-
4
-
-
84928347803
-
McAfee labs threats report
-
Available from:) [Accessed on July 2014].
-
McAfee labs threats report, 2014. (Available from: http://www.mcafee.com/sg/resources/reports/rp-quarterly-threat-q1-2014.pdf) [Accessed on July 2014].
-
(2014)
-
-
-
5
-
-
84940895329
-
Quarterly report pandalabs
-
Available from:) [Accessed on July 2014].
-
PandaLabs . Quarterly report pandalabs, 2014. (Available from: http://press.pandasecurity.com/wp-content/uploads/2014/05/Quaterly-PandaLabs-Report_Q1) [Accessed on July 2014].
-
(2014)
-
-
-
7
-
-
0023294949
-
Computer virus: theory and experiments
-
Cohen F. Computer virus: theory and experiments. Computer Security 1987; 6:22-35.
-
(1987)
Computer Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
8
-
-
77949656755
-
A taxonomy of biologically inspired research in computer networking
-
Meisel M, Pappas V, Zhang L. A taxonomy of biologically inspired research in computer networking. Computer Networks 2010; 54:901-916.
-
(2010)
Computer Networks
, vol.54
, pp. 901-916
-
-
Meisel, M.1
Pappas, V.2
Zhang, L.3
-
9
-
-
0023997770
-
The application of epidemiology to computer viruses
-
Murray WH. The application of epidemiology to computer viruses. Computer Security 1988; 7:139-145.
-
(1988)
Computer Security
, vol.7
, pp. 139-145
-
-
Murray, W.H.1
-
14
-
-
84873717599
-
Modeling computer virus with the BSDE approach
-
Amador J, Artalejo JR. Modeling computer virus with the BSDE approach. Computer Networks 2012; 57:302-316.
-
(2012)
Computer Networks
, vol.57
, pp. 302-316
-
-
Amador, J.1
Artalejo, J.R.2
-
15
-
-
79952273745
-
A deterministic approach for the propagation of computer virus in the framework of linear and sinusoidal time variation of birth rate of virus
-
Rao NS, Deepshikha J. A deterministic approach for the propagation of computer virus in the framework of linear and sinusoidal time variation of birth rate of virus. Proceedings of ICISTM 2011, Communications in Computer and Information Science 2011; 141:206-213.
-
(2011)
Proceedings of ICISTM 2011, Communications in Computer and Information Science
, vol.141
, pp. 206-213
-
-
Rao, N.S.1
Deepshikha, J.2
-
16
-
-
84865862007
-
Mobility matrix evolution for an SIS epidemic patch model
-
Sanders J, Noble B, Van Gorder RA, Riggs C. Mobility matrix evolution for an SIS epidemic patch model. Physica A 2012; 391:6256-6267.
-
(2012)
Physica A
, vol.391
, pp. 6256-6267
-
-
Sanders, J.1
Noble, B.2
Van Gorder, R.A.3
Riggs, C.4
-
17
-
-
84884661759
-
Impact of media coverage on epidemic spreading in complex networks
-
Wang Y, Cao J, Jin Z, Zhang H, Sun GQ. Impact of media coverage on epidemic spreading in complex networks. Physica A 2013; 23:5824-5835.
-
(2013)
Physica A
, vol.23
, pp. 5824-5835
-
-
Wang, Y.1
Cao, J.2
Jin, Z.3
Zhang, H.4
Sun, G.Q.5
-
20
-
-
82255191358
-
A delayed computer virus propagation model and its dynamics
-
Ren J, Yang X, Yang LX, Xu Y, Yang F. A delayed computer virus propagation model and its dynamics. Chaos Soliton and Fractals 2012; 45:74-79.
-
(2012)
Chaos Soliton and Fractals
, vol.45
, pp. 74-79
-
-
Ren, J.1
Yang, X.2
Yang, L.X.3
Xu, Y.4
Yang, F.5
-
21
-
-
0442280819
-
Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction
-
Wierman JC, Marchette DJ. Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction. Computational Statistics & Data Analysis 2004; 45:3-23.
-
(2004)
Computational Statistics & Data Analysis
, vol.45
, pp. 3-23
-
-
Wierman, J.C.1
Marchette, D.J.2
-
24
-
-
84891429894
-
Modeling botnet propagation using time zones
-
San Diego, California, USA
-
Dagon D, Zou C, Lee W. Modeling botnet propagation using time zones. Proc. 13th Annual Netw. Dis. Syst. Secur. Symp., San Diego, California, USA, 2006; 235-249.
