Chapter 6

Optimal control based techniques


In the previous chapters, we presented a variety of the models of capturing the dynamics and evolution of a malware outbreak in mobile wireless networks. Indeed, one of the goals of developing such models is to use them to analyze how such events can be manipulated (i.e. controlled) by the involved decision-makers. Both an administrator of a network (the defender) and the designer of a contagious malware (attacker) have a variety of parameters through which they can manipulate the spread of the malware in their own favor. In this chapter, we will present the general framework for analyzing how one decision-maker can optimally influence the dynamics of the malware specially in the context of SIR ...

Get Malware Diffusion Models for Modern Complex Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.