{"created":"2023-05-15T12:16:54.483094+00:00","id":388,"links":{},"metadata":{"_buckets":{"deposit":"3217afd1-fddd-4b03-9c01-3fe151820390"},"_deposit":{"created_by":3,"id":"388","owners":[3],"pid":{"revision_id":0,"type":"depid","value":"388"},"status":"published"},"_oai":{"id":"oai:tuis.repo.nii.ac.jp:00000388","sets":["1:4:44:59"]},"author_link":["1587","1588","1589","1590","1591","1592"],"control_number":"388","item_1701328008552":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"東京情報大学","subitem_publisher_language":"ja"}]},"item_1_biblio_info_14":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2011-09-30","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"1","bibliographicPageEnd":"8","bibliographicPageStart":"1","bibliographicVolumeNumber":"15","bibliographic_titles":[{"bibliographic_title":"東京情報大学研究論集","bibliographic_titleLang":"ja"}]}]},"item_1_creator_6":{"attribute_name":"著者名(日)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"小牧, 嵩征","creatorNameLang":"ja"},{"creatorName":"コマキ, タカユキ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森口, 一郎","creatorNameLang":"ja"},{"creatorName":"モリグチ, イチロウ","creatorNameLang":"ja-Kana"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Komaki, Takayuki","creatorNameLang":"en"}]},{"creatorNames":[{"creatorName":"Moriguchi, Ichirou","creatorNameLang":"en"}]}]},"item_1_creator_7":{"attribute_name":"著者名よみ","attribute_type":"creator","attribute_value_mlt":[{"nameIdentifiers":[{}]},{"nameIdentifiers":[{}]}]},"item_1_creator_8":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"nameIdentifiers":[{}]},{"nameIdentifiers":[{}]}]},"item_1_description_1":{"attribute_name":"ページ属性","attribute_value_mlt":[{"subitem_description":"P(論文)","subitem_description_type":"Other"}]},"item_1_description_11":{"attribute_name":"抄録(日)","attribute_value_mlt":[{"subitem_description":"ウイルス対策ソフトで各コンピュータに免疫を与える方法では、インターネット上からウイルスを絶滅することは困難である。これに替わる手法として、ネットワーク上のウイルスを削除してまわるプログラムをネットワーク上に放つ手法を提案し、この手法の有効性とどのような挙動を起こすのかをシミュレーションで検証した。この結果、捕食プログラムを自己消滅するようにした場合、捕食プログラムの寿命を長くしない限りウイルスの絶滅は困難なことを明らかにした。また、インターネットのようなネットワーク構造を持つ場合、各ノードのリンク数が一様なネットワークに比べ、捕食プログラムがネットワーク上に広がりやすいことがわかった。","subitem_description_language":"ja","subitem_description_type":"Other"}]},"item_1_description_12":{"attribute_name":"抄録(英)","attribute_value_mlt":[{"subitem_description":"It has been shown that the anti-virus strategy immunizing each computer is difficult to exterminate computer viruses in the Internet. In this study, we proposed a new anti-virus strategy that releases the programs which move around in the Internet and remove viruses, and investigated the effectiveness of this strategy by simulation. In case that the anti-virus programs disappear of themselves, it was shown that exterminating computer viruses is difficult. Futhermore, it was also shown that moving anti-virus programs easily diffuse on heterogeneous networks than on homogeneous networks.","subitem_description_language":"en","subitem_description_type":"Other"}]},"item_1_identifier_registration":{"attribute_name":"ID登録","attribute_value_mlt":[{"subitem_identifier_reg_text":"10.15029/00000387","subitem_identifier_reg_type":"JaLC"}]},"item_1_source_id_13":{"attribute_name":"雑誌書誌ID","attribute_value_mlt":[{"subitem_source_identifier":"AA11155514","subitem_source_identifier_type":"NCID"}]},"item_1_text_10":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_language":"en","subitem_text_value":"Japan Advanced Institute of Science and Technology,School of Knowledge Science"},{"subitem_text_language":"en","subitem_text_value":"Tokyo University of Information Sciences, Faculty of Informatics, Department of Information Systems"}]},"item_1_text_9":{"attribute_name":"著者所属(日)","attribute_value_mlt":[{"subitem_text_language":"ja","subitem_text_value":"北陸先端科学技術大学院大学知識科学研究科(2011年3月東京情報大学総合情報学部情報システム学科卒業)"},{"subitem_text_language":"ja","subitem_text_value":"東京情報大学総合情報学部情報システム学科"}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2011-09-30"}],"displaytype":"detail","filename":"KJ00007275699.pdf","filesize":[{"value":"310.2 kB"}],"format":"application/pdf","license_note":"TUIS","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"KJ00007275699","url":"https://tuis.repo.nii.ac.jp/record/388/files/KJ00007275699.pdf"},"version_id":"6ea1313e-e798-498f-ad5d-c38b483643a4"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"SIモデル","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"random network","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"scale-free network","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"ウイルス対策","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"捕食-被食関係","subitem_subject_language":"ja","subitem_subject_scheme":"Other"},{"subitem_subject":"SI model","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"random network","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"scale-free network","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"anti-virus","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"predator-prey relationships","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"departmental bulletin paper","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"ウイルス捕食プロセスを用いたコンピュータウイルス対策シミュレーション","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"ウイルス捕食プロセスを用いたコンピュータウイルス対策シミュレーション","subitem_title_language":"ja"},{"subitem_title":"Anti-virus simulation using predator process","subitem_title_language":"en"}]},"item_type_id":"1","owner":"3","path":["59"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2011-09-30"},"publish_date":"2011-09-30","publish_status":"0","recid":"388","relation_version_is_last":true,"title":["ウイルス捕食プロセスを用いたコンピュータウイルス対策シミュレーション"],"weko_creator_id":"3","weko_shared_id":-1},"updated":"2023-12-22T02:33:18.278510+00:00"}