Security and Communication Networks

Mathematical Models for Malware Propagation


Publishing date
01 Oct 2018
Status
Published
Submission deadline
18 May 2018

1University of Salamanca, Salamanca, Spain

2Delft University of Technology, Delft, Netherlands

3National Technical University of Athens, Athens, Greece


Mathematical Models for Malware Propagation

Description

The dramatic increase in network services through new paradigms—including cloud computing, the Internet of Things, Industry 4.0, and critical infrastructures protection—makes it necessary to develop methodologies, tools, and technologies to guarantee the security of digital data, processes, and networks against cyberattacks. Such attacks are becoming increasingly sophisticated, evolving into advanced persistent threats which are often based on an array of malware types (ransomware, zero-day malware, and so on).

Although the scientific approach to combat malware is mainly focused on the design of efficient methods to detect all types of malware, the design and computational implementation of mathematical models to simulate its propagation are also a very important task. These models allow us not only to predict the evolutional behaviour of malware, but also to study the efficacy of possible countermeasures. As such, these analytical tools could play a very important role in forensic computing and cybercrime investigations and security operation centers.

The main purpose of this special issue is to provide both theoreticians and practitioners with a forum to present their research on the design, analysis, and implementation of models for malware spread and control. Through both theoretical and experimental studies, we seek to identify new applications within this developing field. We encourage original research papers related to this topic, as well as high-quality review articles describing the current state of the art.

Potential topics include but are not limited to the following:

  • Deterministic models for malware propagation
  • Stochastic models for malware propagation
  • Individual-based and agent-based models for malware propagation
  • Network models for malware propagation
  • Mathematical analysis of malware propagation models
  • Control of malware spread
  • Relationships between infectious diseases models and malware models
  • Virus source identification algorithms
  • Data-driven modeling of malware propagation
  • Related computational implementation and software tools

Articles

  • Special Issue
  • - Volume 2019
  • - Article ID 6046353
  • - Editorial

Mathematical Models for Malware Propagation

Ángel Martín del Rey | Lu-Xing Yang | Vasileios A. Karyotis
  • Special Issue
  • - Volume 2018
  • - Article ID 6254876
  • - Research Article

A Novel Load Capacity Model with a Tunable Proportion of Load Redistribution against Cascading Failures

Zhen-Hao Zhang | Yurong Song | ... | Guo-Ping Jiang
  • Special Issue
  • - Volume 2018
  • - Article ID 4982523
  • - Research Article

State-Based Switching for Optimal Control of Computer Virus Propagation with External Device Blocking

Qingyi Zhu | Seng W. Loke | Ye Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 5353060
  • - Research Article

Stability Analysis of an Advanced Persistent Distributed Denial-of-Service Attack Dynamical Model

Chunming Zhang | Jingwei Xiao
  • Special Issue
  • - Volume 2018
  • - Article ID 2153195
  • - Research Article

Global Behavior of a Computer Virus Propagation Model on Multilayer Networks

Chunming Zhang
  • Special Issue
  • - Volume 2018
  • - Article ID 9756982
  • - Research Article

An Epidemic Model of Computer Worms with Time Delay and Variable Infection Rate

Yu Yao | Qiang Fu | ... | Chuan Sheng
  • Special Issue
  • - Volume 2018
  • - Article ID 2975376
  • - Research Article

Defending against the Advanced Persistent Threat: An Optimal Control Approach

Pengdeng Li | Xiaofan Yang | ... | Yuan Yan Tang
Security and Communication Networks
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate10%
Submission to final decision143 days
Acceptance to publication35 days
CiteScore2.600
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.