Quantitative model to measure the spread of Security attacks in Computer Networks
|
|
- Mercy Pierce
- 6 years ago
- Views:
Transcription
1 Quantitative model to measure the spread of Security attacks in Computer Networks SAURABH BARANWAL M.Sc.(Int.) 4 th year Mathematics and Sci. Computing Indian Institute of Technology, Kanpur saurabhbrn@gmail.com, baranwal@iitk.ac.in Project Guide Dr. N Raghu Kisore Assistant Professor IDRBT, Hyderabad INSTITUTE OF DEVELOPMENT AND RESEARCH IN BANKING TECHNOLOGY (IDRBT) ROAD NO. 1, CASTLE HILLS, MASAB TANK, HYDERABAD
2 CERTIFICATE This is to certify that Mr. Saurabh Baranwal, pursuing M.Sc.(Int.) course at Indian Institute of Technology, Kanpur in the School of Mathematics and Scientific Computing has undertaken a project as an intern at IDRBT, Hyderabad from May 8, 2013 to July 7, He was assigned the project Quantitative model to measure the spread of security attacks in Computer Networks under my guidance. During the course of the project he has undertaken a study of Mathematical Modelling and Security in Computer Networks and also has done excellent work. I wish him all the best for all his endeavours. Dr. N Raghu Kisore (Project Guide) Assistant Professor IDRBT, Hyderabad
3 Acknowledgment I express my deep sense of gratitude to my Guide Dr. N Raghu Kisore, Assistant Professor, IDRBT for giving me an opportunity to do this project in the Institute for development and research in Banking Technology and providing all the support and guidance needed which made me complete the project on time. I am also thankful to Mathematics and Scientific Computing, Indian Institute of Technology, Kanpur for giving me this golden opportunity to work in a high-end research institute like IDRBT. Saurabh Baranwal M.Sc.(Int.) 4 th year Mathematics and Sci. Computing Indian Institute of Technology, Kanpur
4 Abstract The objective of the proposed work is to build mathematical model to measure the financial losses due to a security attack on a computer network. A digitalized economy depends on internet for all of its services. One of these services is maintaining digital currency and transfer of the same between a creditor and debtor (payments). This involves building of secure payment protocols based on strong mathematical proofs. But in reality the success of such a system is limited by trust of the end user. That is the end system is only as successful as the security of the software realization of the cryptographic protocols. The propagation of fake currency in a physical society is largely restricted by logistics and hence the impact on the overall economy is limited. But in case of financial services like delivery and management of digital currency, infusion of fake currency into the network is subject to the security of the system. Further it is well understood that in spite of the best efforts to secure a piece of software, there is a non-zero probability of a security breach. The impact of a security breach is further magnified in a digital world due to the higher level of interconnections between systems. Hence the spread of fake currency in the event of a security or cyber attack grows exponentially. This work delivers a model that can be used to measure the number of nodes that will be attacked in the event of a cyber attack.
5 1 Introduction Propagation of computer virus is of great threat in the Internet generation, and is a serious problem in our highly information oriented society. For secure and reliable computer/communication network systems, it is an important issue to counter the propagation of computer virus. The computer virus is one of thousands of programs that can invade computer systems, and it may execute a variety of malicious activities, such as deletion files, destruction of hard disk and transmission of system information. Nowa-day, the computer virus can be classified into three types: Viruses, Worms and Trojan horses. In recent years, as a variety of services are available for many users on Internet, the damage of worms propagating via Internet, is drastically spreading. In general, the Internet worm is a self-propagation program and can propagate through the Internet services such as and Web. In other words, the Internet worm possesses the strong force of propagation. Hence the quantitative evaluation of Internet worm propagation is regarded as a major topic in network security problems. The most vivid example is the Code-Red worm which has explosively increased. On July 2001, the Code Red worm infected more than 359,000 hosts on the Internet within only 14 hours. The experience by explosive propagation of Code-Red worm motivates both network administrators and users to control and counter the Internet worms. In order to control and counter the propagation of computer viruses and Internet worms, considerable attention has been paid to examine the behaviour of virus and worm for recent years. Then the mathematical epidemic models are often used to represent the propagation of virus and worm. We will discuss some of the mathematical models in the next sections. Generally speaking, there are two main research directions: security issue and measurement. The objectives of security issue are, in short, to develop the security system which controls and counters the propagation of computer virus for reduction of its damage. Chen and Ranka[1] discuss the early warning system where the worm attack can be detected by a propagation model. On the other hand, for purposes of measurement, several virus and worm propagation models are proposed, which are based on the existing epidemic models.
