Cyber attack and control techniques

5Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We have developed an Susceptible-Exposed-Infectious-Undetected- Recovered (SEIUR) model. The main feature of this model is the introduction of undetected class. This class is introduced due to the use of un-updated version of antivirus. Optimal control technique is one of the most efficient techniques to plan strategies for better implementation of resources. We have formulated the model and also developed some theoretical results supported by numerical simulation for implementation of control variable in the model.

Cite

CITATION STYLE

APA

Prajapati, A., & Mishra, B. K. (2015). Cyber attack and control techniques. In Advances in Intelligent Systems and Computing (Vol. 339, pp. 157–166). Springer Verlag. https://doi.org/10.1007/978-81-322-2250-7_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free