• No results found

Computer Virus

Delay induced Hopf bifurcation of an SVEIR computer virus model with nonlinear incidence rate

Delay induced Hopf bifurcation of an SVEIR computer virus model with nonlinear incidence rate

... into computer virus models due to latent period [3, 4], temporary immunity period [5, 12], or other reasons [9], because time delays may play a complicated role on the ...of computer virus ...

16

Hopf bifurcation of a computer virus spreading model in the network with limited anti virus ability

Hopf bifurcation of a computer virus spreading model in the network with limited anti virus ability

... A delayed computer virus spreading model in the network with limited anti-virus ability is proposed in the present paper. Local stability and the existence of a Hopf bifurcation are proved by taking ...

16

Optimal control of a computer virus model with network attacks

Optimal control of a computer virus model with network attacks

... Computer virus is a malicious mobile code that are intended to spread among computers and perform detrimental operations including virus, worm, logic bomb and so ...1986, computer virus ...

13

Analysis of Computer Virus Propagation Based on Compartmental Model

Analysis of Computer Virus Propagation Based on Compartmental Model

... of computer virus in a network. The spreading behavior of computer virus has studied by using different epidemiological ...between computer viruses and biological analogue, Cohen [15] ...

10

A delayed e epidemic SLBS model for computer virus

A delayed e epidemic SLBS model for computer virus

... the virus spread dynamics is most important for defence strategies and computer security ...the computer virus transmission dynamics, Murray [3] has suggested high similarities between ...

24

Modelling the Spread of Computer Virus under Users Computer Security Behaviour: An Agent Based Model

Modelling the Spread of Computer Virus under Users Computer Security Behaviour: An Agent Based Model

... Users computer security behaviour on the spread of computer ...of virus in order to predict future threats and its rate of infection over a period of ...that computer virus infection ...

7

A Comparison study of Computer Virus and Detection Techniques

A Comparison study of Computer Virus and Detection Techniques

... The Computer virus is a program which has the ability to replicate itself without anyone intervention and after that, the replicate program can replicate further,the same process goes on and ...virus.A ...

5

An enhanced performance model for metamorphic computer virus classification and detectioN

An enhanced performance model for metamorphic computer virus classification and detectioN

... Metamorphic computer virus employs various code mutation techniques to change its code to become new ...on computer virus classification and ...common virus statistical patterns was ...

53

Title: PRODUCTIVITY OF BUSINESS ENTERPRISES: EFFECT OF COMPUTER VIRUS INFECTION ON FILES

Title: PRODUCTIVITY OF BUSINESS ENTERPRISES: EFFECT OF COMPUTER VIRUS INFECTION ON FILES

... Computer virus infection is the process whereby the third part of the virus, the self – propagation component, allows the virus to quickly spread to other programs to which the virus is ...

15

Bifurcation analysis in a delayed computer virus model with the effect of external computers

Bifurcation analysis in a delayed computer virus model with the effect of external computers

... A delayed Susceptible-Infected-External (SIE) computer virus propagation model is investigated in the present paper. The linear stability conditions are obtained with characteristic root method. The Hopf ...

13

An Introduction of Computer Virus, History & its Evolution

An Introduction of Computer Virus, History & its Evolution

... The Computer Virus is a major issue at present which is very harmful for various software companies, government organizations, schools, colleges and also one who uses computer or smart phone (cell ...

8

Impact of impulsive detoxication on the spread of computer virus

Impact of impulsive detoxication on the spread of computer virus

... SIRS computer virus propagation model with impulsive detoxication and saturation ...the virus-free equilibrium is globally stable when the basic reproduction ratio (BRR) is less than unity, (b) the ...

18

The Legendary Era of Computer Virus and Their Detection

The Legendary Era of Computer Virus and Their Detection

... 4 virus advent kits to determine the degree of metamorphism provided by way of each and capable of precisely quantify the diploma of metamorphism produced by way of these virus ...Generation Virus ...

12

Spyware - The invisible computer virus

Spyware - The invisible computer virus

... your computer right now and may not be aware of ...your computer, usually without your knowledge, that transmits your personal information and or/web browsing habits to marketing and demographics ...your ...

8

Constructing computer virus phylogenies

Constructing computer virus phylogenies

... In the remainder of this section, we give an example of a species set for which various natural greedy approaches for constructing a phyloDAG lead to an fn ratio between the size number[r] ...

18

Numerical treatment of nonlinear model of virus propagation in computer networks: an innovative evolutionary Padé approximation scheme

Numerical treatment of nonlinear model of virus propagation in computer networks: an innovative evolutionary Padé approximation scheme

... A computer virus is a malicious code which executes harmful and unauthorized activities like erasing necessary files, accessing confidential data and personal information like pass- words, account numbers, ...

18

What you can do prevent virus infections on your computer

What you can do prevent virus infections on your computer

... a computer virus is delicate ...your computer may still end up getting infected with a ...of virus your computer is infected with, and also how you came to be aware of the ...home ...

8

COMPUTER SECURITY AND IMPACT ON COMPUTER SCIENCE EDUCATION

COMPUTER SECURITY AND IMPACT ON COMPUTER SCIENCE EDUCATION

... of computer security into the existing Computer Science undergraduate education is an urgent and complicated ...of computer intrusions, computer crimes and information wars, Computer ...

14

Computer veilig of computer niet : onderzoek naar de totstandkoming van computer beveiligingsgedrag

Computer veilig of computer niet : onderzoek naar de totstandkoming van computer beveiligingsgedrag

... Om een indicatie te krijgen van de samenhang met de overige constructen zijn de antwoorden op het ervaringsconstruct op een andere manier verwerkt. Een negatief antwoord heeft een score van 0 gekregen en een positief ...

87

Serious computer games in computer science education

Serious computer games in computer science education

... In this phase, students develop the game. It means that they have to create scene artefacts and all occurring characters with the use of various graphical tools. Students tackle these time consuming tasks in different ...

7

Show all 10000 documents...

Related subjects