Part 1: MalwareInternational audienceMany existing research efforts in the field of malware proliferation aim at modelling and analysing its spread dynamics. Many malware dissemination models are based on the characteristics of biological disease spread in human populations. In this work, we utilise game theory in order to extend two very commonly used malware spread models (SIS and SIR) by incorporating defence strategies against malware proliferation. We consider three different security mechanisms, “patch”, “removal” and “patch and removal” on which our model is based. We also propose a cost-benefit model that describes optimal strategies the defender could follow when cost is taken into account. Lastly, as a way of illustration, we appl...
Malicious softwares or malwares for short have become a major security threat. While origi-nating in...
Since the number of compromised computers, or botnet, continues to grow, the cyber security problem ...
Cybersecurity plays an increasing role in today’s digital space, and its methods must keep pace with...
Copyright © Taylor & Francis Group, LLC. Literature in malware proliferation focuses on modeling a...
International audienceIn this paper, we consider a population of digital nodes (such as phones, comp...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
Nowadays, the Internet and computer networks play an increasing role in our modern society. However,...
A network user’s decision to start and continue using security products is based on economic conside...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Abstract. Attackers of computing resources increasingly aim to keep security compromises hidden from...
The field of cybersecurity plays a crucial role for building safer societies and more resilient comm...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
Abstract—Defining an optimal protection strategy against viruses, spam propagation or any other kind...
Packing, a method used by the ‘good guys ’ to protect their software from reverse engineering, is al...
Malicious softwares or malwares for short have become a major security threat. While origi-nating in...
Since the number of compromised computers, or botnet, continues to grow, the cyber security problem ...
Cybersecurity plays an increasing role in today’s digital space, and its methods must keep pace with...
Copyright © Taylor & Francis Group, LLC. Literature in malware proliferation focuses on modeling a...
International audienceIn this paper, we consider a population of digital nodes (such as phones, comp...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
Nowadays, the Internet and computer networks play an increasing role in our modern society. However,...
A network user’s decision to start and continue using security products is based on economic conside...
The increased reliance on the Internet has made information and communication systems more vulnerabl...
Abstract. Attackers of computing resources increasingly aim to keep security compromises hidden from...
The field of cybersecurity plays a crucial role for building safer societies and more resilient comm...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
Attacks on the Internet are characterized by several alarming trends: 1) increases in frequency; 2...
Abstract—Defining an optimal protection strategy against viruses, spam propagation or any other kind...
Packing, a method used by the ‘good guys ’ to protect their software from reverse engineering, is al...
Malicious softwares or malwares for short have become a major security threat. While origi-nating in...
Since the number of compromised computers, or botnet, continues to grow, the cyber security problem ...
Cybersecurity plays an increasing role in today’s digital space, and its methods must keep pace with...