-
2
-
-
0030318519
-
Analysis of an SEIRS epidemic model with two delays
-
K. Cooke and P. Driessche, "Analysis of an SEIRS epidemic model with two delays," Journal of Math-ematical Biology, vol. 35, pp. 240-260, 1996.
-
(1996)
Journal of Math-ematical Biology
, vol.35
, pp. 240-260
-
-
Cooke, K.1
Driessche, P.2
-
3
-
-
0023294949
-
Computer virus, theory, and experi-ments
-
F. Cohen, "Computer virus, theory, and experi-ments," Proceedings of the 7th DOD/NBS Computer & Security Conference, pp. 22-35, 1987.
-
(1987)
Proceedings of the 7th DOD/NBS Computer & Security Conference
, pp. 22-35
-
-
Cohen, F.1
-
4
-
-
55949084136
-
The effectiveness of vaccina-tions on the spread of email-borne computer virus
-
May
-
S. Datta and H. Wang, "The effectiveness of vaccina-tions on the spread of email-borne computer virus," IEEE CCECE/CCGEI, pp. 21-223, May 2005.
-
(2005)
IEEE CCECE/CCGEI
, pp. 21-223
-
-
Datta, S.1
Wang, H.2
-
5
-
-
0027961889
-
Self-nonself discrimination in a computer
-
S. Forest, S. Hofmeyr, A. Somayaji, and T. Longstaff, "Self-nonself discrimination in a computer," Proceed-ings of IEEE Symposium on Computer Security, and Privacy, pp. 202-212, 1994.
-
(1994)
Proceed-ings of IEEE Symposium on Computer Security, and Privacy
, pp. 202-212
-
-
Forest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
6
-
-
48849111795
-
Thresh-olds for virus spread on networks
-
M. Draief, A. Ganesh, and L. Massouili, "Thresh-olds for virus spread on networks," Annals of Applied Probability, vol. 18, no. 2, pp. 359-378, 2008.
-
(2008)
Annals of Applied Probability
, vol.18
, Issue.2
, pp. 359-378
-
-
Draief, M.1
Ganesh, A.2
Massouili, L.3
-
7
-
-
0036613003
-
An artificial immune system archi-tecture for computer security applications
-
P. K. Harmer, P. D. Williams, G. H. Gunsch, and G. B. Lamont, "An artificial immune system archi-tecture for computer security applications," IEEE Transactions on Evolutionary Computation, vol. 6, no. 3, pp. 252-280, 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Harmer, P.K.1
Williams, P.D.2
Gunsch, G.H.3
Lamont, G.B.4
-
8
-
-
0029445684
-
An SIS epidemic model with variable population size, and a delay
-
H. W. Hethcote and P. Driessche, "An SIS epidemic model with variable population size, and a delay," Journal of Mathematical Biology, vol. 34, pp. 177-194, 1995.
-
(1995)
Journal of Mathematical Biology
, vol.34
, pp. 177-194
-
-
Hethcote, H.W.1
Driessche, P.2
-
10
-
-
21244453249
-
Differential susceptibility epidemic models
-
J. M. Hyman and J. Li, "Differential susceptibility epidemic models," Journal of Mathematical Biology, vol. 50, pp. 626-644, 2005.
-
(2005)
Journal of Mathematical Biology
, vol.50
, pp. 626-644
-
-
Hyman, J.M.1
Li, J.2
-
11
-
-
33646893242
-
Networks, and epidemic models
-
M. J. Keeling and K. T. D. Eames, "Networks, and epidemic models," Journal of the Royal Society In-terface, vol. 2, no. 4, pp. 295-307, 2005.
-
(2005)
Journal of the Royal Society In-terface
, vol.2
, Issue.4
, pp. 295-307
-
-
Keeling, M.J.1
Eames, K.T.D.2
-
13
-
-
0027150413
-
Measuring, and modeling computer virus prevalence
-
J. O. Kephart and S. R White, "Measuring, and modeling computer virus prevalence," IEEE Com-puter Security Symposium on Research in Security, and Privacy, pp. 2-15, 1993.
-
(1993)
IEEE Com-puter Security Symposium on Research in Security, and Privacy
, pp. 2-15
-
-
Kephart, J.O.1
White, S.R.2
-
14
-
-
84943680959
-
Com-puters, and epidemiology
-
J. O. Kephart, S. R. White, and D. M. Chess, "Com-puters, and epidemiology," IEEE Spectrum, vol. 30, no. 5, pp. 20-26, 1993.
