scispace - formally typeset
Search or ask a question
Author

Vladislav Taynitskiy

Bio: Vladislav Taynitskiy is an academic researcher from Saint Petersburg State University. The author has contributed to research in topics: Malware & Epidemic model. The author has an hindex of 5, co-authored 10 publications receiving 46 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper studies the heterogeneous SIR model where two types of malware spread over the network and formulates an impulse optimal control problem to describe the optimal strategy of periodic patching that happens at discrete points of time.

16 citations

Journal ArticleDOI
01 Dec 2018-Games
TL;DR: A novel framework to study the epidemic process with mutations of influenza viruses is established, which couples the SIR model with replicator dynamics used for describing virus mutations, and an optimal control problem is formulated toStudy the optimal strategies for medical treatment and quarantine decisions.
Abstract: Different strains of influenza viruses spread in human populations during every epidemic season. As the size of an infected population increases, the virus can mutate itself and grow in strength. The traditional epidemic SIR model does not capture virus mutations and, hence, the model is not sufficient to study epidemics where the virus mutates at the same time as it spreads. In this work, we establish a novel framework to study the epidemic process with mutations of influenza viruses, which couples the SIR model with replicator dynamics used for describing virus mutations. We formulated an optimal control problem to study the optimal strategies for medical treatment and quarantine decisions. We obtained structural results for the optimal strategies and used numerical examples to corroborate our results.

16 citations

Proceedings ArticleDOI
22 May 2017
TL;DR: A continuous-time Susceptible-Infected-Recovered (SIR) epidemic model with two types of malware for heterogeneous populations over a large network of devices to capture the heterogeneous nature of the IoT networks.
Abstract: With the emerging Internet of Things (IoT) technologies, malware spreading over increasingly connected networks becomes a new security concern. To capture the heterogeneous nature of the IoT networks, we propose a continuous-time Susceptible-Infected-Recovered (SIR) epidemic model with two types of malware for heterogeneous populations over a large network of devices. The malware control mechanism is to patch an optimal fraction of the infected nodes at discrete points in time, which leads to an impulse controller. We use the Pontryagin's minimum principle for impulsive systems to obtain an optimal structure of the controller and use numerical experiments to demonstrate the computation of the optimal control and the controlled dynamics.

10 citations

Book ChapterDOI
09 May 2017
TL;DR: This paper investigates two controlled multi-strain epidemic models for heterogeneous populations over a large complex network and obtains the structure of optimal control policies for both models.
Abstract: The emergence of new diseases, such as HIV/AIDS, SARS, and Ebola, represent serious problems for the public health and medical science research to address. Despite the rapid development of vaccines and drugs, one challenge in disease control is the fact that one pathogen sometimes generates many strains with different spreading features. Hence it is of critical importance to investigate multi-strain epidemic dynamics and its associated epidemic control strategies. In this paper, we investigate two controlled multi-strain epidemic models for heterogeneous populations over a large complex network and obtain the structure of optimal control policies for both models. Numerical examples are used to corroborate the analytical results.

10 citations

Book ChapterDOI
23 Nov 2016
TL;DR: An optimal control problem is formulated that seeks to minimize the total system cost that includes the economic value of security risks and resources required by countermeasures and introduces an impulse control problem to provide efficient control of the epidemic model compared with its continuous control counterpart.
Abstract: Malware is a malicious software which aims to disrupt computer operations, gather sensitive information, and gain access to private computer systems. It can induce various sorts of damage, including economic costs, the leakage of private information, and instability of physical systems, etc. The distribution of antivirus patches in a network enables the control of the proliferation of malicious software and decreases possible losses. Multiple types of malware can coexist in a network. Hence it is important to protect a computer network from several heterogeneous malware, which can propagate in the network at the same time. In this study, we model the propagation of two types of malware using a modified two-virus epidemic model. We formulate an optimal control problem that seeks to minimize the total system cost that includes the economic value of security risks and resources required by countermeasures. We introduce an impulse control problem to provide efficient control of the epidemic model compared with its continuous control counterpart. Numerical experiments are used to corroborate the results.

