Please use this identifier to cite or link to this item: http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/7177
Full metadata record
DC FieldValueLanguage
dc.contributor.authorFalaye, Adeyinka A.-
dc.contributor.authorEtuk, Stella Oluyemi-
dc.contributor.authorAle, Seun-
dc.contributor.authorAbdullahi, Muhammad Bashir-
dc.contributor.authorUgwuoke, Cosmos U-
dc.contributor.authorAwogbemi, F-
dc.date.accessioned2021-07-07T19:04:34Z-
dc.date.available2021-07-07T19:04:34Z-
dc.date.issued2017-
dc.identifier.citationFalaye, A. A., Etuk, S.O., Seun, A., Abdullahi, M.B., Ugwuoke, C.U. and Awogbemi, F. (2017). Quantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Network. SAI Intelligent System Conference, London, UK. IEEE indexed. Pg. 1095-1102en_US
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/7177-
dc.description.abstractOne major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studies the behavioral dynamics of the Vulnerable, infected and the recovered terminals on the mobile wireless network and the effectiveness of an antivirus security signature as countermeasure and the effect of lack of anti-virus update. Solving for stability, we found out that its Eigen values gives a negative value which means that the equilibrium point is in a stable state. We analyzed the differential equations using Homotopic Perturbation Method (HPM).The Simulation to evaluate the consequence of different countermeasure options were carried on a mathematical-tool platform called maple . From our results we discovered that if security patches are fixed on our mobile devices and there is regular antivirus update on the devices, then financial fraud, Privacy inversion and running of scam can be curtailed to a significant level.en_US
dc.language.isoenen_US
dc.publisherSAI Intelligent System Conference, London, UK. IEEE indexed.en_US
dc.subjectHomotopic Perturbation Methoden_US
dc.subjectSIR modelen_US
dc.subjectMalicious wareen_US
dc.subjectStabilityen_US
dc.subjectEquillibrium Introductionen_US
dc.titleQuantitative Model for Dynamic Propagation and Countermeasure of Malicious Cyber Attack on the Mobile Wireless Networken_US
dc.typeArticleen_US
Appears in Collections:Information and Media Technology



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.