Sciweavers

734 search results - page 36 / 147
» Computer Virus Propagation Models
Sort
View
EUROCAST
2007
Springer
161views Hardware» more  EUROCAST 2007»
15 years 1 months ago
Using Verification Technology to Specify and Detect Malware
Abstract. Computer viruses and worms are major threats for our computer infrastructure, and thus, for economy and society at large. Recent work has demonstrated that a model checki...
Andreas Holzer, Johannes Kinder, Helmut Veith
IEEEARES
2006
IEEE
15 years 3 months ago
Bayesian Networks Implementation of the Dempster Shafer Theory to Model Reliability Uncertainty
In many reliability studies based on data, reliability engineers face incompleteness and incoherency problems in the data. Probabilistic tools badly handle these kinds of problems...
Christophe Simon, Philippe Weber
SAC
2005
ACM
15 years 3 months ago
Formal modeling and quantitative analysis of KLAIM-based mobile systems
KLAIM is an experimental language designed for modeling and programming distributed systems composed of mobile components where distribution awareness and dynamic system architect...
Rocco De Nicola, Diego Latella, Mieke Massink
IWNAS
2008
IEEE
15 years 4 months ago
Optimal Implementation of Continuous Data Protection (CDP) in Linux Kernel
To protect data and recover data in case of failures, Linux operating system has built-in MD device that implements RAID architectures. Such device can recover data in case of sin...
Xu Li, Changsheng Xie, Qing Yang
CORR
2010
Springer
155views Education» more  CORR 2010»
14 years 4 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...