Computer viruses are major threats to Internet security and privacy, therefore many researchers are addressing questions linked to virus propagation properties, spreading models, epidemic dynamics, tipping points, and control strategies. We believe that two important factors – resource limitations and costs – are being overlooked in this area due to an overemphasis on power-law connectivity distributions of scale-free networks affecting computer virus epidemic dynamics and tipping points. The study show (a) a significant epidemic tipping point does exists when resource limitations and costs are considered, with the tipping point exhibiting a lower bound; (b) when interaction costs increase or usable resources decrease, epidemic tipping points in scale-free networks grow linearly while density curves decrease linearly; (c) regardless of whether Internet user resources obey delta, uniform, or normal distributions, they retain the same epidemic dynamics and tipping points as long as the average value of those resources remains unchanged across different scale-free networks; (d) it is possible to control the spread of a computer virus in a scale-free network if resources are restricted and if costs associated with infection events are significantly increased through the use of a throttling strategy. The proposed model shows how resource and costs influence the epidemic dynamics of computer viruses in scale-free networks. A significant tipping point does exists on the epidemic dynamics of computer viruses when resource and costs are considered. It is possible to control the spread of a computer virus if resources are restricted and if costs significantly increased.
Related Content
Emotion Prediction from Physiological Signals: A Comparison Study Between Visual and Auditory Elicitors
Unlike visual stimuli, little attention has been paid to auditory stimuli in terms of emotion prediction with physiological signals. This paper aimed to investigate whether auditory stimuli can be used as an effective elicitor as visual stimuli for emotion prediction using physiological channels....


Hierarchical multi-channel hidden semi Markov graphical models for activity recognition
Recognizing human actions from a stream of unsegmented sensory observations is important for a number of applications such as surveillance and human-computer interaction. A wide range of graphical models have been proposed for these tasks, and are typically extensions of the generative hidden Mar...
A Framework for Adaptive Fault-Tolerant Execution of Workflows in the Grid: Empirical and Theoretical Analysis
In this paper, we propose and evaluate a framework for fault tolerant workflow execution in Grid environments. Different from previous work in the literature, our system dynamically chooses an appropriate fault tolerance technique while using a user-defined rule-based system. We also provide a ge...


A New Electric Dipole Model for Lightning-Aircraft Electrodynamics
As commercial and military aircraft continue to be subject to direct lightning flashes, there is a great need to characterize correctly the electrical currents and electric potential fluctuations on an aircraft to determine alternative design approaches to minimizing the severity of the lightning...
A systematic review on cloud computing
Cloud computing is an ascending technology that has introduced a new paradigm by rendering a rational computational model possible. It has changed the dynamics of IT consumption by means of a model that provides on-demand services over the Internet. Unlike the traditional hosting service, cloud c...

Recursive Head Reconstruction from Multi-View Video Sequences
Face reconstruction from images has been a core topic for the last decades, and is now involved in many applications such as identity verification or human-computer interaction. The 3D Morphable Model introduced by Blanz and Vetter has been widely used to this end, because its specific 3D modelin...
A blendshape model that incorporates physical interaction
The linear blendshape technique has been intensively used for computer animation and games because of its simplicity and effectiveness. However, it cannot describe rotational deformations and deformations because of self collision or scene interaction. In this paper, we present a new technique to...

Stackelberg game to derive the limits of energy saving for the allocation of data center resources
Energy related costs are becoming one of the largest contributors to the overall cost of operating a data center, whereas the degree of data center utilization continues to be very low. An energy-aware dynamic provision of resources based on the consolidation of existing application instances can...
Carlisle 25 urban flood event simulation using cellular automata-based rapid flood spreading model
In this study, we propose a new method to apply the rapid flood spreading model (RFSM) using cellular automata (CA) to multiple inflows of Carlisle, UK. The purpose of the RFSM is to generate predictions of water depth and flood extent using less computer resource than required by two-dimensional...

FlipIt: The Game of “Stealthy Takeover
Recent targeted attacks have increased significantly in sophistication, undermining the fundamental assumptions on which most cryptographic primitives rely for security. For instance, attackers launching an Advanced Persistent Threat (APT) can steal full cryptographic keys, violating the very sec...