Computer Malware Propagation and Control

Seun Joseph Ale Momor Victor O 42 PAGES (6842 WORDS) Project
Subscribe to access this work and thousands more

A major grief of network and data security experts and consultants universally is about the capabilities of infectious malicious proxies (Malware) to overrun the whole systems on networks stations in order to inflict mayhem encompassing identity theft, financial scam and systemic digital assault on infrastructures and national resources. In this work, we studied the interactions of two vulnerable classes with the infected and recovered terminals on the systems network and the active use of anti-malware safety signature as counter- measure. Solving for the local and global stability state, we found them to be both asymptotically stable. The expression derived was simulated using maple mathematical tool. Finally, our results and findings were displayed.

Subscribe to access this work and thousands more
Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Seun Joseph, A (2018). Computer Malware Propagation and Control. Afribary.com: Retrieved May 06, 2021, from https://afribary.com/works/computer-malware-propagation-and-control

MLA 8th

Ale, Seun Joseph. "Computer Malware Propagation and Control" Afribary.com. Afribary.com, 13 Nov. 2018, https://afribary.com/works/computer-malware-propagation-and-control . Accessed 06 May. 2021.

MLA7

Ale, Seun Joseph. "Computer Malware Propagation and Control". Afribary.com, Afribary.com, 13 Nov. 2018. Web. 06 May. 2021. < https://afribary.com/works/computer-malware-propagation-and-control >.

Chicago

Ale, Seun Joseph. "Computer Malware Propagation and Control" Afribary.com (2018). Accessed May 06, 2021. https://afribary.com/works/computer-malware-propagation-and-control