UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Dynamic malware containment under an epidemic model with alert Journal article
Physica A: Statistical Mechanics and its Applications, 2017,Volume: 470,Page: 249-260
Authors:  Zhang, Tianrui;  Yang, Lu-Xing;  Yang, Xiaofan;  Wu, Yingbo;  Tang, Yuan Yan
Favorite  |  View/Download:7/0  |  Submit date:2018/10/30
Malware  Node-level Epidemic Model  Dynamic Malware Containment  Optimal Control  
A Modular Approach for Implementation of Honeypots in Cyber Security Journal article
International Journal of Applied Engineering Research, 2016,Volume: 11,Issue: 8,Page: 5446-5451
Authors:  Muneeb Mirza;  Muhammad Usman;  Robert P. Biuk-Aghai;  Simon Fong
Favorite  |  View/Download:5/0  |  Submit date:2019/02/13
Antimalware  Antivirus  Cyber Security  Honeypots  Intrusion Detection System  Network Security  Signature  
On malware leveraging the Android accessibility framework Conference paper
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, Tokyo, Japan, 122, 2013 - 124, 2013
Authors:  Kraunelis, Joshua;  Chen, Yinjie;  Ling, Zhen;  Fu, Xinwen;  Zhao, Wei
Favorite  |  View/Download:3/0  |  Submit date:2018/11/06
Cyber security and privacy issues in smart grids Journal article
IEEE Communications Surveys and Tutorials, 2012,Volume: 14,Issue: 4,Page: 981
Authors:  Liu J.;  Xiao Y.;  Li S.;  Liang W.;  Chen C.L.P.
View  |  Adobe PDF(1244Kb)  |  Favorite  |  View/Download:220/6  |  Submit date:2018/10/30
Accountability  Ami  Privacy  Scada  Security  Smart Grid