Thwarting Network Stealth Worms in Computer Networks through Biological Epidemiology
نویسندگان
چکیده
ii Dedication iii Acknowledgments iv List of Figures ix List of Tables x
منابع مشابه
A Survey of Anomaly Detection Approaches in Internet of Things
Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion Detection System is required to detect and to prevent attacks from malicious nodes. In this ...
متن کاملComparison of Artificial Neural Networks and Cox Regression Models in Prediction of Kidney Transplant Survival
Cox regression model serves as a statistical method for analyzing the survival data, which requires some options such as hazard proportionality. In recent decades, artificial neural network model has been increasingly applied to predict survival data. This research was conducted to compare Cox regression and artificial neural network models in prediction of kidney transplant survival. The prese...
متن کاملComparison of Artificial Neural Networks and Cox Regression Models in Prediction of Kidney Transplant Survival
Cox regression model serves as a statistical method for analyzing the survival data, which requires some options such as hazard proportionality. In recent decades, artificial neural network model has been increasingly applied to predict survival data. This research was conducted to compare Cox regression and artificial neural network models in prediction of kidney transplant survival. The prese...
متن کاملEpidemic Spreading in Technological Networks
computer security, viruses, worms, infection models, scale-free networks, small world networks, epidemiology, BICAS Recent computer worms pose a major threat to large computer networks, and it is a general belief that understanding their means of propagation will help to devise efficient control strategies. This dissertation proposes a new epidemiological model to account for particular charact...
متن کاملIn Search of a More Insidious Worm
The Internet has been the victim of numerous worms in the last few years. All such worms have a common underlying principle: launch a blitzkrieg-like attack with wide fan-out. These worms’ operations constituted large denial-ofservice attacks, which disrupted the normal operation of the Internet and made many resources inaccessible. These worms are examples of a historical tendency to write wor...
متن کامل