Abstract. Over the last decade we have witnessed the rapid prolifera-tion of online networks and Internet activity. Such activity is considered as a blessing but it brings with it a large increase in risk of computer mal-ware — malignant software that actively spreads from one computer to another. To date, the majority of existing models of malware spread use stochastic behavior, when the set of neighbors infected from the current set of infected nodes is chosen obliviously. In this work, we initiate the study of adversarial infection strategies which can decide intelligently which neighbors of infected nodes to infect next in order to maximize their spread, while maintaining a similar “signature ” as the oblivious stochastic infection stra...
Abstract. One of the popular models to describe computer worm propagation is the Susceptible-Infecte...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
In this dissertation, we consider the problem of controlling recurrent epidemic processes. Such proc...
Abstract. Over the last decade we have witnessed the rapid prolifera-tion of online networks and Int...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
Abstract—Understanding the spreading dynamics of computer viruses (worms, attacks) is an important r...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solut...
This work provides an information-theoretic view to better understand the relationships between aggr...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
Understanding the dynamics of computer virus (malware, worm) in cyberspace is an important problem t...
Local interactions on a graph will lead to global dynamic behaviour. In this thesis we focus on two ...
Computer viruses are evolving by developing multiple spreading mechanisms that are simultaneously us...
Abstract—We study epidemic spreading processes in large networks, when the spread is assisted by a s...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Abstract. One of the popular models to describe computer worm propagation is the Susceptible-Infecte...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
In this dissertation, we consider the problem of controlling recurrent epidemic processes. Such proc...
Abstract. Over the last decade we have witnessed the rapid prolifera-tion of online networks and Int...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
Abstract—Understanding the spreading dynamics of computer viruses (worms, attacks) is an important r...
The purpose of this article is to extend related research on the spread of malware in networks and t...
Rapidly-spreading malicious software is an important threat on today’s computer networks. Most solut...
This work provides an information-theoretic view to better understand the relationships between aggr...
This work examines propagation of cyber-threats over networks under an adversarial formulation. Expl...
Understanding the dynamics of computer virus (malware, worm) in cyberspace is an important problem t...
Local interactions on a graph will lead to global dynamic behaviour. In this thesis we focus on two ...
Computer viruses are evolving by developing multiple spreading mechanisms that are simultaneously us...
Abstract—We study epidemic spreading processes in large networks, when the spread is assisted by a s...
Security breaches and attacks are critical problems in today’s networking. A key-point is that the s...
Abstract. One of the popular models to describe computer worm propagation is the Susceptible-Infecte...
There are the two common means for propagating worms: scanning vulnerable computers in the network a...
In this dissertation, we consider the problem of controlling recurrent epidemic processes. Such proc...