6 2 Deterministic Models Various models have been used in the field of epidemiology. SIS and SIR models are the most prominent ones. These models are deterministic models and are valid only in case of sufficiently large populations. The transition rates from one class to another are mathematically expressed as derivatives, hence the model is formulated using differential equations. While building such models, it must be assumed that the population size in a compartment is differentiable with respect to time and that the epidemic process is deterministic. 2.1 SIS Model By using epidemic theory we can model worm propagation. The representative deterministic model is susceptible/vulnerable-infected-susceptible/vulnerable (SIS) model. In the deterministic SIS model, it is assumed that the Internet worm propagates in vulnerable computer hosts, and that the host from which the Internet worm is removed is still vulnerable. Let s(t) and v(t) denote the deterministic numbers of vulnerable and worm-infected hosts, respectively. Then the dynamics on the numbers of vulnerable and worm-infected hosts in the network can be described by dv(t) dt = βs(t)v(t) δv(t) ds(t) dt = βs(t)v(t) + δv(t) where β(> 0) and δ(> 0) are the infection rate and removal rate respectively. Assuming that the total number of hosts is given by a finite constant K = s(t) + v(t), the number of infections follows the logistic model: dv(t) dt = {δ(r 0 1) βv(t)}v(t) where R 0 = βk δ. 2.2 KS Model The SIS model is a simple epidemic model to characterize the propagation of computer virus, but cannot take account of the immunity to computer virus. The model with the framework of immunity is often called the susceptibleinfected-removed/immune-susceptible(sirs) model. In the computer virus prevalence, Kephart and White introduce the concept of kill signal(ks),
7 which is regarded as a warning for propagation of computer virus. Let v(t) and w(t) denote the number of infected and non-vulnerable hosts at time t, respectively. Then the dynamics of the infected and nonvulnerable hosts are described by the following differential equations: d dt v(t) = {Kβ δ (β + β r)w(t) βv(t)}v(t) d dt v(t) = {Kβ r δ r β r w(t) βw(t)}w(t) + δv(t) where K is the total number of hosts in the network, β is the propagation rate of computer virus, δ is the removal rate of computer virus, β r is the KS-spreading rate and δ r is the re-vulnerability rate. 3 Stochastic Models But in case the population is small or when parameters like the infection rates are transient in nature stochastic models are preferable. Stochastic epidemic models are described by birth and death processes which have specific state transitions. Dissimilar to deterministic models, stochastic models describe the probabilistic behaviour of virus propagation using probability mass functions for Markov states, and can represent rare events such as virus extinction. These models have an absorption state where number of infected nodes is zero. That is they assume that a virus attack eventually gets terminated with a probability of 1. Most of the published work build stochastic SIS and SIR models based on Markovian arrival process (MAP). MAP is a counting process whose arrival rate is governed by a Continuous Time Markov Chain (CTMC). The number of infected hosts is represented by a Continuous Time Markov chain (CTMC). Some of the measurements made by a stochastic model are: the basic reproduction number the probability of virus extinction the mean time to virus hazard the mean time to virus extinction In each of the above cases the most important metric that defines the ability of an infection to spread is the reproduction number, R. The following inferences can be made from value of reproduction number, R
8 1 indicates the whole process converges to disease free state. > 1 indicates the infection to b e epidemic in nature and infection would spread until there is no more susceptible population. 3.1 Stochastic SIS model In the stochastic modelling, dynamics of propagation can be modelled by a birth-and-death process. Especially, the stochastic SIS model is introduced from the classical epidemic theory to analyze worm propagation. If there are K computer hosts in the network, the worm propagation is given by the birth-and-death process with the following birth and death rates: λ i = β(k i)i, i = 0, 1, 2..., K µ i = δi, i = 0, 1, 2..., K where β(> 0) and δ(> 0) are the propagation rate of worm and the removal rate of infected worm respectively. Note that the birth rate λ i depends on the number of both worm-infected and vulnerable hosts in the network. Also in the stochastic SIS model, it is assumed that the host from which a worm is removed is still vulnerable. Let a stochastic process {V (t) : t 0} be the number of worm-infected hosts at time t, and p v (t), v = 0,..., K denote the probabilities that there are v worm-infected hosts in the network at time t. Based on the analysis technique of CTMC, the probabilities are given by the following: 1 dt p 0(t) = µ 1 p 1 (t) 1 dt p 1(t) = µ 2 p 2 (t) (λ 1 + µ 1 )p 1 (t) 1 dt p i(t) = λ v 1 p v 1 (t) (λ v + µ v )p 1 (t) + µ v+1 p v+1 (t) 1 dt p i(t) = λ v 1 p v 1 (t) (λ v + µ v )p 1 (t) + µ v+1 p v+1 (t) 1 dt p K(t) = λ K 1 p K 1 (t) µ K p K (t) Solving above equations by using numerical methods such as the Runge- Kutta method, we can investigate the stochastic behaviour of infection. Unlike deterministic models, the number of worm-infected hosts almost surely goes to zero because the state where all the worms are combated is an absorbing state. In other words, extinction of worm always occurs in the stochastic SIS model. This viewpoint provides a remarkable difference between deterministic and stochastic models.
9 3.2 Stochastic Kill Signal Model Define the stochastic processes V (t) and W (t) which are the number of worm-infected and non-vulnerable hosts at time t, respectively. We consider the CTMC with the state (V (t), W (t)) = (v, w). Then the transition rates at the state (v, w) can be described as follows: 1. Worms are propagating to the other vulnerable hosts, so that the transition rate to state (v + 1, m) is given by λ v,w = βv(k v w) 2. When worms are removed from hosts, the hosts become non-vulnerable. Hence, the transition rate to the state (v 1, w) is zero. 3. There are two cases on the removal of worm; infected hosts remove worms from themselves or worms are removed by receiving KSs. Then, the transition rate to the state (v 1, w+1) is the sum of the transition rates in these two cases: µ v,w = δv + β r vw 4. Non-vulnerable hosts send KSs to vulnerable hosts. The transition rate to the state (v, w + 1) is given by γ v,w = β r w(k v w). 5. Non-vulnerable hosts can be vulnerable again by detection of unknown vulnerable factors. The transition rate to the state (v, w 1) is given by θ v,w = δ r w Then the transition diagram of CTMC is depicted in Figure 1. Consider the probability: p v,w = P r{v (t) = v, W (t) = w}. Using the above listed equations, we obtain the following differential equations: 1 dt p v,w(t) = λ v 1,w p v 1,w (t) + µ v+1,w 1 p v+1,w 1 (t) + γ v,w 1 p v,w 1 (t) + θ v,w+1 p v,w+1 (t) v v,w p v,w (t) for v = 0,..., K, w = 0,...K v where v = λ v,w + µ v,w + γ v,w + θ v,w. Note that K v + w, because the total number of hosts is finite.
10 Figure 1: Transition diagram on the propagation model with KS 4 Models Surveyed 4.1 Winfried Gleissner Model Representation: Adjacency Matrix is used to represent program interactions. Viral state is represented as a row vector. v = (v 1, v 2,..., v N ). Formula Derived: % of computer infected Vs no. of function calls. probability of reaching a viral state v from state v after executing k calls Symbol Definitions: N : No.of User accounts in a system. m i : No.of programs for user account i. v i virus programs in user account i. Assumptions: All programs and interactions between them are identical. A program once infected remain infected.
