Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/11531/40201
Registro completo de metadatos
Campo DC Valor Lengua/Idioma
dc.contributor.authorVida Delgado, Rafael Ángeles-ES
dc.date.accessioned2019-09-02T16:16:05Z-
dc.date.available2019-09-02T16:16:05Z-
dc.date.issued01/01/2013es_ES
dc.identifier.issn1985-1553es_ES
dc.identifier.urihttp://hdl.handle.net/11531/40201-
dc.descriptionArtículos en revistases_ES
dc.description.abstractComputer viruses are evolving by developing multiple spreading mechanisms that are simultaneously used during the infection process. The identification of the nodes that allow a better spreading efficiency of these kind of viruses is becoming a determinant part of the defensive strategy against malware. These multi-vector viruses can be modeled in multi-layered networks in which each node belongs simultaneously to different layers, adapting the spreading vector to the properties of the layer. This way, the same virus has different propagation rates in each layer and also in the multi-layered network considered as a whole. The set of nodes selected as initial group of infected subjects can determine the final propagation of the infectiones-ES
dc.description.abstractComputer viruses are evolving by developing multiple spreading mechanisms that are simultaneously used during the infection process. The identification of the nodes that allow a better spreading efficiency of these kind of viruses is becoming a determinant part of the defensive strategy against malware. These multi-vector viruses can be modeled in multi-layered networks in which each node belongs simultaneously to different layers, adapting the spreading vector to the properties of the layer. This way, the same virus has different propagation rates in each layer and also in the multi-layered network considered as a whole. The set of nodes selected as initial group of infected subjects can determine the final propagation of the infectionen-GB
dc.format.mimetypeapplication/pdfes_ES
dc.language.isoes-ESes_ES
dc.rightsCreative Commons Reconocimiento-NoComercial-SinObraDerivada Españaes_ES
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/es/es_ES
dc.sourceRevista: Int. J. Complex Systems in Science, Periodo: 12, Volumen: , Número: , Página inicial: 97, Página final: 105es_ES
dc.titleIdentifying critical nodes in multi-layered networks under multi-vector malware attackes_ES
dc.typeinfo:eu-repo/semantics/articlees_ES
dc.description.versioninfo:eu-repo/semantics/publishedVersiones_ES
dc.rights.holderes_ES
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses_ES
dc.keywordsComputer viruses are evolving by developing multiple spreading mechanisms that are simultaneously used during the infection process. The identification of the nodes that allow a better spreading efficiency of these kind of viruses is becoming a determinant part of the defensive strategy against malware. These multi-vector viruses can be modeled in multi-layered networks in which each node belongs simultaneously to different layers, adapting the spreading vector to the properties of the layer. This way, the same virus has different propagation rates in each layer and also in the multi-layered network considered as a whole. The set of nodes selected as initial group of infected subjects can determine the final propagation of the infectiones-ES
dc.keywordsComputer viruses are evolving by developing multiple spreading mechanisms that are simultaneously used during the infection process. The identification of the nodes that allow a better spreading efficiency of these kind of viruses is becoming a determinant part of the defensive strategy against malware. These multi-vector viruses can be modeled in multi-layered networks in which each node belongs simultaneously to different layers, adapting the spreading vector to the properties of the layer. This way, the same virus has different propagation rates in each layer and also in the multi-layered network considered as a whole. The set of nodes selected as initial group of infected subjects can determine the final propagation of the infectionen-GB
Aparece en las colecciones: Artículos

Ficheros en este ítem:
Fichero Descripción Tamaño Formato  
identifying_JICSS_2013.pdf619,64 kBAdobe PDFVista previa
Visualizar/Abrir


Los ítems de DSpace están protegidos por copyright, con todos los derechos reservados, a menos que se indique lo contrario.