Filters








195 Hits in 2.5 sec

Decontaminating a Network from a Black Virus

Jie Cai, Paola Flocchini, Nicola Santoro
2014 International Journal of Networking and Computing  
In this paper, we consider the problem of decontaminating a network from a black virus (BV) using a team of mobile system agents.  ...  intruder capture or network decontamination problem (where however there is no danger for the agents).  ...  This work has been supported in part by NSERC Discovery Grants, and by Prof. Flocchini's University Research Chair.  ... 
doi:10.15803/ijnc.4.1_151 fatcat:kedjisjmorgzfox7hvuifcllye

A Review of Computation Solutions by Mobile Agents in an Unsafe Environment

Anis Zarrad, Yassine Daadaa
2013 International Journal of Advanced Computer Science and Applications  
In this paper, we present several solutions for a black-hole and network decontamination problems. Then, we analyze their efficiency.  ...  In the second case, the dangerous agent is a virus; an agent moving between nodes infecting them, and the problem is for the "good" agents to capture it, and decontaminate the network.  ...  Virus protection represents a rising importance in network decontamination methods.  ... 
doi:10.14569/ijacsa.2013.040415 fatcat:hf3ytez3arcwfkeqk7lrwf2tm4

Distributed Black Virus Decontamination and Rooted Acyclic Orientations

Jie Cai, Paola Flocchini, Nicola Santoro
2015 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing  
The problem of optimal black virus decontamination (BVD) has been investigated for special classes of highly regular network topologies; a (centralized) solution exists for networks of known arbitrary  ...  In a network supporting mobile agents, a particular threat is that posed by the presence of a black virus (BV), a harmful entity capable of destroying any agent arriving at the site where it resides, and  ...  CONCLUSIONS In this paper, we have considered the Black Virus decontamination problem in networks of arbitrary and unknown topology.  ... 
doi:10.1109/cit/iucc/dasc/picom.2015.254 dblp:conf/IEEEcit/CaiFS15 fatcat:keohrqy3rzgr7cdx3ik2fogmpy

NETWORK DECONTAMINATION IN PRESENCE OF LOCAL IMMUNITY

FABRIZIO LUCCIO, LINDA PAGLI, NICOLA SANTORO
2007 International Journal of Foundations of Computer Science  
We consider the problem of decontaminating a network infected by a mobile virus.  ...  In all the existing literature, it is assumed that the immunity level of a decontaminated site is nil; that is, a decontaminated node, in absence of an antiviral agent on site, may be re-contaminated by  ...  The immediate impact of the presence of a virus in a network is that, in absence of anti-viral protection, the network sites become infected.  ... 
doi:10.1142/s0129054107004784 fatcat:ag747isxlnhd5ca3gckmihwrl4

Distributed Security Algorithms for Mobile Agents [chapter]

Paola Flocchini, Nicola Santoro
2012 Mobile Agents in Networking and Distributed Computing  
In this chapter we consider security problems of both types; and concentrate on two security problems, one for each type: locating a black hole, and capturing an intruder.  ...  In particular, specific severe security threats are those posed to the network site by harmful agents, and those posed to the mobile agents by harmful hosts.  ...  In particular we consider the presence of a mobile virus that infects any visited network site.  ... 
doi:10.1002/9781118135617.ch3 fatcat:fswhtelgnrgzzfvhb65a5fuk7i

Network Decontamination with Temporal Immunity by Cellular Automata [chapter]

Yassine Daadaa, Paola Flocchini, Nejib Zaguia
2010 Lecture Notes in Computer Science  
Network sites are assumed to be contaminated (e.g., by a virus) and a team of agents is deployed to decontaminate the whole network.  ...  Network decontamination (or disinfection) is a widely studied problem in distributed computing.  ...  In such contexts, the goal is typically to devise a strategy for the agents to collaboratively decontaminate the whole network using the smallest possible team in such a way that, once cleaned, a node  ... 
doi:10.1007/978-3-642-15979-4_31 fatcat:nzufou2omjhkhfhqzaoofxzrsi

Network decontamination under m-immunity

Paola Flocchini, Fabrizio Luccio, Linda Pagli, Nicola Santoro
2016 Discrete Applied Mathematics  
In this paper, we extend these investigations and consider for the first time the network decontamination problem when the parameter m is an arbitrary integer value m ≥ 1.  ...  This network decontamination problem, also called monotone connected graph search and intruder capture, has been extensively studied in the literature when m = 1 (no immunity).  ...  Decontaminating Tree Networks We now study decontamination of an arbitrary unrooted tree T .  ... 
doi:10.1016/j.dam.2015.07.020 fatcat:kgqskmt57jbzrj5kvxkthwg26e

Network decontamination with local immunization

L. Fabrizio, L. Pagli, N. Santoro
2006 Proceedings 20th IEEE International Parallel & Distributed Processing Symposium  
We consider the problem of decontaminating a network infected by a mobile virus.  ...  In this paper we consider the network decontamination problem under a new model of immunity to recontamination: we consider the case when a disinfected vertex, after the cleaning agent has gone, will become  ...  In such cases, a crucial task is to decontaminate the infected network.  ... 
doi:10.1109/ipdps.2006.1639553 dblp:conf/ipps/LuccioPS06 fatcat:tep24v636rgvlius5hit7cmriq

