Malware spreading model for routers in Wi-Fi networks
DT Le, TT Tran, KQ Dang, R Alkanhel… - IEEE Access, 2022 - ieeexplore.ieee.org
Malware attacks have become very common in recent years. The variety and continuous
improvement of malware capabilities threaten any network. Wi-Fi is also not an exception in …
improvement of malware capabilities threaten any network. Wi-Fi is also not an exception in …
Diffusion on the peer-to-peer network
J Riposo - Journal of Risk and Financial Management, 2022 - mdpi.com
In a peer-to-peer complex environment, information is permanently diffused. Such an
environment can be modeled as a graph, where there are flows of information. The interest …
environment can be modeled as a graph, where there are flows of information. The interest …
The Case for Validating ADDIE Model as a Digital Forensic Model for Peer-to-Peer Network Investigation
AS Musa, IU Awan, F Zahrah - Information Systems Frontiers, 2022 - Springer
Rapid technological advancement can substantially impact the processes of digital forensic
investigation and present a myriad of challenges to the investigator. With these challenges, it …
investigation and present a myriad of challenges to the investigator. With these challenges, it …
Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation
AS Musa, IU Awan, I Abobaker - 2021 8th International …, 2021 - ieeexplore.ieee.org
While the need for content distribution proliferates-becoming more mammoth and complex
on the Internet-the P2P network perseveres as one of the best avenues to service the …
on the Internet-the P2P network perseveres as one of the best avenues to service the …
Collaborative response to disruption propagation (CRDP)
WPV Nguyen - 2020 - search.proquest.com
Disruptive events during recent decades have highlighted the vulnerabilities of complex
systems of systems to disruption propagation: Disruptions that start in one part of a system …
systems of systems to disruption propagation: Disruptions that start in one part of a system …
A botnets control strategy based on variable forgetting rate of control commands
Botnets take advantage of the vulnerabilities in the device‐to‐device (D2D) communication
in the Internet of Things (IoT) systems. The infect devices may become part of the command …
in the Internet of Things (IoT) systems. The infect devices may become part of the command …
A Framework for Digital Investigation of Peer-to-Peer (P2P) Networks. An Investigation into the Security Challenges and Vulnerabilities of Peer-to-Peer Networks and …
AS Musa - 2022 - bradscholars.brad.ac.uk
Peer-to-Peer (P2P) Networks have been presenting many fascinating capabilities to the
internet since their inception, which has made and is still gathering so much interest. As a …
internet since their inception, which has made and is still gathering so much interest. As a …