11 Remarks: Models spread of virus in a single system. Process is the fundamental unit. Infection of the whole system (all programs) is the absorbing state. This definition of absorbing state is the key difference with respect to other models. The absorbing state is represented as v F = (m 1, m 2,.., m N ). 4.2 Okamura Et.al Model Representation: MAP Process. Deals with stochastic SIS and SIR models. Uses 2D Markov Chain. Formula Derived: D 0 Infinitesimal Generator Matrix (withdrawls). transitions. Represents phase D 1 Rate Matrix. Represents new arrivals. R reproduction number. Symbol Definitions: β Infection rate. γ Recovery Rate. v birth/death process. (i, j) represents a Markov State. Read as (Infected, Recovered). Remarks: Takes into account population changes due to birth/death of nodes. Birth is because of new nodes joining the network and death is due to either disruptions in the network or death of infected node.
12 4.3 Okamura Et.al Model Representation: MAP Process. Deals with stochastic SIS and SIR models. Uses 2D Markov Chain. Formula Derived: probabilities of hazard (PH). Mean time to Hazard (MTTH). Variance of Time to hazard (VTTH). coefficient of variance to hazard time(cvh). Expected maximum number of infected hosts(mx). Mean Time to Extinction(MTTE). Variance of time to extinction(vtte). coefficient of variance of extinction time(cve). Symbol Definitions: β Infection rate. γ Recovery Rate. v birth/death process. (i, j) represents a Markov State. Read as (Infected, Recovered). Assumptions: The authors evaluate virus propagation by defining two probabilistic events called hazard and extinction. That is the Markov process has two absorbing states. Hazard: All the computer hosts in the network are infected. Extinction: No computer host in the network is infected. Remarks: Introduces a Kill Signal (KS) that represents a means to notify each no de the existence of infection. KS is also used to model immunity level in living organisms and to model the impact of any remedial action taken by system administrators.
13 4.4 Wang Model Representation: Stochastic SIS and SIR models are used. The user vigilance is modelled as Susceptible Infected Immune Susceptible model(siis). Formula Derived: dη t dt = β < k > η t ε e δε (1 η) δη t dη t dt = β < k > η t (1 η δφ t t v η sds) δη t Symbol Definitions: Infection delay is represented as ε. Vigilance is modelled as: φ represents vigilance coefficient and quantity between 0 and 1. 0 indicates full susceptibility and 1 indicates complete immunity. v represents vigilance period, indicates the time during the node is vigilant against reinfection attempts. At the end of the period the node becomes fully susceptible to infections again. Assumptions: Vigilance delays and infection delays are modelled as exponential distributions. Remarks: Takes into account the latent state of virus infections in a computer. That is there is a delay between the virus first enters a computer and the time it starts to infect other computers. This delay is modelled though two different components infection delay and user vigilance. Infection delay could be because most viruses require appropriate user activity like opening of an attachment or launching an app. This delay also helps to deal with situations where a node once infected becomes cured before it becomes infectious. Vigilance delay is because the user of a system once attacked tends to be more vigilant. 4.5 Aditya Prakash Et.al Model Representation: A 2 N state markov chain is used to represent all the possible viral states. Viral state itself is defined by random variables x N, x N 1,..., x 2, x 1. Each of these random variables can take two values 0 or 1. 0 represents no infection
14 and 1 represents infected state. The viral state is represented by random variable Y and is represented as x N x N 1...x 2 x 1. Symbol Definitions: N represents the number of nodes in the network. Q represents the infinitesimal generator. The computer network G = (N, L) is represented as symmetric adjacency matrix A. Remarks: Takes into account the dynamic nature of network topology. 4.6 Kooij Et.al Model Representation: The problem is formulated as Non-Linear Dynamic. system (NLDS). SIS model is used. Formula Derived: Epidemic threshold λ s. This threshold is derived using Jacobian matrix and eigen vectors of the adjacent matrix and the viral state of the network. This threshold is then used to designing an optimum way to control the epidemic by using appropriate immunization policies. Basically a quality metric to measure is impact of immunization is determined. Symbol Definitions: The viral state is represented as a row vector: p t = (p 1,t, p 2,t,..., p n,t ) T : represents the total numb er of alternating behaviours. A T : represents adjacency matrix corresponding to alternating behaviour state T. p 2t+1 : probability of infection vector for odd days. p 2t : probability of infection vector for even days. Remarks: The major contributions are: formulating the problem by approximating it by a Non-linear Dynamical system (NLDS), derive the first closed formula for the epidemic threshold of timevarying graphs under the SIS model,
15 we show the usefulness of our threshold by presenting efficient heuristics and evaluate the effectiveness of our methods on synthetic and real data like the MIT reality mining graphs. 5 Modified Model In all the above cases value of β was constant. But according to figure 2 value of β should depend upon the characteristics of infected node and suspected node. As the viruses/worms are not that smart so they keep attacking the infected nodes again and again that s why value of β is the exponential decaying function. In case of deterministic network systems, Figure 2: Relationship between Value of β and Nodes changing the dependency of β value on other factors better results can be obtained which have been shown in figure 3. In the next pages, graphs have Figure 3: Simulink Model of Proposed Work been drawn for the following equation: dv dt = β newve λv δv
16 WORM BRAID.A (Braid) β= δ= Dash line is the curve obtained by the experimental data. Solid line represents the graph of the stochastic kill signal model. β=0.48 λ= δ= Curve obtained by Simulink model X-axis -No. of days Y-axis- No. of Infected Nodes
