2020
DOI: 10.1109/access.2020.2969430
|View full text |Cite
|
Sign up to set email alerts
|

A Cost-Effective Algorithm for Selecting Optimal Bandwidth to Clear Malicious Codes

Abstract: Malicious code has posed a severe threat to modern society. Delivering antivirus program to networks is an important task of a cybersecurity company. As the bandwidth resource in a company is limited and precious, cybersecurity companies have to make a tradeoff between the impact(i.e. the economic loss) of malicious codes and the bandwidth assigned to transmit the antivirus programs. This paper addresses the malicious code and bandwidth tradeoff(MCBT) problem. By developing a novel malicious code and antivirus… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 32 publications
0
1
0
Order By: Relevance
“…Additionally, the follow-up work arrangement is as follows. Firstly, time delays (e.g., [19,20]), pulses (e.g., [21,22]), random fluctuations (e.g., [23,24]), and optimal control strategies (e.g., [25][26][27]) can be considered in the new model. Secondly, the new model may be extended on wireless sensor networks (e.g., [28][29][30]) and social networks (e.g., [31]).…”
Section: Discussionmentioning
confidence: 99%
“…Additionally, the follow-up work arrangement is as follows. Firstly, time delays (e.g., [19,20]), pulses (e.g., [21,22]), random fluctuations (e.g., [23,24]), and optimal control strategies (e.g., [25][26][27]) can be considered in the new model. Secondly, the new model may be extended on wireless sensor networks (e.g., [28][29][30]) and social networks (e.g., [31]).…”
Section: Discussionmentioning
confidence: 99%