<p>Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and t
Malware Diffusion Models for Wireless Complex Networks. Theory and Applications
โ Scribed by Karyotis, Vasileios; Khouzani, M.H.R
- Publisher
- Elsevier : Morgan Kaufman
- Year
- 2016
- Tongue
- English
- Leaves
- 320
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tablets, and their increased capabilities, has propelled the intensity of malware spreading and increased its consequences in social life and the global economy, this book provides the theoretical aspect of malware dissemination, also presenting modeling approaches that describe the behavior and dynamics of malware diffusion in various types of wireless complex networks.
Sections include a systematic introduction to malware diffusion processes in computer and communications networks, an analysis of the latest state-of-the-art malware diffusion modeling frameworks, such as queuing-based techniques, calculus of variations based techniques, and game theory based techniques, also demonstrating how the methodologies can be used for modeling in more general applications and practical scenarios.
โฆ Table of Contents
Content:
Half Title Page,Title Page,Copyright,Table of Contents,Preface,List of Figures,List of TablesEntitled to full textPart 1Part 1 - MALWARE DIFFUSION MODELING FRAMEWORK, Pages 1-2
Chapter 1 - Fundamentals of complex communications networks, Pages 3-26
Chapter 2 - Malware diffusion in wired and wireless complex networks, Pages 27-38
Chapter 3 - Early malware diffusion modeling methodologies, Pages 39-60
Part 2 - STATE-OF-THE-ART MALWARE MODELING FRAMEWORKS, Pages 61-62
Chapter 4 - Queuing-based malware diffusion modeling, Pages 63-106
Chapter 5 - Malware-propagative Markov random fields, Pages 107-138
Chapter 6 - Optimal control based techniques, Pages 139-154
Chapter 7 - Game-theoretic techniques, Pages 155-168
Chapter 8 - Qualitative comparison, Pages 169-178
Part 3 - APPLICATIONS AND THE ROAD AHEAD, Pages 179-180
Chapter 9 - Applications of state-of-the-art malware modeling frameworks, Pages 181-214
Chapter 10 - The road ahead, Pages 215-222
Chapter 11 - Conclusions, Pages 223-226
Part 4 - APPENDICES, Pages 227-228
Appendix A - Systems of ordinary differential equations, Pages 229-234
Appendix B - Elements of queuing theory and queuing networks, Pages 235-254
Appendix C - Optimal control theory and Hamiltonians, Pages 255-282
References, Pages 283-292
Author Index, Pages 293-298
Pages 299-302
๐ SIMILAR VOLUMES
<p><span>This book comprehensively discusses the development, application and challenges of network slicing technology in wireless communications. Starting with the basic concept and enabling technologies of network slicing, this book introduces how to integrate AI (Artificial Intelligence) technolo
This unified treatment of game theory focuses on finding state-of-the-art solutions to issues surrounding the next generation of wireless and communications networks. Future networks will rely on autonomous and distributed architectures to improve the efficiency and flexibility of mobile application
<p>* The first tutorial-style book that gives all the relevant theory at the right level of rigor, for the wireless communications engineer.</p> <p>* Bridges the gap between theory and practice by giving examples and case studies showing how game theory can solve real-word problems.</p> <p>* Contain