scholarly journals An Epidemic Model of Malware Virus with Quarantine

Author(s):  
Aprillya Lanz ◽  
Daija Rogers ◽  
T. L. Alford

In March of 2018, about 500,000 desktop computers were infected with cryptocurrency mining malware in less than 24 hours. In addition to attacking desktop computers, malware also attacks laptops, tablets, mobile phones. That is, any device connected via the Internet, or a network is at risk of being attacked. In recent years, mobile phones have become extremely popular that places them as a big target of malware infections. In this study, the effectiveness of treatment for infected mobile devices is examined using compartmental modeling. Many studies have considered malware infections which also include treatment effectiveness. However, in this study we examine the treatment effectiveness of mobile devices based on the type of malware infections accrued (hostile or malicious malware). This model considers six classes of mobile devices based on their epidemiological status: susceptible, exposed, infected by hostile malware, infected by malicious malware, quarantined, and recovered. The malware reproduction number, RM, was identied to discover the threshold values for the dynamics of malware infections to become both prevalent or absent among mobile devices. Numerical simulations of the model give insights of various strategies that can be implemented to control malware epidemic in a mobile network.

2011 ◽  
Vol 7 (3) ◽  
Author(s):  
Jerry Bowskill ◽  
Nick Dyer

The world of telecommunications is being rapidly redefined by the Internet. Longer-term trends show that mobile, networked computers will form the basis of the future of personal communications. Not only is the telephone handset becoming mobile, by defauit, but the boundary between phone and computer is set to disappear. Networks for mobile devices are also changing fast, within the next five years the global mobile network will support megabit rather than the current kilobit connections. In summary most phones are becoming mobile, phones are becoming computers and the underlying network is becoming a fast global TCP/IP network.DOI: 10.1080/0968776990070305 


2022 ◽  
pp. 51-68
Author(s):  
Vijay Prakash ◽  
Lalit Garg ◽  
Luke Camilleri ◽  
Joseph Curmi ◽  
Darren Camilleri

5G is a new universal wireless standard, a new form of mobile network engineered to bring everyone and everything virtually together. 5G is not only for mobile phones, but it is also the foundation for virtual reality (VR), the internet of things (IoT), and autonomous driving, connecting many electronic devices to the internet. Having good healthcare is very important as it affects all parts of human life and social well-being. Moreover, it is crucial to have a great healthcare system if we want economic growth, workforce productivity, and society to advance. Despite all the hard work done by scientists and medical professionals, today's healthcare is mainly inefficient, and a significant overhaul is required. This chapter discusses the primary advantages, including the 5G's main features in healthcare and their limitations and probable solutions and applications to the latest scenario.


NFC devices are used in contactless payment systems, similar to those used in credit cards electronic ticket smartcards and allow mobile payment to replace and supplement these systems. Specifically, combining NFC enabled devices or NFC mobile phones with RFID tags offers additional benefits when compared to traditional RFID solutions. When an application requires that a device have frequent interaction with tags at numerous process points, the high expense of using traditional handheld RFID readers is cost prohibitive. By replacing handheld readers with NFC-enabled phones at data collection points, the ROI for the application increases. HID Trusted Tag® Services is an example of an application that combines HID Global's patented Near Field Communication (NFC) trusted tag technology and cloud-based authentication platform to add unique and trusted identities to everyday objects that can be read by NFC-enabled mobile devices. This is ideal for establishing proof of presence, digital out of home (DOOH) and electronic visitor verification (EVV) and also serves as a real-world application of the Internet of Things (IoT) that has been discussed in Chapter 1. Some of the examples of NFC based mobile devices is discussed in the chapter.