17 WORM DATOM.A (Datom) β= δ= Dash line is the curve obtained by the experimental data. Solid line represents the graph of the stochastic kill signal model. β=0.13 λ= δ= Curve obtained by Simulink model X-axis -No. of days Y-axis- No. of Infected Nodes
18 6 Conclusion We can use the mathematical models to measure the return on investment made by banks on security features by measuring the effectiveness of these measures in reducing financial losses in the event of a wide spread cyber attack. Using these models companies can measure the expected value of how much a company/government should spend on the security systems. The major shortcomings in existing models are they do not take into account the effect of security measures built into the system to stop the growth. As in the case of virus propagation models security protection measures cab be either deterministic or randomized. Deterministic protection measure are largely algorithm based like canary based buffer overflow protection. In such cases we agree that the time taken to overcome the protection mechanism is constant. Therefore no changes need to be made to the models proposed so far. But in case of protection mechanisms like memory layout randomization, the success of an attack is probabilistic and is subject to correctly guess the randomizing key. In such cases the reproduction factor R will be dependent on parameters such as size of randomization key. Finally, the purpose of an attack on a financial system is not to reduce productivity by taking away valuable computational resources, but to make the V2V system do a meaningful task from the attacker point of view. Hence an attack can remain latent inside the system and not b e activated until the attacker chooses to launch the attack. So there is a need to evaluate the spread of an attack in a financial network by applying SEIS and SEIR models rather than simple SIS and SIR models. In this modern era mobile banking is also becoming prominent. So we may work in the direction to build a mathematical model for virus propagation on time varying networks. 7 References W. Gleissner, A mathematical theory for the spread of computer viruses, Comput. Secur., vol. 8, no. 1, pp , H. Okamura, H. Kobayashi and T. Dohi, Markovian Modelling and Analysis of Internet Worm Propagation, Proc. 16th IEEE Intl. Symp. Eng. Software Reliability, H. Okamura and T. Dohi, Estimating Computer Virus Propagation Based on Markovian Arrival Processes, Proc. 16th IEEE Pacific Rim
19 Intl. Symp. on Dependable Computing, pp , Y. Wang and C. Wang, Modelling the effects of timing parameters on virus propagation, Proc. of the 2003 ACM workshop on Rapid malcode, ACM, New York, NY, USA, pp , B. A. Prakash, T. Hanghang, N. Valler, M. Faloutsos, and C. Faloutsos, Virus propagation on time-varying networks: theory and immunization algorithms, Proc. European Conf. on Machine learning and know ledge discovery in databases: Part III Springer-Verlag, Berlin, Heidelb erg, pp , P. V. Mieghem, J. Omic, and R. Kooij, Virus Spread in Networks, IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 1-14, Feb
SIS epidemics on Networks
SIS epidemics on etworks Piet Van Mieghem in collaboration with Eric Cator, Ruud van de Bovenkamp, Cong Li, Stojan Trajanovski, Dongchao Guo, Annalisa Socievole and Huijuan Wang 1 EURADOM 30 June-2 July,
More informationSI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network. 1 Introduction. Bimal Kumar Mishra 1, Aditya Kumar Singh 2
ISSN 1749-3889 (print), 1749-3897 (online) International Journal of Nonlinear Science Vol.13(2012) No.3,pp.357-362 SI j RS E-Epidemic Model With Multiple Groups of Infection In Computer Network Bimal Kumar
More informationDie-out Probability in SIS Epidemic Processes on Networks
Die-out Probability in SIS Epidemic Processes on etworks Qiang Liu and Piet Van Mieghem Abstract An accurate approximate formula of the die-out probability in a SIS epidemic process on a network is proposed.
More informationGlobal Stability of a Computer Virus Model with Cure and Vertical Transmission
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 3, Issue 1, January 016, PP 16-4 ISSN 349-4840 (Print) & ISSN 349-4859 (Online) www.arcjournals.org Global
More informationStability Analysis of a Quarantined Epidemic Model with Latent and Breaking-Out over the Internet
Vol.8 No.7 5 pp.-8 http://dx.doi.org/.57/ijhit.5.8.7. Stability Analysis of a Quarantined Epidemic Model with Latent and reaking-out over the Internet Munna Kumar a imal Kumar Mishra b and T. C. Panda
More informationSocial Influence in Online Social Networks. Epidemiological Models. Epidemic Process
Social Influence in Online Social Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Dr. Zesheng Chen Viral marketing ( word-of-mouth ) Blog information cascading Rumor
More informationStochastic modelling of epidemic spread
Stochastic modelling of epidemic spread Julien Arino Centre for Research on Inner City Health St Michael s Hospital Toronto On leave from Department of Mathematics University of Manitoba Julien Arino@umanitoba.ca
More informationToward Understanding Spatial Dependence on Epidemic Thresholds in Networks
Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Zesheng Chen Department of Computer Science Indiana University - Purdue University Fort Wayne, Indiana 4685 Email: chenz@ipfw.edu
More informationOn Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study
The 1 st Net-X (2017) On Susceptible-Infected-Susceptible Epidemic Spreading: an Overview of Recent Study Cong Li Adaptive Networks and Control Lab, Fudan University Collaborators: Xiaojie Li, Jianbo Wang,
More informationSpread of Malicious Objects in Computer Network: A Fuzzy Approach
Available at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 8, Issue 2 (December 213), pp. 684 7 Applications and Applied Mathematics: An International Journal (AAM) Spread of Malicious Objects
More informationResearch Article Dynamical Models for Computer Viruses Propagation
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 28, Article ID 9426, 11 pages doi:1.11/28/9426 Research Article Dynamical Models for Computer Viruses Propagation José R. C. Piqueira
More informationStochastic modelling of epidemic spread
