Open Access
ITM Web Conf.
Volume 47, 2022
2022 2nd International Conference on Computer, Communication, Control, Automation and Robotics (CCCAR2022)
Article Number 01008
Number of page(s) 13
Section Computer Science and System Design, Application
Published online 23 June 2022
  1. Dawes P D. The evolution of computer viruses. Part 1: A compelling analogy with biological virus, Med J Aust. 157 (1992) 196–197. [Google Scholar]
  2. Chakkaravarthy S S, Sangeetha D and Vaidehi. A Survey on malware analysis and mitigation techniques, Comput. Sci. Rev. 32 (2019) 1–23. [CrossRef] [MathSciNet] [Google Scholar]
  3. Aslan Ö A and Samet R. “A Comprehensive Review on Malware Detection Approaches,”in IEEE Access, vol. 8, pp. 6249–6271, 2020, doi: 10.1109/ACCESS.2019.2963724. [CrossRef] [Google Scholar]
  4. Levine J G, Grizzard J B and Owen H L. “Using honeynets to protect large enterprise networks,”in IEEE Security & Privacy, vol. 2, no. 6, pp. 73–75, Nov.-Dec. 2004, doi: 10.1109/MSP.2004.115. [CrossRef] [Google Scholar]
  5. Chin W Y, Markatos E. P, and Ioannidis S. “HoneyLab: Large-Scale Honeypot Deployment and Resource Sharing,” 2009 Third International Conference on network and System Security, 2009, pp. 381–388, doi: 10.1109/NSS.2009.65. [CrossRef] [Google Scholar]
  6. Fan W j, Fernandez D, Du Z H. Versatile virtual honeynet management framework, IET. Inf. Secur. 11 (2017) 38–45. [CrossRef] [Google Scholar]
  7. Ren J G, Xu Y H. A compartmental model to explore the interplay between virus epidemics and honeynet potency, appl. Math. Model. 59 (2018) 86–99. [CrossRef] [MathSciNet] [Google Scholar]
  8. Fu Q, Yao Y, Sheng C et al. “Interplay Between Malware Epidemics and Honeynet Potency in Industrial Control System network,”in IEEE Access, vol. 8, pp. 81582–81593, 2020, doi: 10.1109/ACCESS.2020.2989612. [CrossRef] [Google Scholar]
  9. ‘The Value of Honeypots, Part One: Definitions and Values of Honeypots’. Available at, accessed 16 June 2015. [Google Scholar]
  10. Capalik A. “Next-Generation Honeynet Technology with Real-Time Forensics for U.S. Defense,” MILCOM 2007 - IEEE Military Communications Conference, 2007, pp. 1–7, doi: 10.1109/MILCOM.2007.4455171. [Google Scholar]
  11. Alexeev A, Henshel D S, Cains M, et al. “On the malware propagation in heterogeneous networks,”2016 IEEE 12th International Conference on Wireless and Mobile Computing, networking and Communications (WiMob), 2016, pp. 1–5, doi: 10.1109/WiMOB.2016.7763252. [Google Scholar]
  12. Yang L-X, Yang X. The effect of network topology on the spread of computer viruses: a modelling study, Int. J. Comput. Math. 94 (2017) 1591–1608. [CrossRef] [MathSciNet] [Google Scholar]
  13. Judd K, Small M, Stemler T. What exactly are the properties of scale-free and other networks? EPL. 103 (2012) [Google Scholar]
  14. Dangalchev C. Generation models for scale-free networks, Phys. A. 338 (2004) 659–671. [CrossRef] [MathSciNet] [Google Scholar]
  15. Hurford A, Cownden D, Day T. Next-generation tools for evolutionary invasion analyses, J. R. Soc. Interface. 7 (2010) 561–571. [CrossRef] [Google Scholar]
  16. Diekmann O, Heesterbeek G A P, Roberts M G. The construction of next-generation matrices for compartmental epidemic models, J. R. Soc. Interface. 7 (2010) 873–885. [CrossRef] [Google Scholar]
  17. Berman A, Plemmons R J. Nonnegative Matrices in the Mathematical Sciences, Academic Press, New York, 1979. [Google Scholar]
  18. Lasalle J P. The Stability of Dynamical Systems, in: Regional Conference Series in Applied Mathematics, SIAM, Philadelphia, 1976. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.