Modeling and Threshold Sensitivity Analysis of Computer VirusEpidemic
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: This paper analyzed the methods and techniques used in mathematical modeling of biologicalepidemics to the domain of information technology. A new epidemic model has been proposed byincorporating a range of parameters rather than using constant parameters for a fixed population network. Allindividual nodes or computers are classified into four classes- susceptible, exposed, infected and immunized.Changes of population of these four classes with time and higher epidemic threshold are studied. Finallythreshold sensitivity analysis has been analyzed to take into account the appropriate measures to control thevirus epidemic.
Authors and Affiliations
Abidur Rahaman , Amran Bhuiyan , Md. Ahsan Habib , Z. H. Mozumder
Real-Time Link-Reliability Routing for QoS in Wireless Sensor Networks
This paper proposes a Real-Time Link Reliability Routing protocol for wireless sensor networks (WSNs). The protocol achieves to reduce packet deadline miss ratio while considering link reliability, two-hop veloci...
Gender related differences in the use of the Internet by university academics
Abstract: This paper reports in part some of the findings of a PhD study regarding visibility of gender issues in the use of the internet in university contexts. The study adopted a cross sectional descriptive surv...
Challenges In Cloud Computing on Security Issues And Solutions
Cloud computing is a technology concept that enables organizations or individuals to share various services in a seamless and cost-effective manner. Technology innovation and its adoption are two critical successful fact...
Research on Strongly Unforgeable Ring Signature Scheme Based on ID
Abstract : A ring signature system is strongly unforgeable if the ring signature is existential unforgeable and, given ring signatures on some message m, the adversary can not produce a new ring signature on m. Str...
Self Assured Deduplication System for Authorized Deduplication
Abstract: A hybrid cloud is a coalescence of public and private clouds bound together by either standardized or proprietary technology that alters information plus application movability. Proposed method aiming toexpedit...