Stochastic modelling of epidemic spread Julien Arino Department of Mathematics University of Manitoba Winnipeg Julien Arino@umanitoba.ca 19 May 2012 1 Introduction 2 Stochastic processes 3 The SIS model
More informationCS224W: Analysis of Networks Jure Leskovec, Stanford University
Announcements: Please fill HW Survey Weekend Office Hours starting this weekend (Hangout only) Proposal: Can use 1 late period CS224W: Analysis of Networks Jure Leskovec, Stanford University http://cs224w.stanford.edu
More informationAnalysis of Numerical and Exact solutions of certain SIR and SIS Epidemic models
Journal of Mathematical Modelling and Application 2011, Vol. 1, No. 4, 51-56 ISSN: 2178-2423 Analysis of Numerical and Exact solutions of certain SIR and SIS Epidemic models S O Maliki Department of Industrial
More informationCS 6604: Data Mining Large Networks and Time-series. B. Aditya Prakash Lecture #8: Epidemics: Thresholds
CS 6604: Data Mining Large Networks and Time-series B. Aditya Prakash Lecture #8: Epidemics: Thresholds A fundamental ques@on Strong Virus Epidemic? 2 example (sta@c graph) Weak Virus Epidemic? 3 Problem
More informationNetwork Science & Telecommunications
Network Science & Telecommunications Piet Van Mieghem 1 ITC30 Networking Science Vision Day 5 September 2018, Vienna Outline Networks Birth of Network Science Function and graph Outlook 1 Network: service(s)
More informationMarkov-modulated interactions in SIR epidemics
Markov-modulated interactions in SIR epidemics E. Almaraz 1, A. Gómez-Corral 2 (1)Departamento de Estadística e Investigación Operativa, Facultad de Ciencias Matemáticas (UCM), (2)Instituto de Ciencias
More informationSpectral Graph Theory for. Dynamic Processes on Networks
Spectral Graph Theory for Dynamic Processes on etworks Piet Van Mieghem in collaboration with Huijuan Wang, Dragan Stevanovic, Fernando Kuipers, Stojan Trajanovski, Dajie Liu, Cong Li, Javier Martin-Hernandez,
More informationAn Improved Computer Multi-Virus Propagation Model with User Awareness
Journal of Information & Computational Science 8: 16 (2011) 4301 4308 Available at http://www.joics.com An Improved Computer Multi-Virus Propagation Model with User Awareness Xiaoqin ZHANG a,, Shuyu CHEN
More informationWE FOCUS ON A simple continuous-time model for the
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 1, FEBRUARY 2009 1 Virus Spread in Networks Piet Van Mieghem, Member, IEEE, Jasmina Omic, and Robert Kooij Abstract The influence of the network characteristics
More informationA new centrality measure for probabilistic diffusion in network
ACSIJ Advances in Computer Science: an International Journal, Vol. 3, Issue 5, No., September 204 ISSN : 2322-557 A new centrality measure for probabilistic diffusion in network Kiyotaka Ide, Akira Namatame,
More informationThree Disguises of 1 x = e λx
Three Disguises of 1 x = e λx Chathuri Karunarathna Mudiyanselage Rabi K.C. Winfried Just Department of Mathematics, Ohio University Mathematical Biology and Dynamical Systems Seminar Ohio University November
More informationResearch Article Propagation of Computer Virus under Human Intervention: A Dynamical Model
Discrete Dynamics in Nature and ociety Volume 2012, Article ID 106950, 8 pages doi:10.1155/2012/106950 Research Article Propagation of Computer Virus under Human Intervention: A Dynamical Model Chenquan
More informationIntroduction to SEIR Models
Department of Epidemiology and Public Health Health Systems Research and Dynamical Modelling Unit Introduction to SEIR Models Nakul Chitnis Workshop on Mathematical Models of Climate Variability, Environmental
More informationQueueing Theory I Summary! Little s Law! Queueing System Notation! Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K "
Queueing Theory I Summary Little s Law Queueing System Notation Stationary Analysis of Elementary Queueing Systems " M/M/1 " M/M/m " M/M/1/K " Little s Law a(t): the process that counts the number of arrivals
More informationOPTIMAL CONTROL ON THE SPREAD OF SLBS COMPUTER VIRUS MODEL. Brawijaya University Jl. Veteran Malang, 65145, INDONESIA
International Journal of Pure and Applied Mathematics Volume 17 No. 3 216, 749-758 ISSN: 1311-88 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: 1.12732/ijpam.v17i3.21
More informationLink Operations for Slowing the Spread of Disease in Complex Networks. Abstract
PACS: 89.75.Hc; 88.80.Cd; 89.65.Ef Revision 1: Major Areas with Changes are Highlighted in Red Link Operations for Slowing the Spread of Disease in Complex Networks Adrian N. Bishop and Iman Shames NICTA,
More informationDepartment of Mathematics, Faculty of Sciences and Mathematics, Diponegoro University,Semarang, Indonesia
ISS: 978-602-71169-7-9 Proceeding of 5th International Seminar on ew Paradigm and Innovation on atural Science and Its Application (5th ISPISA) Mathematical Modeling of worm infection on computer in a
More informationForecasting of ATM cash demand
Forecasting of ATM cash demand Ayush Maheshwari Mathematics and scientific computing Department of Mathematics and Statistics Indian Institute of Technology (IIT), Kanpur ayushiitk@gmail.com Project guide:
More informationResearch Article Towards the Epidemiological Modeling of Computer Viruses
Discrete Dynamics in Nature and Society Volume 2012, Article ID 259671, 11 pages doi:10.1155/2012/259671 Research Article Towards the Epidemiological Modeling of Computer Viruses Xiaofan Yang 1, 2 and
More informationResearch Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network
Mathematical Problems in Engineering Volume 2012, Article ID 407064, 13 pages doi:10.1155/2012/407064 Research Article Two Quarantine Models on the Attack of Malicious Objects in Computer Network Bimal
More informationA BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS
U.P.B. Sci. Bull., Series A, Vol. 76, Iss. 2, 2014 ISSN 1223-7027 A BINOMIAL MOMENT APPROXIMATION SCHEME FOR EPIDEMIC SPREADING IN NETWORKS Yilun SHANG 1 Epidemiological network models study the spread
More informationAARMS Homework Exercises
1 For the gamma distribution, AARMS Homework Exercises (a) Show that the mgf is M(t) = (1 βt) α for t < 1/β (b) Use the mgf to find the mean and variance of the gamma distribution 2 A well-known inequality
More informationAn Optimal Control Problem Over Infected Networks
Proceedings of the International Conference of Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 15-16 214 Paper No. 125 An Optimal Control Problem Over Infected Networks Ali Khanafer,
