Freshly Printed - allow 10 days lead
Couldn't load pickup availability
Malware Diffusion Models for Modern Complex Networks
Theory and Applications
This book provides a comprehensive reference on malware diffusion models, showing how the proliferation of smartphones and tablets has precipitated the need for an increased awareness of malicious content, a serious concern for all types of network users, from laymen to experienced administrators.
Vasileios Karyotis (Author), M.H.R. Khouzani (Author)
9780128027141, Elsevier Science
Paperback, published 3 February 2016
324 pages
23.4 x 19 x 2.1 cm, 0.68 kg
Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks.
Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.
Part 1. Malware diffusion modeling framework
Chapter 1. Fundamentals of complex communications networks
Chapter 2. Malware diffusion in wired and wireless complex networks
Chapter 3. Early malware diffusion modeling methodologies
Part 2. State-of-the-art malware modeling frameworks
Chapter 4. Queuing-based malware diffusion modeling
Chapter 5. Malware-propagative Markov random fields
Chapter 6. Optimal control based techniques
Chapter 7. Game-theoretic techniques
Chapter 8. Qualitative comparison
Part 3. Applications and the road ahead
Chapter 9. Applications of state-of-the-art malware modeling frameworks
Chapter 10. The road ahead
Chapter 11. Conclusions
Part 4. Appendices
Appendix A. Systems of ordinary differential equations
Appendix B. Elements of queuing theory and queuing networks
Appendix C. Optimal control theory and Hamiltonians
Subject Areas: Computer networking & communications [UT], Computer security [UR], WAP [wireless technology TJKW]