Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/6875
Full metadata record
DC FieldValueLanguage
dc.contributor.authorFalaye, Adeyinka A-
dc.contributor.authorEtuk, Stella Oluyemi-
dc.contributor.authorAdama, Ndako Victor-
dc.contributor.authorUgwuoke, Cosmas Uchenna-
dc.contributor.authorOlujimi, Ogedengbe-
dc.contributor.authorSeun, Ale-
dc.date.accessioned2021-07-06T19:34:14Z-
dc.date.available2021-07-06T19:34:14Z-
dc.date.issued2017-11-
dc.identifier.citationFalaye, A. A., Etuk, S.O., Adama, N. V., Ugwuoke, C.U., Olujimi, O. and Seun, A. (2017). Parametric Equation for Capturing Dynamics of Cyber Attack Malware Transmission with Mitigation on Computer Network. International Journal of Mathematical Sciences and Computing, Vol.3, No. 4. pg 37-51. Published by Modern Education and Computer Science Press. Available online at http://www.mecs-press.net/ijmsc.en_US
dc.identifier.issnISSN: 2310-9025 (Print), ISSN: 2310-9033 (Online)-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/6875-
dc.description.abstractOne distress of network and data security professionals and advisers globally is about the abilities of infectious malicious agents (Malware) to invade the entire network terminals to wreak havoc extending from identity theft, financial fraud to systemic digital assault on critical national resources. This work studies the behavioural dynamics of the susceptible, infected, the recovered terminals on the mobile wireless network and the effective use of antivirus security signature as countermeasure. Solving for stability state, we found out that its Eigen value gives a positive value which means that the stability is at an unstable state. Using Homotopy perturbation to calculate the approximate solution of the system. The expression derived was simulated using a mathematical tool (mat lab).en_US
dc.language.isoenen_US
dc.publisherModern Education and Computer Science Pressen_US
dc.subjectHomotopy Pertubation Method, SIR model, Malicious ware, Stability, Equillibrium.en_US
dc.titleParametric Equation for Capturing Dynamics of Cyber Attack Malware Transmission with Mitigation on Computer Networken_US
dc.typeArticleen_US
Appears in Collections:Information and Media Technology



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.