-
(2006)
Proc. 13th Annual Netw. Dis. Syst. Secur. Symp
, pp. 235-249
-
-
Dagon, D.1
Zou, C.2
Lee, W.3
-
25
-
-
34248175732
-
SEIRS epidemic model with delay for transmission of malicious objects in computer network
-
Mishra BK, Saini DK. SEIRS epidemic model with delay for transmission of malicious objects in computer network. Applied Mathematics and Computation 2007; 188: 1476-1482.
-
(2007)
Applied Mathematics and Computation
, vol.188
, pp. 1476-1482
-
-
Mishra, B.K.1
Saini, D.K.2
-
26
-
-
84908655708
-
Stability analysis of an e-SEIAR model with point-to-group worm propagatio
-
Wang F, Zhang Y, Wang C, Ma J. Stability analysis of an e-SEIAR model with point-to-group worm propagatio. Communications in Nonlinear Science 2015; 20(3): 897-904.
-
(2015)
Communications in Nonlinear Science
, vol.20
, Issue.3
, pp. 897-904
-
-
Wang, F.1
Zhang, Y.2
Wang, C.3
Ma, J.4
-
27
-
-
79956061729
-
Dynamic model of worms with vertical transmission in computer network
-
Mishra BK, Pandey SK. Dynamic model of worms with vertical transmission in computer network. Applied Mathematics and Computation 2011; 217:8438-8446.
-
(2011)
Applied Mathematics and Computation
, vol.217
, pp. 8438-8446
-
-
Mishra, B.K.1
Pandey, S.K.2
-
28
-
-
84857030292
-
Stability analysis of VEISV propagation modeling for network worm attack
-
Toutonji OA, Yoo SM, Park M. Stability analysis of VEISV propagation modeling for network worm attack. Applied Mathematical Modelling 2012; 36:2751-2761.
-
(2012)
Applied Mathematical Modelling
, vol.36
, pp. 2751-2761
-
-
Toutonji, O.A.1
Yoo, S.M.2
Park, M.3
-
29
-
-
84922625856
-
A note on global stability of VEISV propagation modeling for network worm attack
-
Yang Y. A note on global stability of VEISV propagation modeling for network worm attack. Applied Mathematical Modelling 2015; 39(2): 776-780.
-
(2015)
Applied Mathematical Modelling
, vol.39
, Issue.2
, pp. 776-780
-
-
Yang, Y.1
-
31
-
-
70350369682
-
SEIQS model for the transmission of malicious objects in computer network
-
Mishra BK, Jha N. SEIQS model for the transmission of malicious objects in computer network. Applied Mathematical Modelling 2010; 34:710-715.
-
(2010)
Applied Mathematical Modelling
, vol.34
, pp. 710-715
-
-
Mishra, B.K.1
Jha, N.2
-
32
-
-
84872605365
-
Mathematical model on the transmission of worms in wireless sensor network
-
Mishra BK, Keshri N. Mathematical model on the transmission of worms in wireless sensor network. Applied Mathematical Modelling 2013; 37:4103-4111.
-
(2013)
Applied Mathematical Modelling
, vol.37
, pp. 4103-4111
-
-
Mishra, B.K.1
Keshri, N.2
-
33
-
-
84895923150
-
Dynamic model of worm propagation in computer network
-
Mishra BK, Pandey SK. Dynamic model of worm propagation in computer network. Applied Mathematical Modelling 2014; 38:2173-2179.
-
(2014)
Applied Mathematical Modelling
, vol.38
, pp. 2173-2179
-
-
Mishra, B.K.1
Pandey, S.K.2
-
34
-
-
77951206095
-
Stability analysis of a SEIQV epidemic model for rapid spreading worms
-
Wang F, Zhang Y, Wang C, Ma J, Moon SJ. Stability analysis of a SEIQV epidemic model for rapid spreading worms. Computer Security 2010; 29:410-418.
-
(2010)
Computer Security
, vol.29
, pp. 410-418
-
-
Wang, F.1
Zhang, Y.2
Wang, C.3
Ma, J.4
Moon, S.J.5
-
35
-
-
84876410834
-
Stochastic modeling of computer virus spreading with warning signals
-
Amador J, Artalejo JR. Stochastic modeling of computer virus spreading with warning signals. Journal Franklin I 2013; 350 :1112-1138.
-
(2013)
Journal Franklin I
, vol.350
, pp. 1112-1138
-
-
Amador, J.1
Artalejo, J.R.2
-
36
-
-
84881544095
-
Dynamical analysis and control strategies on malware propagation model
-
Feng L, Liao X, Han Q, Li H. Dynamical analysis and control strategies on malware propagation model. Applied Mathematical Modelling 2013; 16-17:8225-8236.