More informationPreventive behavioural responses and information dissemination in network epidemic models
PROCEEDINGS OF THE XXIV CONGRESS ON DIFFERENTIAL EQUATIONS AND APPLICATIONS XIV CONGRESS ON APPLIED MATHEMATICS Cádiz, June 8-12, 215, pp. 111 115 Preventive behavioural responses and information dissemination
More informationThursday. Threshold and Sensitivity Analysis
Thursday Threshold and Sensitivity Analysis SIR Model without Demography ds dt di dt dr dt = βsi (2.1) = βsi γi (2.2) = γi (2.3) With initial conditions S(0) > 0, I(0) > 0, and R(0) = 0. This model can
More informationResearch Article An Impulse Model for Computer Viruses
Discrete Dynamics in Nature and Society Volume 2012, Article ID 260962, 13 pages doi:10.1155/2012/260962 Research Article An Impulse Model for Computer Viruses Chunming Zhang, Yun Zhao, and Yingjiang Wu
More informationEpidemic Spreading in Technological Networks
Epidemic Spreading in Technological Networks Jasmin Leveille Information Infrastructure Laboratory HP Laboratories Bristol HPL-2002-287 October 23 rd, 2002* computer security, viruses, worms, infection
More informationGEMF: GENERALIZED EPIDEMIC MODELING FRAMEWORK SOFTWARE IN PYTHON
GEMF: GENERALIZED EPIDEMIC MODELING FRAMEWORK SOFTWARE IN PYTHON HEMAN SHAKERI Network Science and Engineering Group (NetSE) Department of Electrical and Computer Engineering Kansas State University Manhattan,
More informationEpidemics in Complex Networks and Phase Transitions
Master M2 Sciences de la Matière ENS de Lyon 2015-2016 Phase Transitions and Critical Phenomena Epidemics in Complex Networks and Phase Transitions Jordan Cambe January 13, 2016 Abstract Spreading phenomena
More informationModelling of the Hand-Foot-Mouth-Disease with the Carrier Population
Modelling of the Hand-Foot-Mouth-Disease with the Carrier Population Ruzhang Zhao, Lijun Yang Department of Mathematical Science, Tsinghua University, China. Corresponding author. Email: lyang@math.tsinghua.edu.cn,
More informationCopyright Warning & Restrictions
Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions
More informationLOCAL AND GLOBAL STABILITY OF IMPULSIVE PEST MANAGEMENT MODEL WITH BIOLOGICAL HYBRID CONTROL
International J. of Math. Sci. & Engg. Appls. (IJMSEA) ISSN 0973-9424, Vol. 11 No. II (August, 2017), pp. 129-141 LOCAL AND GLOBAL STABILITY OF IMPULSIVE PEST MANAGEMENT MODEL WITH BIOLOGICAL HYBRID CONTROL
More informationAn Optimization Approach In Information Security Risk Management
Advances in Management & Applied Economics, vol.2, no.3, 2012, 1-12 ISSN: 1792-7544 (print version), 1792-7552 (online) Scienpress Ltd, 2012 An Optimization Approach In Information Security Risk Management
More informationCopyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and
Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere
More informationSimulating stochastic epidemics
Simulating stochastic epidemics John M. Drake & Pejman Rohani 1 Introduction This course will use the R language programming environment for computer modeling. The purpose of this exercise is to introduce
More informationLAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC
LAW OF LARGE NUMBERS FOR THE SIRS EPIDEMIC R. G. DOLGOARSHINNYKH Abstract. We establish law of large numbers for SIRS stochastic epidemic processes: as the population size increases the paths of SIRS epidemic
More informationStability of SEIR Model of Infectious Diseases with Human Immunity
Global Journal of Pure and Applied Mathematics. ISSN 0973-1768 Volume 13, Number 6 (2017), pp. 1811 1819 Research India Publications http://www.ripublication.com/gjpam.htm Stability of SEIR Model of Infectious
More informationResearch Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine Strategy
Hindawi Publishing Corporation Discrete Dynamics in Nature and Society Volume 1, Article ID 3868, 18 pages doi:1.11/1/3868 Research Article Hopf Bifurcation in an SEIDQV Worm Propagation Model with Quarantine
More informationLecture VI Introduction to complex networks. Santo Fortunato
Lecture VI Introduction to complex networks Santo Fortunato Plan of the course I. Networks: definitions, characteristics, basic concepts in graph theory II. III. IV. Real world networks: basic properties
More informationThe Spreading of Epidemics in Complex Networks
The Spreading of Epidemics in Complex Networks Xiangyu Song PHY 563 Term Paper, Department of Physics, UIUC May 8, 2017 Abstract The spreading of epidemics in complex networks has been extensively studied
More informationA Stochastic Framework for Quantitative Analysis of Attack-Defense Trees
1 / 35 A Stochastic Framework for Quantitative Analysis of R. Jhawar K. Lounis S. Mauw CSC/SnT University of Luxembourg Luxembourg Security and Trust of Software Systems, 2016 ADT2P & TREsPASS Project
More informationMATHEMATICAL MODELS Vol. III - Mathematical Models in Epidemiology - M. G. Roberts, J. A. P. Heesterbeek
MATHEMATICAL MODELS I EPIDEMIOLOGY M. G. Roberts Institute of Information and Mathematical Sciences, Massey University, Auckland, ew Zealand J. A. P. Heesterbeek Faculty of Veterinary Medicine, Utrecht
More informationBayesian Inference for Contact Networks Given Epidemic Data
Bayesian Inference for Contact Networks Given Epidemic Data Chris Groendyke, David Welch, Shweta Bansal, David Hunter Departments of Statistics and Biology Pennsylvania State University SAMSI, April 17,
More informationAttack Strategies on Complex Networks
Attack Strategies on Complex Networks Lazaros K. Gallos 1, Reuven Cohen 2, Fredrik Liljeros 3, Panos Argyrakis 1, Armin Bunde 4, and Shlomo Havlin 5 1 Department of Physics, University of Thessaloniki,
More informationIntroduction to Stochastic SIR Model
Introduction to Stochastic R Model Chiu- Yu Yang (Alex), Yi Yang R model is used to model the infection of diseases. It is short for Susceptible- Infected- Recovered. It is important to address that R
More informationAnalytically tractable processes on networks
University of California San Diego CERTH, 25 May 2011 Outline Motivation 1 Motivation Networks Random walk and Consensus Epidemic models Spreading processes on networks 2 Networks Motivation Networks Random
More informationAnalysis Based on SVM for Untrusted Mobile Crowd Sensing
