subject

Collaborative problem: you are some security analysts monitor a collection of networked computers, tracking the spread of an online virus. there are n computers in the system, labeled c1,c2 cn, and as input, you are given a collection of trace data indicating the times at which pairs of computers communicated. thus the data is a sequence of ordered triples (ci, cj, tk) such a triple indicates that ci and c, communicated at time tk. assume there are m triples total. now let us assume that the triples are presented to you in sorted order of time. for purposes of simplicity, we will assume that each pair of computers communicates at most once during the inter val you are observing. the security analysts you are working with would like to be able to answer questions of the following form: if the virus was inserted into computer ca at time r, could it pos- sibly have infected computer cb by time y? the mechanics of infection are simple if an infected computer ci communicates with an uninfected computer cj at time t (in other words, if one of the triples (ci, cj, tk) or (cj, ci, tk) appears in the trace data), then computer c, becomes infected as well, starting at time tk. infection can thus spread from one machine to another across a sequence of communications, provided that no step in this sequence involves a move backwards in time. thus, for example, if ci is infected by time tk and the trace data contains triples (ci, cj, tk) and (cj, ct), where tks tr, then c will become infected via cj. (note that it is okay for tk to be equal to tr. this would mean that c, had open connections to both ci and c at the same time, so a virus could move from ci to cq) for example, suppose 4, the trace data consists of the triples (c1,c2,4), (c2,c4,8) (cs, c4,8) (c1, c4, 12) and the virus was inserted into computer ci at time 2. then cs would be infected at time 8 by a sequence of three steps first c2 becomes infected at time 4, then c4 gets the virus from c2 at time 8, and then cs gets the virus from c4 at time 8.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 15:10
David is in week 3 of his current ashford course and has a paper due by monday night at midnight. he has finished everything but the concluding paragraph. as he boots up his computer to work on it, he sees a flash across the screen and then the screen goes black. he begins to panic as he tries desperately to turn the laptop back on. david should have saved his work on what kind of portable device?
Answers: 2
question
Computers and Technology, 22.06.2019 23:30
In my email i got a message it says a quick message and in message details on who its from its says nicole and under nicole is [email protected] -
Answers: 1
question
Computers and Technology, 23.06.2019 01:40
You have a linux system that has a 1000gb hard disk drive, which has a 90gb partition containing an ext4 filesystem mounted to the / directory and a 4gb swap partition. currently, this linux system is only used by a few users for storing small files; however, the department manager wants to upgrade this system and use it to run a database application that will be used by 100 users. the database application and the associated data will take up over 200gb of hard disk space. in addition, these 100 users will store their personal files on the hard disk of the system. each user must have a maximum of 5gb of storage space. the department manager has made it very clear that this system must not exhibit any downtime as a result of hard disk errors. how much hard disk space will you require, and what partitions would you need to ensure that the system will perform as needed? where would these partitions be mounted? what quotas would you implement? what commands would you need to run and what entries to /etc/fstab would you need to create? justify your answers.
Answers: 3
question
Computers and Technology, 23.06.2019 09:30
You wanted to look up information about alzheimer's, but you were unsure if it was spelled "alsheimer's" or "alzheimer's." which advanced search strategy would be useful? a) a boolean search b) using a wild card in your search c) trying different search engines d) doing a search for "alsheimer's not alzheimer's" asap. ill give brainlist.
Answers: 1
You know the right answer?
Collaborative problem: you are some security analysts monitor a collection of networked computers,...
Questions
question
Mathematics, 12.05.2021 17:10
question
Mathematics, 12.05.2021 17:10
question
Mathematics, 12.05.2021 17:10
Questions on the website: 13722363