-
(2013)
Applied Mathematical Modelling
, vol.16-17
, pp. 8225-8236
-
-
Feng, L.1
Liao, X.2
Han, Q.3
Li, H.4
-
37
-
-
84897057483
-
A mathematical model for a distributed attack on targeted resources in a computer network
-
Haldar K, Mishra BK. A mathematical model for a distributed attack on targeted resources in a computer network. Communications in Nonlinear Science 2014; 19:3149-3160.
-
(2014)
Communications in Nonlinear Science
, vol.19
, pp. 3149-3160
-
-
Haldar, K.1
Mishra, B.K.2
-
40
-
-
84885071747
-
The effect of infected external computers on the spread of viruses: a compartment modeling study
-
Yang LX, Yang X. The effect of infected external computers on the spread of viruses: a compartment modeling study. Physica A 2013; 392:6523-6535.
-
(2013)
Physica A
, vol.392
, pp. 6523-6535
-
-
Yang, L.X.1
Yang, X.2
-
41
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Washington DC, USA
-
Zou C, Gong W, Towsley D. Code red worm propagation modeling and analysis. Proceedings of 9th ACM Conf. Comput. Commun. Secur., Washington DC, USA, 2002; :18-22.
-
(2002)
Proceedings of 9th ACM Conf. Comput. Commun. Secur
, pp. 18-22
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
42
-
-
0037071123
-
A unified prediction of computer virus spread in connected networks
-
Billings L, Spears WM, Schwartz IB. A unified prediction of computer virus spread in connected networks. Physics Letters A 2002; 298:261-266.
-
(2002)
Physics Letters A
, vol.298
, pp. 261-266
-
-
Billings, L.1
Spears, W.M.2
Schwartz, I.B.3
-
43
-
-
84863226775
-
Effect of anti-virus software on infectious nodes in computer network: a mathematical model
-
Mishra BK, Pandey SK. Effect of anti-virus software on infectious nodes in computer network: a mathematical model. Physics Letters A 2012; 376:2389-2393.
-
(2012)
Physics Letters A
, vol.376
, pp. 2389-2393
-
-
Mishra, B.K.1
Pandey, S.K.2
-
45
-
-
84866346316
-
Pulse quarantine strategy of internet worm propagation: modeling and analysis
-
Yao Y, Guo L, Guo H, Yu G, Gao FX, Tong XJ. Pulse quarantine strategy of internet worm propagation: modeling and analysis. Computational Electronics Engineering 2012; 38:1047-1061.
-
(2012)
Computational Electronics Engineering
, vol.38
, pp. 1047-1061
-
-
Yao, Y.1
Guo, L.2
Guo, H.3
Yu, G.4
Gao, F.X.5
Tong, X.J.6
-
46
-
-
42649108776
-
Epidemic state analysis of computers under malware attacks
-
Kondakci S. Epidemic state analysis of computers under malware attacks. Simulation Modelling Practice and Theory 2008; 16:571-584.
-
(2008)
Simulation Modelling Practice and Theory
, vol.16
, pp. 571-584
-
-
Kondakci, S.1
-
47
-
-
79251590254
-
Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered
-
Kondakci S, Dincer C. Internet epidemiology: healthy, susceptible, infected, quarantined, and recovered. Security in Communication Networks 2011; 4:216-238.
-
(2011)
Security in Communication Networks
, vol.4
, pp. 216-238
-
-
Kondakci, S.1
Dincer, C.2
-
48
-
-
84869469025
-
Probabilistic e-epidemic model on computer worms
-
2012, Dhaka, Bangladesh
-
Mishra BK, Goswami RT. Probabilistic e-epidemic model on computer worms. Proceedings of ICIEV 2012, Dhaka, Bangladesh, 2012; :1091-1096.
-
(2012)
Proceedings of ICIEV
, pp. 1091-1096
-
-
Mishra, B.K.1
Goswami, R.T.2
-
49
-
-
33750950472
-
Markovian modeling and analysis of Internet worm propagation
-
Reliability Engineering, Chicago, IL
-
Okamura H, Kobayashi H, Dohi T. Markovian modeling and analysis of Internet worm propagation, Proceedings of 16th IEEE International Symposium Software, Reliability Engineering, Chicago, IL, 2005; :149-158.
