18,277 research outputs found
Recoverable prevalence in growing scale-free networks and the effective immunization
We study the persistent recoverable prevalence and the extinction of computer
viruses via e-mails on a growing scale-free network with new users, which
structure is estimated form real data. The typical phenomenon is simulated in a
realistic model with the probabilistic execution and detection of viruses.
Moreover, the conditions of extinction by random and targeted immunizations for
hubs are derived through bifurcation analysis for simpler models by using a
mean-field approximation without the connectivity correlations. We can
qualitatively understand the mechanisms of the spread in linearly growing
scale-free networks.Comment: 9 pages, 9 figures, 1 table. Update version after helpful referee
comment
Malware "Ecology" Viewed as Ecological Succession: Historical Trends and Future Prospects
The development and evolution of malware including computer viruses, worms,
and trojan horses, is shown to be closely analogous to the process of community
succession long recognized in ecology. In particular, both changes in the
overall environment by external disturbances, as well as, feedback effects from
malware competition and antivirus coevolution have driven community succession
and the development of different types of malware with varying modes of
transmission and adaptability.Comment: 13 pages, 3 figure
Domino: exploring mobile collaborative software adaptation
Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach
Competing contact processes in the Watts-Strogatz network
We investigate two competing contact processes on a set of Watts--Strogatz
networks with the clustering coefficient tuned by rewiring. The base for
network construction is one-dimensional chain of sites, where each site
is directly linked to nodes labelled as and . So initially,
each node has the same degree . The periodic boundary conditions are
assumed as well.
For each node the links to sites and are rewired to two
randomly selected nodes so far not-connected to node . An increase of the
rewiring probability influences the nodes degree distribution and the
network clusterization coefficient . For given values of rewiring
probability the set of networks is generated.
The network's nodes are decorated with spin-like variables .
During simulation each node having a -site in its neighbourhood converts
this neighbour from to state. Conversely, a node in state having at
least one neighbour also in state -state converts all nearest-neighbours of
this pair into -state. The latter is realized with probability .
We plot the dependence of the nodes final density on initial
nodes fraction . Then, we construct the surface of the unstable
fixed points in space. The system evolves more often
toward for points situated above this
surface while starting simulation with parameters
situated below this surface leads system to . The points on this
surface correspond to such value of initial fraction of nodes (for
fixed values and ) for which their final density is
.Comment: 5 pages, 5 figure
- …