Network Decontamination with a Single Agent

Yassine Daadaa, Asif Jamshed, Mudassir Shabbir
2015 Graphs and Combinatorics  
Faults and viruses often spread in networked environments by propagating from site to neighboring site. We model this process of network contamination by graphs.  ...  We study immunity number for some classes of graphs corresponding to network topologies and present upper bounds on ι1(G), in some cases with matching lower bounds.  ...  Introduction Faults and viruses often spread in networked environments by propagating from site to neighboring site. The process is called network contamination.  ... 
doi:10.1007/s00373-015-1579-5 fatcat:fjx5ujetbrhl5bjcssjasvh36i

Faulty Node Repair and Dynamically Spawned Black Hole Search [chapter]

Wei Shi, Mengfei Peng, Jean-Pierre Corriveau, William Lee Croft
2017 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
We conclude that, using our proposed algorithm, b + 4 agents can repair all faulty nodes and locate the black hole infected by a virus v within finite time, when the black hole appears in the network before  ...  In a distributed environment, researchers aim, in particular, at eliminating faulty network entities.  ...  [5] study a network decontamination problem with a black virus, which is related to both black hole search and intruder capture problems.  ... 
doi:10.1007/978-3-319-59608-2_8 fatcat:ercaxwwm3zb7nivqbbxivclygu

Network Decontamination with a Single Agent [article]

Yessine Daadaa, Asif Jamshed, Mudassir Shabbir
2013 arXiv   pre-print
Faults and viruses often spread in networked environments by propagating from site to neighboring site. We model this process of network contamination by graphs.  ...  We study immunity number for some classes of graphs corresponding to network topologies and present upper bounds on ι_1(G), in some cases with matching lower bounds.  ...  Introduction 25 Faults and viruses often spread in networked environments by propagating from site 26 to neighboring site. The process is called network contamination.  ... 
arXiv:1307.7307v1 fatcat:yne7nw3jwbey7hbpwnzl7gqy64

Mobile Agents Rendezvous in spite of a Malicious Agent [article]

Shantanu Das, Flaminia L. Luccio, Euripides Markou
2016 arXiv   pre-print
We present some necessary conditions for solving rendezvous in spite of the malicious agent in arbitrary networks.  ...  Can the honest agents achieve rendezvous starting from an arbitrary configuration in spite of the malicious agent?  ...  While in the classical decontamination problem the aim is to extinguish the virus, in our setting the virus cannot be extinguished and has to be contained in one part of the network, thus dividing the  ... 
arXiv:1410.4772v2 fatcat:v5yufmksyjejflbytvjfrag7wm

Innovative Technologies for Advancement of WHO Risk Group 4 Pathogens Research [chapter]

James Logue, Jeffrey Solomon, Brian F. Niemeyer, Kambez H. Benam, Aaron E. Lin, Zach Bjornson, Sizun Jiang, David R. McIlwain, Garry P. Nolan, Gustavo Palacios, Jens H. Kuhn
2019 Global Virology III: Virology in the 21st Century  
These viruses are endemic to specific geographic locations and typically cause relatively infrequent,  ...  Risk Group 4 pathogens are a group of often lethal human viruses for which there are no widely available vaccines or therapeutics.  ...  Though live EBOV was not used in this study, another group used a similar NGS approach for RG-2/3 viruses, Sindbis virus and Venezuelan equine encephalitis virus.  ... 
doi:10.1007/978-3-030-29022-1_15 fatcat:22guwbxrerhfnozjibwunum5qa

No evidence for a common blood microbiome based on a population study of 9,770 healthy humans [article]

Cedric C.S. Tan, Minghao Chia, Karrie K.K. Ko, Hui Chen, Jianjun Liu, Marie Loh, Niranjan Nagarajan
2022 bioRxiv   pre-print
Contrary to the expectations of a shared blood microbiome, no species were detected in 84% of individuals, while only a median of one microbial species per individual was detected in the remaining 16%.  ...  Futhermore, microbes of the same species were detected in <5% of individuals, no co-occurrence patterns similar to microbiomes in other body sites was observed, and no associations between host phenotypes  ...  To determine if this result is a function of our stringent decontamination filters, we generated independent network graphs for the five adult cohorts before decontamination filtering and examined the  ... 
doi:10.1101/2022.07.29.502098 fatcat:cybr7koatneghjhg65znyzsu5q

USING SCATTERED MOBILE AGENTS TO LOCATE A BLACK HOLE IN AN UN-ORIENTED RING WITH TOKENS

STEFAN DOBREV, NICOLA SANTORO, WEI SHI
2008 International Journal of Foundations of Computer Science  
A black hole in a network is a highly harmful host that disposes of any incoming agents upon their arrival.  ...  Determining the location of a black hole in a ring network has been studied when each node is equipped with a whiteboard.  ...  virus infecting the network nodes); for example, see Refs  ... 
doi:10.1142/s0129054108006327 fatcat:n3wm3zasefblxiaceedzmpxzgi
« Previous Showing results 1 — 15 out of 195 results