-
(2005)
Proceedings of 16th IEEE International Symposium Software
, pp. 149-158
-
-
Okamura, H.1
Kobayashi, H.2
Dohi, T.3
-
50
-
-
33746851221
-
Modeling viral agents and their dynamics with persistent turing machines and cellular automata
-
Lecture Notes Computer Science, Guilin, China, 4088
-
Hao J, Yin J, Zhang B. Modeling viral agents and their dynamics with persistent turing machines and cellular automata, Proceedings of 9th Pacific Rim International Conference Agent Computing and Multi-Agent Systems, Lecture Notes Computer Science, Guilin, China, 2006, 4088;690-695.
-
(2006)
Proceedings of 9th Pacific Rim International Conference Agent Computing and Multi-Agent Systems
, pp. 690-695
-
-
Hao, J.1
Yin, J.2
Zhang, B.3
-
51
-
-
77952567244
-
A computer virus spread model based on cellular automata of graphs
-
Lecture Notes Computer Science, Salamanca, Spain, 5518;
-
Martín del Rey A. A computer virus spread model based on cellular automata of graphs, Proceedings of 10th International Conference Artificial Neural Networks, Lecture Notes Computer Science, Salamanca, Spain, 2009, 5518; 503-506.
-
(2009)
Proceedings of 10th International Conference Artificial Neural Networks
, pp. 503-506
-
-
Martín del Rey, A.1
-
52
-
-
62949201688
-
Modeling malware propagation in complex networks based on cellular automata
-
Macao, China
-
Song Y, Jiang GP, Gu Y. Modeling malware propagation in complex networks based on cellular automata, Proceedings of 2008 IEEE Asia Pacific Conference on Circuits and Systems, Macao, China, 2008; :259-263.
-
(2008)
Proceedings of 2008 IEEE Asia Pacific Conference on Circuits and Systems
, pp. 259-263
-
-
Song, Y.1
Jiang, G.P.2
Gu, Y.3
-
53
-
-
84873149027
-
Stability analysis of computer virus model system in networks
-
Ge ST, Tang GY, Yang X, Xu QL, Yu H, Wang PD. Stability analysis of computer virus model system in networks. Applied Mechanics and Materials 2013; 278:2033-2038.
-
(2013)
Applied Mechanics and Materials
, vol.278
, pp. 2033-2038
-
-
Ge, S.T.1
Tang, G.Y.2
Yang, X.3
Xu, Q.L.4
Yu, H.5
Wang, P.D.6
-
54
-
-
84873325887
-
An agent-based model to simulate coordinated response to malware outbreak within and organization
-
Pan J, Fung CC. An agent-based model to simulate coordinated response to malware outbreak within and organization. International Journal of Information Security 2012; 5:115-131.
-
(2012)
International Journal of Information Security
, vol.5
, pp. 115-131
-
-
Pan, J.1
Fung, C.C.2
-
55
-
-
79955090308
-
A mathematical model for the effect of malicious object on computer network immune system
-
Saini DK. A mathematical model for the effect of malicious object on computer network immune system. Applied Mathematical Modelling 2011; 35:3777-3787.
-
(2011)
Applied Mathematical Modelling
, vol.35
, pp. 3777-3787
-
-
Saini, D.K.1
-
56
-
-
84872680733
-
A computer virus spreading model based on resource limitations and interaction costs
-
Huang CY, Lee CL, Wen TH, Sun CT. A computer virus spreading model based on resource limitations and interaction costs. Journal of Systems and Software 2013; 86:801-808.
-
(2013)
Journal of Systems and Software
, vol.86
, pp. 801-808
-
-
Huang, C.Y.1
Lee, C.L.2
Wen, T.H.3
Sun, C.T.4
-
58
-
-
0017228276
-
Qualitative analyses of communicable disease models
-
Hethcote HW. Qualitative analyses of communicable disease models. Mathematical Biosciences 1976; 28:335-356.
-
(1976)
Mathematical Biosciences
, vol.28
, pp. 335-356
-
-
Hethcote, H.W.1
-
60
-
-
0034486891
-
The mathematics of infectious diseases
-
Hethcote HW. The mathematics of infectious diseases. SIAM Review 2000; 42:599-653.
-
(2000)
SIAM Review
, vol.42
, pp. 599-653
-
-
Hethcote, H.W.1
-
61
-
-
0003801963
-
-
Wolfram Media Inc.: Champaign, Illinois, USA
-
Wolfram S. A New Kind of Science. Wolfram Media Inc.: Champaign, Illinois, USA, 2002.
-
(2002)
A New Kind of Science
-
-
Wolfram, S.1
-
62
-
-
0002353129
-
A brief history of cellular automata
-
Sarkar P. A brief history of cellular automata. ACM Computing Surveys 2000; 32:80-107.
