All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Swarm virus - Next-generation virus and antivirus paradigm?

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989100%3A27240%2F18%3A10241915" target="_blank" >RIV/61989100:27240/18:10241915 - isvavai.cz</a>

  • Alternative codes found

    RIV/61989100:27740/18:10241915 RIV/70883521:28140/18:63520686

  • Result on the web

    <a href="https://www.sciencedirect.com/science/article/pii/S221065021730768X" target="_blank" >https://www.sciencedirect.com/science/article/pii/S221065021730768X</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1016/j.swevo.2018.05.003" target="_blank" >10.1016/j.swevo.2018.05.003</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Swarm virus - Next-generation virus and antivirus paradigm?

  • Original language description

    In this article, we outline a possible dynamics, structure, and a behavior of a hypothetical (up to now) swarm malware as a background for a future antimalware system. We suggest how to capture and visualize behavior of such malware when it walks through the file system of an operating system. The swarm virus prototype, designed here, mimics a swarm system behavior and thus follows the main idea underlying the swarm intelligence algorithms. The information of the prototype&apos;s behavior is stored and visualized in the form of a complex network, reflecting virus communication and swarm behavior. The network nodes are then individual virus instances. The network has certain properties associated with its structure that can be used by the virus instances in its activities like locating target and executing payload on the right object. As the paper shows, the swarm behavior pattern can be incorporated also to an antimalware systems, and can be analyzed for a future computer system protection.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

    Result was created during the realization of more than one project. More information in the Projects tab.

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2018

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Swarm and Evolutionary Computation

  • ISSN

    2210-6502

  • e-ISSN

  • Volume of the periodical

    43

  • Issue of the periodical within the volume

    1

  • Country of publishing house

    US - UNITED STATES

  • Number of pages

    18

  • Pages from-to

    207-224

  • UT code for WoS article

    000452933500011

  • EID of the result in the Scopus database