메뉴 건너뛰기




Volumn 217, Issue 6, 2010, Pages 2520-2526

Dynamical behavior of computer virus on Internet

Author keywords

Computer virus; Global stability; Time delay

Indexed keywords

BIFURCATION PARAMETER; CRITICAL VALUE; DISEASE-FREE EQUILIBRIUM; DYNAMICAL BEHAVIORS; ENDEMIC STATE; GLOBAL STABILITY; GLOBALLY ASYMPTOTICALLY STABLE; LOCAL STABILITY; NUMERICAL RESULTS; PERIODIC SOLUTION;

EID: 77957993272     PISSN: 00963003     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.amc.2010.07.064     Document Type: Article
Times cited : (156)

References (21)
  • 1
    • 0036216396 scopus 로고    scopus 로고
    • The benefits of a notification process in addressing the worsening computer virus problem: Results of a survey and a simulation model
    • J.L. Aron, M. O'Leary, R.A. Gove, S. Azadegan, and M.C. Schneider The benefits of a notification process in addressing the worsening computer virus problem: results of a survey and a simulation model Computers and Security 21 2002 142 163
    • (2002) Computers and Security , vol.21 , pp. 142-163
    • Aron, J.L.1    O'Leary, M.2    Gove, R.A.3    Azadegan, S.4    Schneider, M.C.5
  • 2
    • 0037071123 scopus 로고    scopus 로고
    • A unified prediction of computer virus spread in connected networks
    • L. Billings, W.M. Spears, and I.B. Schwartz A unified prediction of computer virus spread in connected networks Physics Letters A 297 2002 261 266
    • (2002) Physics Letters A , vol.297 , pp. 261-266
    • Billings, L.1    Spears, W.M.2    Schwartz, I.B.3
  • 3
    • 0007049285 scopus 로고    scopus 로고
    • Some human dimensions of computer virus creation and infection
    • A. Bissett Some human dimensions of computer virus creation and infection International Journal Of Human-Computer Studies 52 2000 899 913
    • (2000) International Journal of Human-Computer Studies , vol.52 , pp. 899-913
    • Bissett, A.1
  • 4
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • F. Cohen Computer viruses: theory and experiments Computers and Security 6 1987 22 35
    • (1987) Computers and Security , vol.6 , pp. 22-35
    • Cohen, F.1
  • 6
    • 69249209635 scopus 로고    scopus 로고
    • Bifurcation analysis in an SIR epidemic model with birth pulse and pulse vaccination
    • Guirong Jiang, and Qigui Yang Bifurcation analysis in an SIR epidemic model with birth pulse and pulse vaccination Applied Mathematics and Computation 215 2009 1035 1046
    • (2009) Applied Mathematics and Computation , vol.215 , pp. 1035-1046
    • Jiang, G.1    Yang, Q.2
  • 7
    • 56749178276 scopus 로고    scopus 로고
    • Understanding virtual epidemics: Children's folk conceptions of a computer virus
    • Y.B. Kafai Understanding virtual epidemics: children's folk conceptions of a computer virus Journal of Science Education and Technology 6 2009 523 529
    • (2009) Journal of Science Education and Technology , vol.6 , pp. 523-529
    • Kafai, Y.B.1
  • 11
    • 0003302813 scopus 로고
    • Delay Differential Equations with Applications in Population Dynamics
    • Academic Press Boston, Mass, USA
    • Y. Kuang Delay Differential Equations with Applications in Population Dynamics Mathematics in Science and Engineering vol. 191 1993 Academic Press Boston, Mass, USA
    • (1993) Mathematics in Science and Engineering , vol.191
    • Kuang, Y.1
  • 12
    • 51849088915 scopus 로고    scopus 로고
    • Dynamic detection for computer virus based on immune system
    • T. Li Dynamic detection for computer virus based on immune system Science in China Series F-Information Sciences 51 2008 1475 1486