-
(2000)
ACM Computing Surveys
, vol.32
, pp. 80-107
-
-
Sarkar, P.1
-
63
-
-
78649853511
-
-
AG Hoekstra, J Kroc, Sloot PMA (eds.) . Springer: Berlin, Heidelberg, Germany
-
AG Hoekstra, J Kroc, Sloot PMA (eds.) Simulating Complex Systems by Cellular Automata. Springer: Berlin, Heidelberg, Germany, 2010.
-
(2010)
Simulating Complex Systems by Cellular Automata
-
-
-
64
-
-
84884812495
-
Cellular automata to describe seismicity: a review
-
Jimenez A. Cellular automata to describe seismicity: a review. Acta Geophysica 2013; 61:1325-1350.
-
(2013)
Acta Geophysica
, vol.61
, pp. 1325-1350
-
-
Jimenez, A.1
-
65
-
-
84899547219
-
Modeling dynamics of HIV infected cells using stochastic cellular automata
-
Precharattana N, Triampo W. Modeling dynamics of HIV infected cells using stochastic cellular automata. Physica A 2014; 407:303-311.
-
(2014)
Physica A
, vol.407
, pp. 303-311
-
-
Precharattana, N.1
Triampo, W.2
-
66
-
-
84899587152
-
Addressing population heterogeneity and distribution in epidemics models using a cellular automata approach
-
López L, Burguerner G, Giovanini L. Addressing population heterogeneity and distribution in epidemics models using a cellular automata approach. BMC Res. Notes 2014; 7:234-245.
-
(2014)
BMC Res. Notes
, vol.7
, pp. 234-245
-
-
López, L.1
Burguerner, G.2
Giovanini, L.3
-
67
-
-
0030619791
-
A model for predicting forest fire spreading using cellular automata
-
Karafyllidis I, Thanailakis A. A model for predicting forest fire spreading using cellular automata. Ecological Modelling 1997; 99:87-97.
-
(1997)
Ecological Modelling
, vol.99
, pp. 87-97
-
-
Karafyllidis, I.1
Thanailakis, A.2
-
68
-
-
36049013617
-
Design and implementation of an integrated GIS-based cellular automata model to characterize forest fire behaviour
-
Yassemi S, Dragićević S, Schmidt M. Design and implementation of an integrated GIS-based cellular automata model to characterize forest fire behaviour. Ecological Modelling 2008; 210:71-84.
-
(2008)
Ecological Modelling
, vol.210
, pp. 71-84
-
-
Yassemi, S.1
Dragićević, S.2
Schmidt, M.3
-
73
-
-
34548305157
-
Modeling malware propagation in networks of smart cell phones with spatial dynamics
-
Anchorage, Alaska, USA
-
Ramachandran K, Sikdar B. Modeling malware propagation in networks of smart cell phones with spatial dynamics, Proceedings of 26th IEEE International Conference on Computer Communications, Anchorage, Alaska, USA, 2007; :2516-2520.
-
(2007)
Proceedings of 26th IEEE International Conference on Computer Communications
, pp. 2516-2520
-
-
Ramachandran, K.1
Sikdar, B.2
-
74
-
-
53949105871
-
The opportunistic transmission of wireless worms between mobile devices
-
Rhodes CJ, Nekovee M. The opportunistic transmission of wireless worms between mobile devices. Physica A 2008; 387:6837-6844.
-
(2008)
Physica A
, vol.387
, pp. 6837-6844
-
-
Rhodes, C.J.1
Nekovee, M.2
-
76
-
-
84875292903
-
A combinatorial model of malware diffusion via Bluetooth connections
-
Merler S, Jurmanm G . A combinatorial model of malware diffusion via Bluetooth connections. PLos ONE 8 2013. art. no. e59468.
-
(2013)
PLos ONE
, vol.8
-
-
Merler, S.1
Jurmanm, G.2
-
77
-
-
84902247607
-
Propagation model of smartphone worms based on semi-Markov process and social relationship graph
-
Peng S, Wu M, Wang G, Yu S. Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Computer Security 2014; 44:92-103.
-
(2014)
Computer Security
, vol.44
, pp. 92-103
-
-
Peng, S.1
Wu, M.2
Wang, G.3
Yu, S.4
-
78
-
-
84875215204
-
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones
-
Peng S, Wang G, Yu S. Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones. Journal of Computational and System Sciences 2013; 79:586-595.
-
(2013)
Journal of Computational and System Sciences
, vol.79
, pp. 586-595
-
-
Peng, S.1
Wang, G.2
Yu, S.3
|