Fig 3 - uploaded by Enda Howley
Content may be subject to copyright.
This graph shows the infection level caused by progressive viruses entered onto a network of 100, 000 nodes using the nodes infection ratio. Graph (a) shows an individual run while (b) shows the average number of infected nodes over 100 runs.

This graph shows the infection level caused by progressive viruses entered onto a network of 100, 000 nodes using the nodes infection ratio. Graph (a) shows an individual run while (b) shows the average number of infected nodes over 100 runs.

Source publication
Article
Full-text available
Computer viruses pose a signiflcant security threat to orga- nizations and computer users today. Viruses can propagate rapidly across networks through emails that are sent from user to user, such networks have been shown to possess a scale free1 conflguration. This paper2 inves- tigates the outcome of allowing nodes on a scale free network to choos...

Contexts in source publication

Context 1
... following sections present a series of experiments using the models proposed and specified in Section 3.1. Individual nodes calculate their infection ratio based on Equation (1) and then implement an antivirus defence level based on Equation (3). Fig. 3 shows the number of infections that occur each time a new virus is introduced onto the ...
Context 2
... . This graph shows the infection level caused by progressive viruses entered onto a network of 100, 000 nodes using the nodes infection ratio. Graph (a) shows an individual run while (b) shows the average number of infected nodes over 100 runs. Fig. 3(a) shows a single run where total numbers of infected nodes are shown after viruses are introduced and let propagate. Only on the rare occasion does a virus fail to infect more than 10 nodes. 78% of the time at least 3 4 of the total population was infected by a virus while 22% of the time less than 10 infections occurred. It is clear ...

Similar publications

Article
Full-text available
We investigated visual working memory (VWM) with a whole-report task, where participants were asked to sequentially recall all the items in an order either chosen by themselves (free recall) or randomly chosen by the computer (forced recall). Comparisons between free and forced recalls helped us understand important but largely neglected aspects of...

Citations

Conference Paper
Full-text available
Virtual private network was developed to help users protect and better control their internet connection. However, virtual private network cannot protect users from viruses, hacking attempt or generally anything bad. Many techniques are proposed such as antivirus protection technique that is designed to detect and remove software viruses, and other malicious software like worms, trojans, and more. But this technique does not protect users from intruders. In this research, we proposed an integrated security system for home users. Using this system, we can provide security from both internal i.e. antivirus and external layers i.e. virtual private network. The aim of this research is to provide an integrated system that will protect the home users from intruders and other viruses.