Efficient security patch distribution is of essential importance for updating anti-virus software to ensure effective and timely virus detection and cleanup. In this paper, we propose a mixed strategy of patch distribution to combine the advantages of the traditional centralized patch distribution strategy and decentralized patch distribution strategy. A novel network model that contains a central node and a multiplex network composed of patch dissemination network layer and virus propagation network layer is presented, and a competing spreading dynamical process on top of the network model that simulates the interplay between virus propagation and patch dissemination is developed. Such a new framework helps in effectively analyzing the imp...
Studies on the propagation of malware in mobile networks have revealed that the spread of malware ca...
Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In th...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
The distributed patch dissemination strategies are a promising alternative to the conventional centr...
The distributed patch dissemination strategies are a promising alternative to the conventional centr...
Virus and information spreading dynamics widely exist in complex systems. However, systematic study ...
The decentralized patch distribution mechanism holds significant promise as an alternative to its ce...
To cope with evolving computer viruses, antivirus programs must be periodically updated. Due to the ...
Computer viruses are evolving by developing multiple spreading mechanisms that are simultaneously us...
Contemporary distributed systems usually involve the spreading of information by means of ad-hoc dia...
The aim of this paper is to propose an optimal control strategy to face the propagation effects of a...
The effect of virus spreading in a telecommunication network, where a certain curing strategy is dep...
A new model for malicious file propagation and transmission in a computer network is formulated. Thi...
Abstract—The effect of virus spreading in a telecommunication network, where a certain curing strate...
Internet worms spread in an automated fashion and can cause tremendous damage in a short period. As ...
Studies on the propagation of malware in mobile networks have revealed that the spread of malware ca...
Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In th...
Due to copyright restrictions, the access to the full text of this article is only available via sub...
The distributed patch dissemination strategies are a promising alternative to the conventional centr...
The distributed patch dissemination strategies are a promising alternative to the conventional centr...
Virus and information spreading dynamics widely exist in complex systems. However, systematic study ...
The decentralized patch distribution mechanism holds significant promise as an alternative to its ce...
To cope with evolving computer viruses, antivirus programs must be periodically updated. Due to the ...
Computer viruses are evolving by developing multiple spreading mechanisms that are simultaneously us...
Contemporary distributed systems usually involve the spreading of information by means of ad-hoc dia...
The aim of this paper is to propose an optimal control strategy to face the propagation effects of a...
The effect of virus spreading in a telecommunication network, where a certain curing strategy is dep...
A new model for malicious file propagation and transmission in a computer network is formulated. Thi...
Abstract—The effect of virus spreading in a telecommunication network, where a certain curing strate...
Internet worms spread in an automated fashion and can cause tremendous damage in a short period. As ...
Studies on the propagation of malware in mobile networks have revealed that the spread of malware ca...
Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In th...
Due to copyright restrictions, the access to the full text of this article is only available via sub...