Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14365/1160
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKondakçı, Süleyman-
dc.date.accessioned2023-06-16T12:59:12Z-
dc.date.available2023-06-16T12:59:12Z-
dc.date.issued2009-
dc.identifier.issn0167-4048-
dc.identifier.issn1872-6208-
dc.identifier.urihttps://doi.org/10.1016/j.cose.2009.03.007-
dc.identifier.urihttps://hdl.handle.net/20.500.14365/1160-
dc.description.abstractIn this paper we present a cost model to analyze impacts of Internet malware in order to estimate the cost of incidents and risk caused by them. The model is useful in determining parameters needed to estimate recovery efficiency, probabilistic risk distributions, and cost of malware incidents. Many users tend to underestimate the cost of curiosity coming with stealth malware such as email-attachments, freeware/shareware, spyware (including keyloggers, password thieves, phishing-ware, network sniffers, stealth backdoors, and rootkits), popups, and peer-to-peer fileshares. We define two sets of functions to describe evolution of attacks and potential loss caused by malware, where the evolution functions analyze infection patterns, while the loss functions provide risk-impact analysis of failed systems. Due to a wide range of applications, such analyses have drawn the attention of many engineers and researchers. Analysis of malware propagation itself has little to contribute unless tied to analysis of system performance, economic loss, and risks. (C) 2009 Elsevier Ltd. All rights reserveden_US
dc.language.isoenen_US
dc.publisherElsevier Advanced Technologyen_US
dc.relation.ispartofComputers & Securıtyen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectRisk assessmenten_US
dc.subjectStochastic cost modelingen_US
dc.subjectMalware modelingen_US
dc.subjectProbabilistic worm spreaden_US
dc.subjectEpidemiologyen_US
dc.titleA concise cost analysis of Internet malwareen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/j.cose.2009.03.007-
dc.identifier.scopus2-s2.0-70349438880en_US
dc.departmentİzmir Ekonomi Üniversitesien_US
dc.authoridKondakçı, Süleyman/0000-0001-5150-3220-
dc.authorwosidKondakçı, Süleyman/AAU-8212-2021-
dc.authorscopusid15061511300-
dc.identifier.volume28en_US
dc.identifier.issue7en_US
dc.identifier.startpage648en_US
dc.identifier.endpage659en_US
dc.identifier.wosWOS:000271127200015en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityQ1-
dc.identifier.wosqualityQ2-
item.grantfulltextreserved-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeArticle-
item.fulltextWith Fulltext-
item.languageiso639-1en-
crisitem.author.dept05.05. Computer Engineering-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File SizeFormat 
178.pdf
  Restricted Access
608.9 kBAdobe PDFView/Open    Request a copy
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

15
checked on Oct 2, 2024

WEB OF SCIENCETM
Citations

10
checked on Oct 2, 2024

Page view(s)

462
checked on Sep 30, 2024

Download(s)

6
checked on Sep 30, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.