The impact of countermeasure propagation on the prevalence of computer viruses.

IEEE Trans Syst Man Cybern B Cybern

Department of Engineering and Public Policy, Carnegie Mellon University, Pittsburgh, PA 15213, USA.

Published: April 2004

Countermeasures such as software patches or warnings can be effective in helping organizations avert virus infection problems. However, current strategies for disseminating such countermeasures have limited their effectiveness. We propose a new approach, called the Countermeasure Competing (CMC) strategy, and use computer simulation to formally compare its relative effectiveness with three antivirus strategies currently under consideration. CMC is based on the idea that computer viruses and countermeasures spread through two separate but interlinked complex networks-the virus-spreading network and the countermeasure-propagation network, in which a countermeasure acts as a competing species against the computer virus. Our results show that CMC is more effective than other strategies based on the empirical virus data. The proposed CMC reduces the size of virus infection significantly when the countermeasure-propagation network has properties that favor countermeasures over viruses, or when the countermeasure-propagation rate is higher than the virus-spreading rate. In addition, our work reveals that CMC can be flexibly adapted to different uncertainties in the real world, enabling it to be tuned to a greater variety of situations than other strategies.

Download full-text PDF

Source
http://dx.doi.org/10.1109/tsmcb.2003.817098DOI Listing

Publication Analysis

Top Keywords

computer viruses
8
viruses countermeasures
8
virus infection
8
countermeasure-propagation network
8
cmc
5
impact countermeasure
4
countermeasure propagation
4
propagation prevalence
4
computer
4
prevalence computer
4

Similar Publications

In the context of Chinese clinical texts, this paper aims to propose a deep learning algorithm based on Bidirectional Encoder Representation from Transformers (BERT) to identify privacy information and to verify the feasibility of our method for privacy protection in the Chinese clinical context. We collected and double-annotated 33,017 discharge summaries from 151 medical institutions on a municipal regional health information platform, developed a BERT-based Bidirectional Long Short-Term Memory Model (BiLSTM) and Conditional Random Field (CRF) model, and tested the performance of privacy identification on the dataset. To explore the performance of different substructures of the neural network, we created five additional baseline models and evaluated the impact of different models on performance.

View Article and Find Full Text PDF

JC polyomavirus (JCPyV) establishes a persistent, asymptomatic kidney infection in most of the population. However, JCPyV can reactivate in immunocompromised individuals and cause progressive multifocal leukoencephalopathy (PML), a fatal demyelinating disease with no approved treatment. Mutations in the hypervariable non-coding control region (NCCR) of the JCPyV genome have been linked to disease outcomes and neuropathogenesis, yet few metanalyses document these associations.

View Article and Find Full Text PDF

Within the framework of 6G networks, the rapid proliferation of Internet of Things (IoT) devices, coupled with their decentralized and heterogeneous characteristics, presents substantial security challenges. Conventional centralized systems face significant challenges in effectively managing the diverse range of IoT devices, and they are inadequate in addressing the requirements for reduced latency and the efficient processing and analysis of large-scale data. To tackle these challenges, this paper introduces a zero-trust access control framework that integrates blockchain technology with inner-product encryption.

View Article and Find Full Text PDF

Recognizing targets in infra-red images is an important problem for defense and security applications. A deployed network must not only recognize the known classes, but it must also reject any new or objects without confusing them to be one of the known classes. Our goal is to enhance the ability of existing (or pretrained) classifiers to detect and reject unknown classes.

View Article and Find Full Text PDF

A Review of CNN Applications in Smart Agriculture Using Multimodal Data.

Sensors (Basel)

January 2025

Institut de Recherche en Informatique de Toulouse, IRIT UMR5505 CNRS, 31400 Toulouse, France.

This review explores the applications of Convolutional Neural Networks (CNNs) in smart agriculture, highlighting recent advancements across various applications including weed detection, disease detection, crop classification, water management, and yield prediction. Based on a comprehensive analysis of more than 115 recent studies, coupled with a bibliometric study of the broader literature, this paper contextualizes the use of CNNs within Agriculture 5.0, where technological integration optimizes agricultural efficiency.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!