2018
DOI: 10.1016/j.cnsns.2017.08.011
|View full text |Cite
|
Sign up to set email alerts
|

Modeling malware propagation using a carrier compartment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 31 publications
(18 citation statements)
references
References 26 publications
0
18
0
Order By: Relevance
“…Similar to the analysis of [8], we can verify that the positive cone D is a positive invariant set with respect to (3), where…”
Section: Parameters Notes Amentioning
confidence: 69%
See 4 more Smart Citations
“…Similar to the analysis of [8], we can verify that the positive cone D is a positive invariant set with respect to (3), where…”
Section: Parameters Notes Amentioning
confidence: 69%
“…For the classic malware propagation model, all nodes are divided into three classes depending on their states: susceptible (healthy), infected, and removed (immunized). Recently, Guillén and del Rey [8] studied a new malware propagation model using a carrier compartment. Some devices are not targeted by the malware (for example, IOS devices for Android malware), and they can be denoted as carrier devices.…”
Section: Modeling a Malware Propagation Modelmentioning
confidence: 99%
See 3 more Smart Citations