2020 ◽  
pp. 1921-1942
Author(s):  
Abraham Pouliakis ◽  
Stavros Archondakis ◽  
Niki Margari ◽  
Petros Karakitsos

Cytopathology is a popular discipline since George Papanicolaou proposed the famous test pap about 60 years ago. Today modern cytopathology laboratories still use the microscope as the primary diagnostic device and additionally they host modalities performing medical tests and exchange data via networks and have imaging systems producing pictures and virtual slides; the volume of produced data nowadays is enormous. Simultaneously mobile phones and tablets have evolved; their capabilities compete desktop computers and have the advantage of being always connected and at the side of users. Despite there are rather limited applications relevant to cytopathology for the mobile device, there is potential for uses in numerous activities of the cytopathology laboratory, including and not limited to: training, reporting, diagnosis and consultation, laboratory management, whole slide imaging, interactions between patient-doctor, doctor-doctor and within the laboratory personnel, quality control and assurance. Mobile devices can offer important benefits to the modern cytopathology laboratory.


Author(s):  
Abraham Pouliakis ◽  
Stavros Archondakis ◽  
Niki Margari ◽  
Petros Karakitsos

Cytopathology is a popular discipline since George Papanicolaou proposed the famous test pap about 60 years ago. Today modern cytopathology laboratories still use the microscope as the primary diagnostic device and additionally they host modalities performing medical tests and exchange data via networks and have imaging systems producing pictures and virtual slides; the volume of produced data nowadays is enormous. Simultaneously mobile phones and tablets have evolved; their capabilities compete desktop computers and have the advantage of being always connected and at the side of users. Despite there are rather limited applications relevant to cytopathology for the mobile device, there is potential for uses in numerous activities of the cytopathology laboratory, including and not limited to: training, reporting, diagnosis and consultation, laboratory management, whole slide imaging, interactions between patient-doctor, doctor-doctor and within the laboratory personnel, quality control and assurance. Mobile devices can offer important benefits to the modern cytopathology laboratory.


2020 ◽  
Vol 13 (1) ◽  
pp. 101-104
Author(s):  
Márk Kovács ◽  
Péter András Agg ◽  
Zsolt Csaba Johanyák

AbstractDue to the exponentially growing number of mobile devices connected to the Internet, the current 4G LTE-A mobile network will no longer be able to serve the nearly 5 billion mobile devices. With the advent of the fifth generation, however, the number of cybercrimes may increase. This requires building an architecture that can adequately protect against these attacks. For wired networks, the SDN-type architecture has been introduced for some time. As a result, a similar design concept has emerged, which is called Software Defined Mobile Networks (SDMN). This article describes this technology and how it helps prevents DoS, DDoS at-tacks, and IP source spoofing.


2018 ◽  
Vol 1 (2) ◽  
pp. 12
Author(s):  
Pedro Vitor de Sousa Guimarães ◽  
Sandro César Silveira Jucá ◽  
Renata Imaculada Soares Pereira ◽  
Ayrton Alexsander Monteiro Monteiro

This paper describes the use of a Linux embedded system for use in digital information and communication technology in order to generate image warnings using Internet of Things (IoT) prin- ciples. The proposed project generated a product, developed using concepts of project-based learning (ABP), called SECI (electronic internal communication system) that is accessed by students to view online warnings by distributed monitors and also by mobile devices connected to the Internet.


Author(s):  
Xiaoming Fan ◽  
Zhigang Wang

AbstractAn SEIR epidemic model with constant immigration and random fluctuation around the endemic equilibrium is considered. As a special case, a deterministic system discussed by Li et al. will be incorporated into the stochastic version given by us. We carry out a detailed analysis on the asymptotic behavior of the stochastic model, also regarding of the basic reproduction number ℛ


2002 ◽  
Vol 3 (2) ◽  
pp. 45-52
Author(s):  
Jorian Clarke

Describes a six‐year study of children’s Internet usage which shows how preferences and habits have changed over time; this was conducted by SpectraCom Inc and Circle 1 network. Explains the research methodology and the objectives, which were to identify trends in the amount of time spent by children online now and in future, their opinions about the future role of the Internet in society and the future of e‐commerce, and parents’ roles in children’s online activities. Concludes that there is need for a more child‐friendly content in Internet sites and for more parental involvement, that children will be influential in the market for alternative devices like mobile phones, that online shopping is likely to flourish, and that children have a growing interest in online banking.


Sign in / Sign up

Export Citation Format

Share Document