, E83-B(5).
    • (2000) IEICE Trans. Commun. , vol.83 , Issue.5
    • Okamoto, T.1    Ishida, Y.2
  • 3
    • 0041983746 scopus 로고    scopus 로고
    • Management tradeoffs in anti-virus strategies
    • Post G., Kagan A. Management tradeoffs in anti-virus strategies. Inform. Manag. 2000, 37(1):13-24.
    • (2000) Inform. Manag. , vol.37 , Issue.1 , pp. 13-24
    • Post, G.1    Kagan, A.2
  • 4
    • 34248175732 scopus 로고    scopus 로고
    • SEIRS epidemic model of transmission of malicious objects in computer network
    • Mishra Bimal Kumar, Saini Dinesh Kumar SEIRS epidemic model of transmission of malicious objects in computer network. Int. J. Appl. Math. Comput. 2007, 188(2):1476-1482.
    • (2007) Int. J. Appl. Math. Comput. , vol.188 , Issue.2 , pp. 1476-1482
    • Mishra, B.K.1    Saini, D.K.2
  • 5
    • 37349024326 scopus 로고    scopus 로고
    • Hemraj Saini, Dinesh Kumar Saini, Malicious object dynamics in the presence of anti Malicious software, Eur. J. Sci. Res. 18 (3). ISSN 1450-216X. ©Euro Journals Publishing, Inc. Available from
    • Hemraj Saini, Dinesh Kumar Saini, Malicious object dynamics in the presence of anti Malicious software, Eur. J. Sci. Res. 18 (3) (2007) 491-499. ISSN 1450-216X. ©Euro Journals Publishing, Inc. Available from: http://www.eurojournals.com/ejsr.htm.
    • (2007) , pp. 491-499
  • 6
    • 79955080602 scopus 로고    scopus 로고
    • Proactive cyber defense and reconfigurable framework for cyber security
    • Saini Dinesh Kumar, Saini Hemraj Proactive cyber defense and reconfigurable framework for cyber security. Int. Rev. Comput. Softw. 2007, 2(2):89-98.
    • (2007) Int. Rev. Comput. Softw. , vol.2 , Issue.2 , pp. 89-98
    • Saini, D.K.1    Saini, H.2
  • 7
    • 34247248180 scopus 로고    scopus 로고
    • Mathematical models on computer viruses
    • Mishra Bimal Kumar, Saini Dinesh Kumar Mathematical models on computer viruses. Int. J. Appl. Math. Comput. 2007, 187(2):929-936.
    • (2007) Int. J. Appl. Math. Comput. , vol.187 , Issue.2 , pp. 929-936
    • Mishra, B.K.1    Saini, D.K.2
  • 8
    • 23744485744 scopus 로고    scopus 로고
    • Mihai Christodorescu, Somesh Jha, Testing malware detectors, in: ISSTA '04: Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis, July 2004.
    • Mihai Christodorescu, Somesh Jha, Testing malware detectors, in: ISSTA '04: Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis, July 2004.
  • 9
    • 79955078963 scopus 로고    scopus 로고
    • Mikdam A. Al-Salami, Salah F. Saleh, Sabah A. Ali, General virus detector and deactivator, in: Al-Hadba University College Conference
    • Mikdam A. Al-Salami, Salah F. Saleh, Sabah A. Ali, General virus detector and deactivator, in: Al-Hadba University College Conference, 2000.
    • (2000)
  • 10
    • 79955078721 scopus 로고    scopus 로고
    • Dinesh Kumar Saini, Hemraj Saini, Cyber defense: mathematical modeling and simulation, in: National Conference on Mathematical Analysis and its Real Time Applications, 16-17th September, 2006, University of Berhampur (Berhampur), Orissa
    • Dinesh Kumar Saini, Hemraj Saini, Cyber defense: mathematical modeling and simulation, in: National Conference on Mathematical Analysis and its Real Time Applications, 16-17th September, 2006, University of Berhampur (Berhampur), Orissa, 2006, pp. 106-111.
    • (2006) , pp. 106-111
  • 11
    • 79955079197 scopus 로고    scopus 로고
    • Dinesh Kumar Saini, Hemraj Saini, A study on cyber crime in India, in: National Seminar on Mathematics and Computer Science, 29-30 November, 2005, S.D. (P.G.) College, Muzaffarnagar.
    • Dinesh Kumar Saini, Hemraj Saini, A study on cyber crime in India, in: National Seminar on Mathematics and Computer Science, 29-30 November, 2005, S.D. (P.G.) College, Muzaffarnagar.
  • 12
    • 79955086254 scopus 로고    scopus 로고
    • VAIN: a stochastic model for dynamics of malicious objects
    • Saini Dinesh Kumar, Saini Hemraj VAIN: a stochastic model for dynamics of malicious objects. ICFAI J. Syst. Manag. 2008, 6(1):14-28.
    • (2008) ICFAI J. Syst. Manag. , vol.6 , Issue.1 , pp. 14-28
    • Saini, D.K.1    Saini, H.2
  • 14
    • 0003983639 scopus 로고
    • Optimization Software, Inc., Publications Division, New York
    • Marchuk G.I. Mathematical Models in Immunology 1983, Optimization Software, Inc., Publications Division, New York.
    • (1983) Mathematical Models in Immunology
    • Marchuk, G.I.1
  • 16
    • 79955078441 scopus 로고    scopus 로고
    • Dinesh Kumar Saini, Hemraj Saini, Cyber wars and defense: an introduction, in: National Symposium on Cyber Forensics and Computer Crimes, 11-13th August, Punjabi University (Patiala), Punjab
    • Dinesh Kumar Saini, Hemraj Saini, Cyber wars and defense: an introduction, in: National Symposium on Cyber Forensics and Computer Crimes, 11-13th August, Punjabi University (Patiala), Punjab, 2006.
    • (2006)
  • 18
    • 0017645709 scopus 로고
    • The struggle for life: V. One species living in a limited environment
    • Rescigno A. The struggle for life: V. One species living in a limited environment. Bull. Math. Biol. 1977, 39:479-485.
    • (1977) Bull. Math. Biol. , vol.39 , pp. 479-485
    • Rescigno, A.1
  • 19
    • 79955088759 scopus 로고    scopus 로고
    • Fu Yu-Zhen, Hu Yu, Zhang Qing-Hua, Application and Research of Adaptive Immune Network Intrusion Detection Model [D], Taiyuan Institute of Technology Press, 2008, 5.
    • Fu Yu-Zhen, Hu Yu, Zhang Qing-Hua, Application and Research of Adaptive Immune Network Intrusion Detection Model [D], Taiyuan Institute of Technology Press, 2008, 5.
  • 21
    • 70350543716 scopus 로고    scopus 로고
    • Research on network security situation awareness technology based on artificial immunity system, in: IFITA '09: International Forum on Information Technology and Applications
    • L. Nian1, et al., Research on network security situation awareness technology based on artificial immunity system, in: IFITA '09: International Forum on Information Technology and Applications, 2009.
    • (2009)
    • Nian1, L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.