-
(1993)
IEEE Spectrum
, vol.30
, Issue.5
, pp. 20-26
-
-
Kephart, J.O.1
White, S.R.2
Chess, D.M.3
-
15
-
-
0000998185
-
Contribu-tions of mathematical theory to epidemics, I
-
W. O. Kermack and A. G. McKendrick, "Contribu-tions of mathematical theory to epidemics, I," Pro-ceedings of the Royal Society of London, Series A, vol. 115, pp. 700-721, 1927.
-
(1927)
Pro-ceedings of the Royal Society of London, Series A
, vol.115
, pp. 700-721
-
-
Kermack, W.O.1
McKendrick, A.G.2
-
16
-
-
0002303718
-
Contribu-tions of mathematical theory to epidemics, II-The problem of endemicity
-
W. O. Kermack and A. G. McKendrick, "Contribu-tions of mathematical theory to epidemics, II-The problem of endemicity," Proceedings of the Royal So-ciety of London, Series A, vol. 141, pp. 94-122, 1933.
-
(1933)
Proceedings of the Royal So-ciety of London, Series A
, vol.141
, pp. 94-122
-
-
Kermack, W.O.1
McKendrick, A.G.2
-
17
-
-
0002379564
-
Contri-butions of mathematical theory to epidemics, III-Further studies of the problem of endemicity
-
W. O. Kermack and A. G. McKendrick, "Contri-butions of mathematical theory to epidemics, III-Further studies of the problem of endemicity," Proceedings of the Royal Society of London, Series A, vol. 138, pp. 55-83, 1932.
-
(1932)
Proceedings of the Royal Society of London, Series A
, vol.138
, pp. 55-83
-
-
Kermack, W.O.1
McKendrick, A.G.2
-
18
-
-
2942672808
-
Immunization, and epidemic dynam-ics in complex networks
-
N. Madar, T. Kalisky, R. Cohen, D. Ben Avraham, and S. Havlin, "Immunization, and epidemic dynam-ics in complex networks," European Physical Journal B, vol. 38, pp. 269-276, 2004.
-
(2004)
European Physical Journal B
, vol.38
, pp. 269-276
-
-
Madar, N.1
Kalisky, T.2
Cohen, R.3
Ben Avraham, D.4
Havlin, S.5
-
19
-
-
0035689341
-
Infection dynamics on scale-free networks
-
R. M. May and A. L. Lloyd, "Infection dynamics on scale-free networks," Physical Review E, vol. 64, pp. 1-3, 2001.
-
(2001)
Physical Review E
, vol.64
, pp. 1-3
-
-
May, R.M.1
Lloyd, A.L.2
-
20
-
-
34248175732
-
SEIRS epidemic model with delay for transmission of malicious ob-jects in computer network
-
B. K. Mishra and D. K. Saini, "SEIRS epidemic model with delay for transmission of malicious ob-jects in computer network," Applied Mathematics, and Computation, vol. 188, no. 2, pp. 1476-1482, 2007.
-
(2007)
Applied Mathematics, and Computation
, vol.188
, Issue.2
, pp. 1476-1482
-
-
Mishra, B.K.1
Saini, D.K.2
-
21
-
-
34247248180
-
-
B. K. Mishra and D. Saini, "Mathematical models on computer virus, Applied Mathematics, and Com-putation," vol. 187, no. 2, pp. 929-936, 2007.
-
(2007)
Mathematical models on computer virus, Applied Mathematics, and Com-putation
, vol.187
, Issue.2
, pp. 929-936
-
-
Mishra, B.K.1
Saini, D.2
-
22
-
-
34250656571
-
Fixed period of tempo-rary immunity after run of anti-malicious software on computer nodes
-
B. K. Mishra and N. Jha, "Fixed period of tempo-rary immunity after run of anti-malicious software on computer nodes," Applied Mathematics and Compu-tation, vol. 190, no. 2, pp. 1207-1212, 2007.
-
(2007)
Applied Mathematics and Compu-tation
, vol.190
, Issue.2
, pp. 1207-1212
-
-
Mishra, B.K.1
Jha, N.2
-
23
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
Apr
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," Proceedings of IEEE INFO-COM'03, pp. 85-91, Apr. 2003.
-
(2003)
Proceedings of IEEE INFO-COM'03
, pp. 85-91
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
24
-
-
37649029105
-
Email networks, and the spread of computer virus
-
M. E. J. Newman, S. Forrest, and J. Balthrop, "Email networks, and the spread of computer virus," Physical Review E, vol. 66, pp. 232-239, 2002.