Analysis Based on SVM for Untrusted Mobile Crowd Sensing * Ms. Yuga. R. Belkhode, Dr. S. W. Mohod *Student, Professor Computer Science and Engineering, Bapurao Deshmukh College of Engineering, India. *Email
More informationLinear Algebra Methods for Data Mining
Linear Algebra Methods for Data Mining Saara Hyvönen, Saara.Hyvonen@cs.helsinki.fi Spring 2007 2. Basic Linear Algebra continued Linear Algebra Methods for Data Mining, Spring 2007, University of Helsinki
More informationPartially Observed Stochastic Epidemics
Institut de Mathématiques Ecole Polytechnique Fédérale de Lausanne victor.panaretos@epfl.ch http://smat.epfl.ch Stochastic Epidemics Stochastic Epidemic = stochastic model for evolution of epidemic { stochastic
More informationVirus Propagation on Time-Varying Networks: Theory and Immunization Algorithms
Virus Propagation on Time-Varying Networks: Theory and Immunization Algorithms B. Aditya Prakash *, Hanghang Tong *, Nicholas Valler +, Michalis Faloutsos +, and Christos Faloutsos * * Computer Science
More informationMathematical Modeling and Analysis of Infectious Disease Dynamics
Mathematical Modeling and Analysis of Infectious Disease Dynamics V. A. Bokil Department of Mathematics Oregon State University Corvallis, OR MTH 323: Mathematical Modeling May 22, 2017 V. A. Bokil (OSU-Math)
More informationGLOBAL DYNAMICS OF A MATHEMATICAL MODEL OF TUBERCULOSIS
CANADIAN APPIED MATHEMATICS QUARTERY Volume 13, Number 4, Winter 2005 GOBA DYNAMICS OF A MATHEMATICA MODE OF TUBERCUOSIS HONGBIN GUO ABSTRACT. Mathematical analysis is carried out for a mathematical model
More informationMCMC 2: Lecture 2 Coding and output. Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham
MCMC 2: Lecture 2 Coding and output Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham Contents 1. General (Markov) epidemic model 2. Non-Markov epidemic model 3. Debugging
More informationIdentifying critical nodes in multi-layered networks under multi-vector malware attack Rafael Vida 1,2,3, Javier Galeano 3, and Sara Cuenda 4
Int. J. Complex Systems in Science vol. 3(1) (2013), pp. 97 105 Identifying critical nodes in multi-layered networks under multi-vector malware attack Rafael Vida 1,2,3, Javier Galeano 3, and Sara Cuenda
More informationDynamic network sampling
Dynamic network sampling Steve Thompson Simon Fraser University thompson@sfu.ca Graybill Conference Colorado State University June 10, 2013 Dynamic network sampling The population of interest has spatial
More informationKalavakkam, Chennai, , Tamilnadu, INDIA 2,3 School of Advanced Sciences. VIT University Vellore, , Tamilnadu, INDIA
International Journal of Pure and Applied Mathematics Volume 09 No. 4 206, 799-82 ISSN: 3-8080 (printed version); ISSN: 34-3395 (on-line version) url: http://www.ijpam.eu doi: 0.2732/ijpam.v09i4.4 PAijpam.eu
More informationAvailable online at Commun. Math. Biol. Neurosci. 2016, 2016:17 ISSN:
Available online at http://scik.org Commun. Math. Biol. Neurosci. 216, 216:17 ISSN: 252-2541 OPTIMAL CONTROL OF A COMPUTER VIRUS MODEL WITH NETWORK ATTACKS HONGYUE PEI 1, YONGZHEN PEI 1,2,, XIYIN LIANG
More informationPricing of Cyber Insurance Contracts in a Network Model
Pricing of Cyber Insurance Contracts in a Network Model Stefan Weber Leibniz Universität Hannover www.stochastik.uni-hannover.de (joint work with Matthias Fahrenwaldt & Kerstin Weske) WU Wien December
More informationECS 289 / MAE 298, Lecture 7 April 22, Percolation and Epidemiology on Networks, Part 2 Searching on networks
ECS 289 / MAE 298, Lecture 7 April 22, 2014 Percolation and Epidemiology on Networks, Part 2 Searching on networks 28 project pitches turned in Announcements We are compiling them into one file to share
More informationSupporting Statistical Hypothesis Testing Over Graphs
Supporting Statistical Hypothesis Testing Over Graphs Jennifer Neville Departments of Computer Science and Statistics Purdue University (joint work with Tina Eliassi-Rad, Brian Gallagher, Sergey Kirshner,
More informationResearch Article Modeling Computer Virus and Its Dynamics
Mathematical Problems in Engineering Volume 213, Article ID 842614, 5 pages http://dx.doi.org/1.1155/213/842614 Research Article Modeling Computer Virus and Its Dynamics Mei Peng, 1 Xing He, 2 Junjian
More informationNetwork Infusion to Infer Information Sources in Networks Soheil Feizi, Ken Duffy, Manolis Kellis, and Muriel Medard
Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-214-28 December 2, 214 Network Infusion to Infer Information Sources in Networks Soheil Feizi, Ken Duffy, Manolis Kellis,
More informationThe minimal spectral radius of graphs with a given diameter
Linear Algebra and its Applications 43 (007) 408 419 www.elsevier.com/locate/laa The minimal spectral radius of graphs with a given diameter E.R. van Dam a,, R.E. Kooij b,c a Tilburg University, Department
More informationR E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H.
R E A D : E S S E N T I A L S C R U M : A P R A C T I C A L G U I D E T O T H E M O S T P O P U L A R A G I L E P R O C E S S. C H. 5 S O F T W A R E E N G I N E E R I N G B Y S O M M E R V I L L E S E
More informationOscillatory epidemic prevalence in g free networks. Author(s)Hayashi Yukio; Minoura Masato; Matsu. Citation Physical Review E, 69(1):
JAIST Reposi https://dspace.j Title Oscillatory epidemic prevalence in g free networks Author(s)Hayashi Yukio; Minoura Masato; Matsu Citation Physical Review E, 69(1): 016112-1-0 Issue Date 2004-01 Type
More informationEpidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point
Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point Nicholas Valler, B. Prakash, Hanghang Tong, Michalis Faloutsos, Christos Faloutsos To cite this version: Nicholas Valler, B. Prakash,
More informationBroadband Internet Access Disclosure
Broadband Internet Access Disclosure This document provides information about the network practices, performance characteristics, and commercial terms applicable broadband Internet access services provided
More informationSection 8.1 Def. and Examp. Systems
Section 8.1 Def. and Examp. Systems Key Terms: SIR Model of an epidemic o Nonlinear o Autonomous Vector functions o Derivative of vector functions Order of a DE system Planar systems Dimension of a system
More informationLecture 10. Under Attack!