5 citations


Cited by
More filters
Journal ArticleDOI
06 Mar 2019-Sensors
TL;DR: This paper provides a near complete and up-to-date view of the IoT authentication field and provides a summary of a large range of authentication protocols proposed in the literature, using a multi-criteria classification previously introduced in this work.
Abstract: The Internet of Things (IoT) is the ability to provide everyday devices with a way of identification and another way for communication with each other. The spectrum of IoT application domains is very large including smart homes, smart cities, wearables, e-health, etc. Consequently, tens and even hundreds of billions of devices will be connected. Such devices will have smart capabilities to collect, analyze and even make decisions without any human interaction. Security is a supreme requirement in such circumstances, and in particular authentication is of high interest given the damage that could happen from a malicious unauthenticated device in an IoT system. This paper gives a near complete and up-to-date view of the IoT authentication field. It provides a summary of a large range of authentication protocols proposed in the literature. Using a multi-criteria classification previously introduced in our work, it compares and evaluates the proposed authentication protocols, showing their strengths and weaknesses, which constitutes a fundamental first step for researchers and developers addressing this domain.

261 citations

Journal ArticleDOI
TL;DR: The third edition of this book has been completely revised and updated, and new chapters have been added on Hantanvirus by Karl Johnson, on retroviruses by William Blattner, and on hepatocellular carcinoma by Joseph Melnick as discussed by the authors.
Abstract: The third edition of this book has been completely revised and updated, and new chapters have been added on Hantanvirus by Karl Johnson, on retroviruses by William Blattner, and on hepatocellular carcinoma by Joseph Melnick. New authors have replaced previous authors for several chapters. These include Karl Johnson on arenaviruses, Stephen Hadler and Harold Margolin on viral hepatitis, Paul Glezen and Robert Couch on influenza, Alfred S. Evans and Guy de-The on Burkitt lymphoma, and Joseph Melnick, William Rawls, and Ervin Adam on cervical cancer. A summary of the major advances since the last edition in 1982 has been provided by each contributor as given below. Overall, it is clear that the rapid advances in molecular virology, monoclonal antibody, and rapid diagnostic techniques dominate the progress since the last edition and provide a better understanding of pathogenesis, newer tools for epidemiologic investigation, and new methods for vac cine production. Although there is repetition in mention of these advances as written by each contributor, the editor has let these stand to let the reader know how each interprets the impact of these new developments. I. Introduction and Concepts Chapter 1. Epidemiologic Concepts and Methods: The sections on control of infectious diseases has been much expanded to cover progress and problems in both developed and developing countries, the concepts of eradication and elimination, and the means to assess the need and effectiveness of immuniza tion programs."

222 citations

Journal ArticleDOI
16 Sep 2021-PLOS ONE
TL;DR: In this article, a new epidemic model that simultaneously considers multiple viral strains and reinfection due to waning immunity is presented, which can derive optimal mitigation strategies for any number of viral strains, whilst also evaluating the effect of distinct mitigation costs on the infection levels.
Abstract: Reinfection and multiple viral strains are among the latest challenges in the current COVID-19 pandemic. In contrast, epidemic models often consider a single strain and perennial immunity. To bridge this gap, we present a new epidemic model that simultaneously considers multiple viral strains and reinfection due to waning immunity. The model is general, applies to any viral disease and includes an optimal control formulation to seek a trade-off between the societal and economic costs of mitigation. We validate the model, with and without mitigation, in the light of the COVID-19 epidemic in England and in the state of Amazonas, Brazil. The model can derive optimal mitigation strategies for any number of viral strains, whilst also evaluating the effect of distinct mitigation costs on the infection levels. The results show that relaxations in the mitigation measures cause a rapid increase in the number of cases, and therefore demand more restrictive measures in the future.

37 citations

Journal ArticleDOI
TL;DR: A hybrid control strategy that combines a continuous truth spreading method and an impulsive rumor blocking method is discussed, where the truth is introduced as an anti-rumor to compete with the rumor while the rumor-infected users would be quarantined with a limited isolation period.
Abstract: Toward combating the malicious rumor spreading on online social networks, we discuss a hybrid control strategy that combines a continuous truth spreading method and an impulsive rumor blocking method in this article. In this strategy, the truth is introduced as an anti-rumor to compete with the rumor while the rumor-infected users would be quarantined with a limited isolation period. The stability of the rumor-free equilibrium of the rumor-truth propagation system is analyzed and conditions to reach uniform asymptotic stability as well as global exponential stability are obtained. For the endemic case, the conditions under which rumor would persist uniformly are obtained. An optimal hybrid control problem is formulated to address the tradeoff between restraining rumor and minimizing the cost of control. The necessary conditions for optimal system and the structure of optimal hybrid control are obtained. Numerical simulations are carried out to illustrate the theoretical results and evaluate the potential roles of the hybrid control strategy.

31 citations

Journal ArticleDOI
TL;DR: A comparative study on the existing models of information diffusion on the Internet such as the Ising model, Sznajd model, SIRmodel, SICR model, Game theory and social networking services models is provided.

23 citations