DYNAMIC MODEL ON THE SPREAD OF BOTS FOR AN E-COMMERCE NETWORK
Abstract
Keywords
Full Text:
PDFReferences
B.K. Mishra, S.K. Pandey, Dynamic Model of worms with vertical transmission in computer network, Appl. Math. Comput. 217 (21) (2011) 8438–8446, Elsevier.
B.K. Mishra, S.K. Pandey, Fuzzy epidemic model for the transmission of worms in computer network, Nonlinear Anal.: Real world Appl. 11 (2010) 4335–4341.
B.K. Mishra, S.K. Pandey, Effect of antivirus software on infectious nodes in computer network: a mathematical model, Phys. Lett. A 376 (2012) 2389–2393. Elsevier.
B. Samanta, S. K. Pandey; Attacking Behaviour of Computer Worms on E-Commerce Network : A Dynamic Model; IJRASET; Vol. 2 Issue XII, Dec 2014.
Erol Gelenbe, Varol Kaptan, YuWang, Biological metaphors for agent behaviour, in: Computer and Information Sciences ISCIS 2004, 19th International Symposium, in: Lecturer Notes in Computer Science, vol. 3280, Springer-Verlag, 2004, pp. 667-675.
J.R.C. Piqueira, B.F. Navarro, L.H.A. Monteiro, Epidemiological models applied to virus in computer network, J. Comput. Sci. 1 (1), 2005, 31-34.
Y.Wang, C.X.Wang, Modelling the effect of timing parameters on virus propagation, in: 2003 ACM Workshop on Rapid Malcode, ACM, 2003, pp. 61-66.
S. Forest, S. Hofmeyr, A. Somayaji, T. Longstaff, Self-nonself discrimination in a computer, in: Proceeding of IEEE Symposium on Computer Security and Privacy, 1994, pp. 202-212.
Bimal K. Mishra, Navnit Jha, SEIQRS model for the transmission of malicious objects in computer network, Appl. Math. Model. 34 (2010) 710-715.
S. Yasin, K. Haseeb, R. Qureshi; “Cryptography Based E-Commerce Security: A Review”; IJCSI; V0l. 9, Issue 2, No 1, March 2012.
W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 115, 1927, 700-721.
W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 138, 1932, 55-83.
W.O. Kermack, A.G. McKendrick, Contributions of mathematical theory to epidemics, Proc. R. Soc. Lond. Ser. A 141, 1933, 94-122.
http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html#8
DOI: https://doi.org/10.26483/ijarcs.v8i7.4175
Refbacks
- There are currently no refbacks.
Copyright (c) 2017 International Journal of Advanced Research in Computer Science