    • (2008) Science in China Series F-Information Sciences , vol.51 , pp. 1475-1486
    • Li, T.1
  • 13
    • 0035655856 scopus 로고    scopus 로고
    • Comment on 'A framework for modelling trojans and computer virus infection'
    • E. Makinen Comment on 'A framework for modelling trojans and computer virus infection' Computer Journal 44 2004 321 323
    • (2004) Computer Journal , vol.44 , pp. 321-323
    • Makinen, E.1
  • 14
    • 34250656571 scopus 로고    scopus 로고
    • Fixed period of temporary immunity after run of anti-malicious software on computer nodes
    • B. Mishra, and N. Jha Fixed period of temporary immunity after run of anti-malicious software on computer nodes Applied Mathematics and Computation 190 2007 1207 1212
    • (2007) Applied Mathematics and Computation , vol.190 , pp. 1207-1212
    • Mishra, B.1    Jha, N.2
  • 16
    • 50149118846 scopus 로고    scopus 로고
    • Classification of packed executables for accurate computer virus detection
    • R. Perdisci, A. Lanzi, and W. Lee Classification of packed executables for accurate computer virus detection Pattern Recognition Letters 29 2008 1941 1946
    • (2008) Pattern Recognition Letters , vol.29 , pp. 1941-1946
    • Perdisci, R.1    Lanzi, A.2    Lee, W.3
  • 17
    • 0032590243 scopus 로고    scopus 로고
    • Responses to the Michelangelo computer virus threat: The role of information sources and risk homeostasis theory
    • J.E. Sawyer, M.C. Kernan, D.E. Conlon, and H. Garland Responses to the Michelangelo computer virus threat: the role of information sources and risk homeostasis theory Journal of Applied Social Psychology 29 1999 23 51
    • (1999) Journal of Applied Social Psychology , vol.29 , pp. 23-51
    • Sawyer, J.E.1    Kernan, M.C.2    Conlon, D.E.3    Garland, H.4
  • 18
    • 67349167681 scopus 로고    scopus 로고
    • The effect of impulsive vaccination on an SIR epidemic model
    • Ruiqing Shi, Xiaowu Jiang, and Lansun Chen The effect of impulsive vaccination on an SIR epidemic model Applied Mathematics and Computation 212 2009 305 311
    • (2009) Applied Mathematics and Computation , vol.212 , pp. 305-311
    • Shi, R.1    Jiang, X.2    Chen, L.3
  • 19
    • 33749049349 scopus 로고    scopus 로고
    • Semi-empirical power-law scaling of new infection rate to model epidemic dynamics with inhomogeneous mixing
    • Phillip D. Stroud, Stephen J. Sydoriak, Jane M. Riese, James P. Smith, Susan M. Mniszewski, and Phillip R. Romero Semi-empirical power-law scaling of new infection rate to model epidemic dynamics with inhomogeneous mixing Mathematical Biosciences 203 2006 301 318
    • (2006) Mathematical Biosciences , vol.203 , pp. 301-318
    • Stroud, P.D.1    Sydoriak, S.J.2    Riese, J.M.3    Smith, J.P.4    Mniszewski, S.M.5    Romero, P.R.6
  • 20
    • 0032260307 scopus 로고    scopus 로고
    • A framework for modelling trojans and computer virus infection
    • H. Thimbleby, S. Anderson, and P. Cairns A framework for modelling trojans and computer virus infection Computer Journal 41 1998 444 458
    • (1998) Computer Journal , vol.41 , pp. 444-458
    • Thimbleby, H.1    Anderson, S.2    Cairns, P.3
  • 21
    • 0442280819 scopus 로고    scopus 로고
    • Modeling computer virus prevalence with a susceptible-infected- susceptible model with reintroduction
    • J.C. Wierman, and D.J. Marchette Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction Computational Statistics and Data Analysis 45 2004 3 23
    • (2004) Computational Statistics and Data Analysis , vol.45 , pp. 3-23
    • Wierman, J.C.1    Marchette, D.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.