Lecture 10 Under Attack! Science of Complex Systems Tuesday Wednesday Thursday 11.15 am 12.15 pm 11.15 am 12.15 pm Feb. 26 Feb. 27 Feb. 28 Mar.4 Mar.5 Mar.6 Mar.11 Mar.12 Mar.13 Mar.18 Mar.19 Mar.20 Mar.25
More informationAppendix A Prototypes Models
Appendix A Prototypes Models This appendix describes the model of the prototypes used in Chap. 3. These mathematical models can also be found in the Student Handout by Quanser. A.1 The QUANSER SRV-02 Setup
More informationQueueing systems. Renato Lo Cigno. Simulation and Performance Evaluation Queueing systems - Renato Lo Cigno 1
Queueing systems Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queueing systems - Renato Lo Cigno 1 Queues A Birth-Death process is well modeled by a queue Indeed queues can be used to
More informationAn Introduction to Stochastic Epidemic Models
An Introduction to Stochastic Epidemic Models Linda J. S. Allen Department of Mathematics and Statistics Texas Tech University Lubbock, Texas 79409-1042, U.S.A. linda.j.allen@ttu.edu 1 Introduction The
More informationA Method for Evaluating the Distribution of the Total Cost of a Random Process over its Lifetime
A Method for Evaluating the Distribution of the Total Cost of a Random Process over its Lifetime P.K. Pollett a and V.T. Stefanov b a Department of Mathematics, The University of Queensland Queensland
More informationComplex networks: an introduction Alain Barrat
Complex networks: an introduction Alain Barrat CPT, Marseille, France ISI, Turin, Italy http://www.cpt.univ-mrs.fr/~barrat http://cxnets.googlepages.com Plan of the lecture I. INTRODUCTION I. Networks:
More informationChapter 1. Introduction. 1.1 Stochastic process
Chapter 1 Introduction Process is a phenomenon that takes place in time. In many practical situations, the result of a process at any time may not be certain. Such a process is called a stochastic process.
More informationSIR Epidemic Model with total Population size
Advances in Applied Mathematical Biosciences. ISSN 2248-9983 Volume 7, Number 1 (2016), pp. 33-39 International Research Publication House http://www.irphouse.com SIR Epidemic Model with total Population
More informationDynamical models of HIV-AIDS e ect on population growth
Dynamical models of HV-ADS e ect on population growth David Gurarie May 11, 2005 Abstract We review some known dynamical models of epidemics, given by coupled systems of di erential equations, and propose
More informationMathematical modelling and controlling the dynamics of infectious diseases
Mathematical modelling and controlling the dynamics of infectious diseases Musa Mammadov Centre for Informatics and Applied Optimisation Federation University Australia 25 August 2017, School of Science,
More informationEpidemics in Networks Part 2 Compartmental Disease Models
Epidemics in Networks Part 2 Compartmental Disease Models Joel C. Miller & Tom Hladish 18 20 July 2018 1 / 35 Introduction to Compartmental Models Dynamics R 0 Epidemic Probability Epidemic size Review
More informationAny live cell with less than 2 live neighbours dies. Any live cell with 2 or 3 live neighbours lives on to the next step.
2. Cellular automata, and the SIRS model In this Section we consider an important set of models used in computer simulations, which are called cellular automata (these are very similar to the so-called
More informationFinding Robust Solutions to Dynamic Optimization Problems
Finding Robust Solutions to Dynamic Optimization Problems Haobo Fu 1, Bernhard Sendhoff, Ke Tang 3, and Xin Yao 1 1 CERCIA, School of Computer Science, University of Birmingham, UK Honda Research Institute
More informationEpidemic Thresholds in Real Networks
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 1 Epidemic Thresholds in Real Networks Deepayan Chakrabarti, Yang Wang, Chenxi Wang, Jurij Leskovec and Christos Faloutsos deepay@cs.cmu.edu, yangwang@andrew.cmu.edu,
More informationMCMC 2: Lecture 3 SIR models - more topics. Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham
MCMC 2: Lecture 3 SIR models - more topics Phil O Neill Theo Kypraios School of Mathematical Sciences University of Nottingham Contents 1. What can be estimated? 2. Reparameterisation 3. Marginalisation
More informationOn Influential Node Discovery in Dynamic Social Networks
On Influential Node Discovery in Dynamic Social Networks Charu Aggarwal Shuyang Lin Philip S. Yu Abstract The problem of maximizing influence spread has been widely studied in social networks, because
More informationThe decoupling assumption in large stochastic system analysis Talk at ECLT
The decoupling assumption in large stochastic system analysis Talk at ECLT Andrea Marin 1 1 Dipartimento di Scienze Ambientali, Informatica e Statistica Università Ca Foscari Venezia, Italy (University
More informationOn a stochastic epidemic SEIHR model and its diffusion approximation
On a stochastic epidemic SEIHR model and its diffusion approximation Marco Ferrante (1), Elisabetta Ferraris (1) and Carles Rovira (2) (1) Dipartimento di Matematica, Università di Padova (Italy), (2)
More information4452 Mathematical Modeling Lecture 16: Markov Processes
Math Modeling Lecture 16: Markov Processes Page 1 4452 Mathematical Modeling Lecture 16: Markov Processes Introduction A stochastic model is one in which random effects are incorporated into the model.
More informationQualitative Analysis of a Discrete SIR Epidemic Model
ISSN (e): 2250 3005 Volume, 05 Issue, 03 March 2015 International Journal of Computational Engineering Research (IJCER) Qualitative Analysis of a Discrete SIR Epidemic Model A. George Maria Selvam 1, D.
More informationWhitepaper. All Currency, One Wallet!
Whitepaper BitStupm All Currency, One Wallet! All Currency, One Wallet! TABLE OF CONTENTS: BitStupm 1. WHAT IS CRYPTOCURRENCY? 2. HISTORY OF CRYPTOCURRENCY. 3. STRENGTH OF CRYPTOCURRENCY. 4. WHAT IS BITS?
More information