Detecting sources of computer viruses in networks
نویسندگان
چکیده
منابع مشابه
Detecting Undetectable Computer Viruses
Signature-based detection relies on patterns present in viruses and provides a relatively simple and efficient method for detecting known viruses. At present, most anti-virus systems rely primarily on signature detection. Metamorphic viruses are one of the most difficult types of viruses to detect. Such viruses change their internal structure, which provides an effective means of evading signat...
متن کاملEradicating Computer Viruses on Networks
Spread of computer viruses can be modeled as the SIS (susceptible-infected-susceptible) epidemic propagation. We show that in order to ensure the random immunization or the targeted immunization effectively prevent computer viruses propagation on homogeneous networks, we should install antivirus programs in every computer node and frequently update those programs. This may produce large work an...
متن کاملHybrid Model for Detecting Viruses in Mobile Networks
Malware is malicious software which disturbs the network computer operation, hacking the sensitive information and accesses the private systems. It is nothing but a program which is specifically designed to injure the computer it may be a virus or worm. So, in order to overcome this problem a two-layer network model is presented for simulating virus propagation through both Bluetooth and SMS. T...
متن کاملEvaluation of transesophageal echocardiography in detecting cardiac sources of emboli in ischemic stroke patients
Background: Embolus is one of the causes of ischemic stroke that can be due to cardiac sources such as valvular heart diseases and atrial fibrillation and atheroma of the aorta. Transesophageal echocardiography (TEE) is superior in identifying potential cardiac sources of emboli. Due to insufficient data on TEE findings in ischemic stroke in Iran, the present study was done to evaluate TEE in...
متن کاملTechnological networks and the spread of computer viruses
Computer infections such as viruses and worms spread over networks of contacts between computers, with different types of networks being exploited by different types of infections. Here we analyze the structures of several of these networks, exploring their implications for modes of spread and the control of infection. We argue that vaccination strategies that focus on a limited number of netwo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGMETRICS Performance Evaluation Review
سال: 2010
ISSN: 0163-5999
DOI: 10.1145/1811099.1811063