This research emphasizes to establish an e-VEIRS (vulnerable, exhibited, infected, restored) widespread computer network model to examine the spread of malicious program in a computer network and deduce the estimated threshold requirement to explore the balance and stability of the model. The author has simulated the outputs of several parameters applied in the model and Runge-Kutta Fehlberg fourth-fifth order method is applied to obtain the solution of equations developed. They have examined the stability of the level of crime to reach equilibrium and discovered the crucial value of the threshold to determine if the contagious free equilibrium is asymptotically stable on a global scale and endemic equilibrium is asymptotically stable. on a...
At present, malware is still a major security threat to computer networks. However, only a fraction ...
A new model for malicious file propagation and transmission in a computer network is formulated. Thi...
Celem pracy było zademonstrowanie możliwości użycia modelu epidemiologicznego do symulowania rozprze...
This study focuses on the potential threat for virus spread in complex computer networks using epide...
The mathematical model of computer Malware remains a challenging research area for modeling and simu...
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation ...
This paper investigates the mathematical modelling of cybercrime attacks on multiple devices connect...
Based on that the computer will be infected by infected computer and exposed computer, and some of t...
The dissemination of countermeasures is widely recognized as one of the most effective strategies of...
In this paper, an attempt has been made to develop a compartmental Epidemic model on the transmissio...
The major way of attack in cyber world is cyber war. Cyber war is a form of war which takes places o...
We investigate the various conditions that control the extinction and stability of a nonlinear mathe...
The increase in the number of computer viruses can be modeled with a mathematical model of the sprea...
This paper intends to investigate the impact of external computers and removable devices on virus sp...
This paper describes a new computer virus spreading model which takes into account the possibility o...
At present, malware is still a major security threat to computer networks. However, only a fraction ...
A new model for malicious file propagation and transmission in a computer network is formulated. Thi...
Celem pracy było zademonstrowanie możliwości użycia modelu epidemiologicznego do symulowania rozprze...
This study focuses on the potential threat for virus spread in complex computer networks using epide...
The mathematical model of computer Malware remains a challenging research area for modeling and simu...
Computer viruses remain a significant threat to computer networks. In this paper, the incorporation ...
This paper investigates the mathematical modelling of cybercrime attacks on multiple devices connect...
Based on that the computer will be infected by infected computer and exposed computer, and some of t...
The dissemination of countermeasures is widely recognized as one of the most effective strategies of...
In this paper, an attempt has been made to develop a compartmental Epidemic model on the transmissio...
The major way of attack in cyber world is cyber war. Cyber war is a form of war which takes places o...
We investigate the various conditions that control the extinction and stability of a nonlinear mathe...
The increase in the number of computer viruses can be modeled with a mathematical model of the sprea...
This paper intends to investigate the impact of external computers and removable devices on virus sp...
This paper describes a new computer virus spreading model which takes into account the possibility o...
At present, malware is still a major security threat to computer networks. However, only a fraction ...
A new model for malicious file propagation and transmission in a computer network is formulated. Thi...
Celem pracy było zademonstrowanie możliwości użycia modelu epidemiologicznego do symulowania rozprze...