Please use this identifier to cite or link to this item:
http://ir.futminna.edu.ng:8080/jspui/handle/123456789/10991
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Falaye, A. A., | - |
dc.contributor.author | Etuk, S. O., | - |
dc.contributor.author | Ugwuoke, C. U., | - |
dc.contributor.author | ADAMA, Victor Ndako | - |
dc.contributor.author | Olujimi, O., | - |
dc.contributor.author | Seun, A. | - |
dc.date.accessioned | 2021-07-22T13:10:47Z | - |
dc.date.available | 2021-07-22T13:10:47Z | - |
dc.date.issued | 2017-04-04 | - |
dc.identifier.citation | Falaye, A. A., Etuk, S. O., Adama, N. V., Ugwuoke, C. U., Olujimi, O., & Seun, A. (2017). Parametric equation for capturing dynamics of cyber-attack malware transmission with mitigation on computer network. International Journal Mathematical Sciences and Computing, 2017, 4, 37-51. MECS (http://www.mecs-press.net) DOI: 10.5815/ijmsc.2017.04.04 | en_US |
dc.identifier.issn | DOI: 10.5815/ijmsc. | - |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/10991 | - |
dc.description.abstract | One distress of network and data security professionals and advisers globally is about the abilities of infectious malicious agents (Malware) to invade the entire network terminals to wreak havoc extending from identity theft, financial fraud to systemic digital assault on critical national resources. This work studies the behavioural dynamics of the susceptible, infected, the recovered terminals on the mobile wireless network and the effective use of antivirus security signature as countermeasure. Solving for stability state, we found out that its Eigen value gives a positive value which means that the stability is at an unstable state. Using Homotopy perturbation to calculate the approximate solution of the system. The expression derived was simulated using a mathematical tool (mat lab). | en_US |
dc.description.sponsorship | Self | en_US |
dc.language.iso | en | en_US |
dc.publisher | International Journal Mathematical Sciences and Computing | en_US |
dc.subject | Homotopy | en_US |
dc.subject | Pertubation | en_US |
dc.subject | Method | en_US |
dc.subject | SIR model | en_US |
dc.subject | Malicious ware | en_US |
dc.subject | Stability | en_US |
dc.subject | Equillibrium | en_US |
dc.title | Parametric equation for capturing dynamics of cyber-attack malware transmission with mitigation on computer network | en_US |
dc.type | Article | en_US |
Appears in Collections: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2017 Parametric Equation for Capturing Dynamics of Cyber Attack Malware Transmission with Mitigation on Computer Network.pdf | 499.34 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.