Freshly Printed - allow 10 days lead
Malware Diffusion Models for Modern Complex Networks
Theory and Applications
This book provides a comprehensive reference on malware diffusion models, showing how the proliferation of smartphones and tablets has precipitated the need for an increased awareness of malicious content, a serious concern for all types of network users, from laymen to experienced administrators.
Vasileios Karyotis (Author), M.H.R. Khouzani (Author)
9780128027141, Elsevier Science
Paperback, published 3 February 2016
324 pages
23.4 x 19 x 2.1 cm, 0.68 kg
Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks. Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.
Part 1. Malware diffusion modeling framework Chapter 1. Fundamentals of complex communications networks Chapter 2. Malware diffusion in wired and wireless complex networks Chapter 3. Early malware diffusion modeling methodologies Part 2. State-of-the-art malware modeling frameworks Chapter 4. Queuing-based malware diffusion modeling Chapter 5. Malware-propagative Markov random fields Chapter 6. Optimal control based techniques Chapter 7. Game-theoretic techniques Chapter 8. Qualitative comparison Part 3. Applications and the road ahead Chapter 9. Applications of state-of-the-art malware modeling frameworks Chapter 10. The road ahead Chapter 11. Conclusions Part 4. Appendices Appendix A. Systems of ordinary differential equations Appendix B. Elements of queuing theory and queuing networks Appendix C. Optimal control theory and Hamiltonians
Subject Areas: Computer networking & communications [UT], Computer security [UR], WAP [wireless technology TJKW]