2010
DOI: 10.3724/sp.j.1016.2010.00562
|View full text |Cite
|
Sign up to set email alerts
|

Formal Definition of Generalized Virus and Its Identifying Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…Where 𝜔 is the original conversion factor between exposed node and infected node,𝛾 is the detection rate, which represents the probability that the ids intrusion detection system successfully detects the exposed node that is about to be converted into an infected node. 5.𝜇 is the immunity rate, some susceptible nodes, exposed nodes and infected nodes gain immunity to the virus because they upgrade their virus libraries in time.…”
Section: Model Constructionmentioning
confidence: 99%
See 2 more Smart Citations
“…Where 𝜔 is the original conversion factor between exposed node and infected node,𝛾 is the detection rate, which represents the probability that the ids intrusion detection system successfully detects the exposed node that is about to be converted into an infected node. 5.𝜇 is the immunity rate, some susceptible nodes, exposed nodes and infected nodes gain immunity to the virus because they upgrade their virus libraries in time.…”
Section: Model Constructionmentioning
confidence: 99%
“…The strategy of this method is to establish a virus database, use anti-virus software to store virus signature code information into the virus database, and then compare the newly intercepted virus samples with the existing virus sample signature code information to perform rapid virus identification and removal. The literature [5] proposes an algorithm for the detection and identification of filebased viruses. The strategy of this approach is that regardless of the code characteristics of the program or the technique used by the program, as long as a file is accessed that is not approved by the user, it is a virus.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The malicious code in firmware differs from traditional malicious code in the following aspects: First, on account of firmware mostly existed in Read Only Memory (ROM), Cohen's formal definition about virus is unsuitable for malicious code in firmware [8]. The memory cannot be written, so malicious code in firmware cannot copy and transmit at its pleasure like virus and worm.…”
Section: Particularity Analysis On Malicious Behaviour In Firmwarementioning
confidence: 99%