Biblio
Filters: Keyword is Patching [Clear All Filters]
Interference of Cyber Endanger using Support Vector Machine. 2020 International Conference on Computer Communication and Informatics (ICCCI). :1–4.
.
2020. The wonder of cyberbullying, implied as persistent and repeated mischief caused through the use of PC systems, mobile phones, and noteworthy propelled contraptions. for instance, Hinduja and Patching upheld that 10-forty% of outlined children masses surrendered having dealt with it each as a harmed individual or as a with the guide of the use of-stander wherein additional progressively young individuals use development to issue, undermine, embarrass, or by and large burden their mates. Advanced badgering has starting at now been said as one which reason first rate harm to society and monetary machine. Advances in development related with web record remark and the assortment of the web associations renders the area and following of such models as a credibility hard and extremely problematic. This paper portrays a web structure for robotized revelation and seeing of Cyber-tormenting cases from on-line exchanges and on line associations. The device is mainly assembled completely absolutely as for the revelation of 3 basic ordinary language sections like Insults, Swears and 2d person. A sort machine and cosmology like reasoning had been contracted to go over the normality of such substances inside the trade board/web documents, which may conceivable explanation a message to security in case you have to take fitting improvement. The instrument has been dissected on staggering social occasions and achieves less steeply-esteemed acknowledgment displays.
Modeling Worm Propagation and Insider Threat in Air-Gapped Network using Modified SEIQV Model. 2019 13th International Conference on Signal Processing and Communication Systems (ICSPCS). :1—6.
.
2019. Computer worms pose a major threat to computer and communication networks due to the rapid speed at which they propagate. Biologically based epidemic models have been widely used to analyze the propagation of worms in computer networks. For an air-gapped network with an insider threat, we propose a modified Susceptible-Exposed-Infected-Quarantined-Vaccinated (SEIQV) model called the Susceptible-Exposed-Infected-Quarantined-Patched (SEIQP) model. We describe the assumptions that apply to this model, define a set of differential equations that characterize the system dynamics, and solve for the basic reproduction number. We then simulate and analyze the parameters controlled by the insider threat to determine where resources should be allocated to attain different objectives and results.