-
(2002)
Physical Review E
, vol.66
, pp. 232-239
-
-
Newman, M.E.J.1
Forrest, S.2
Balthrop, J.3
-
25
-
-
18844408001
-
-
Hand-book of Graphs, and Networks: From the Genome to the Internet, Wiley-VCH, Berlin
-
R. Pastor-Satorras and A. Vespignani, Epidemics, and Immunization in Scale-Free Networks, Hand-book of Graphs, and Networks: From the Genome to the Internet, Wiley-VCH, Berlin, 2002.
-
(2002)
Epidemics, and Immunization in Scale-Free Networks
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
27
-
-
26844518826
-
Epidemiological models applied to virus in computer networks
-
J. R. C. Piqueira, B.F. Navarro, and L. H. A. Mon-teiro, "Epidemiological models applied to virus in computer networks," Journal of Computer Science, vol. 1, no. 1, pp. 31-40, 2005.
-
(2005)
Journal of Computer Science
, vol.1
, Issue.1
, pp. 31-40
-
-
Piqueira, J.R.C.1
Navarro, B.F.2
Mon-teiro, L.H.A.3
-
28
-
-
34147092603
-
Modeling virus propagation in peer-to-peer networks
-
W. T. Richard and J. C. Mark, "Modeling virus propagation in peer-to-peer networks," IEEE Inter-national Conference on Information, Communica-tions, and Signal Processing, ICICS 2005, pp. 981-985, 2005.
-
(2005)
IEEE Inter-national Conference on Information, Communica-tions, and Signal Processing, ICICS 2005
, pp. 981-985
-
-
Richard, W.T.1
Mark, J.C.2
-
29
-
-
35048846038
-
Computer virus propaga-tion models
-
LNCS 2965, Springer-Verlag
-
G. Serazzi and S. Zanero, "Computer virus propaga-tion models," Tutorials of the 11th IEEE/ACM In-ternational Symposium on Modeling, Analysis, and Simulation of Computer, and Telecommunication Systems, LNCS 2965, pp. 26-50, Springer-Verlag, 2003.
-
(2003)
Tutorials of the 11th IEEE/ACM In-ternational Symposium on Modeling, Analysis, and Simulation of Computer, and Telecommunication Systems
, pp. 26-50
-
-
Serazzi, G.1
Zanero, S.2
-
30
-
-
4544275741
-
Modeling the effects of timing parameters on virus propagation
-
Oct
-
Y. Wang and C.X. Wang, "Modeling the effects of timing parameters on virus propagation," 2003 ACM Workshop on Rapid Malcode, pp. 61-66, Oct. 2003.
-
(2003)
2003 ACM Workshop on Rapid Malcode
, pp. 61-66
-
-
Wang, Y.1
Wang, C.X.2
-
32
-
-
33750137816
-
SEIR epidemic model with de-lay
-
P. Yan and S. Liu, "SEIR epidemic model with de-lay," Journal of Australian Mathematical Society, Se-ries B - Applied Mathematics, vol. 48, no. 1, pp. 119-134, 2006.
-
(2006)
Journal of Australian Mathematical Society, Se-ries B - Applied Mathematics
, vol.48
, Issue.1
, pp. 119-134
-
-
Yan, P.1
Liu, S.2
-
33
-
-
33750137816
-
SEIR epidemic model with de-lay
-
P. Yan and S. Liu, "SEIR epidemic model with de-lay," The ANZIAM Journal, vol. 48, pp. 119-134, 2006.
-
(2006)
The ANZIAM Journal
, vol.48
, pp. 119-134
-
-
Yan, P.1
Liu, S.2
-
34
-
-
14944368398
-
Worm prop-agation modeling, and analysis under dynamic quar-antine defense
-
ACM
-
C. C. Zou, W. Gong, and D. Towsley, "Worm prop-agation modeling, and analysis under dynamic quar-antine defense," Proceedings of the ACM CCS Work-shop on Rapid Malcode, pp. 51-60, ACM, 2003.
-
(2003)
Proceedings of the ACM CCS Work-shop on Rapid Malcode
, pp. 51-60
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
35
-
-
28044469549
-
The monitoring, and early detection of inter-net worms
-
C. C. Zou, W. B. Gong, D. Towsley, and L. X. Gao, "The monitoring, and early detection of inter-net worms," IEEE/ACM Transactions on Network-ing, vol. 13, no. 5, pp. 961-974, 2005.
-
(2005)
IEEE/ACM Transactions on Network-ing
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.C.1
Gong, W.B.2
Towsley, D.3
Gao, L.X.4
-
36
-
-
84858266578
-
-
Symantec Security Response-Definitions
-
Symantec Security Response-Definitions, 2010. (http://www.symantec.com/avcenter/defs.added.html)
-
(2010)
-
-
|