메뉴 건너뛰기




Volumn 278-280, Issue , 2013, Pages 2033-2038

Stability analysis of computer virus model system in networks

Author keywords

Computer virus model; Disc theorem; Discrete time systems; Stability

Indexed keywords

DISC THEOREM; DISCRETE TIME SYSTEM; DISEASE EQUILIBRIUM; DISEASE-FREE EQUILIBRIUM; STABILITY ANALYSIS; STABILITY CONDITION; SUFFICIENT CONDITIONS; VIRUS MODEL;

EID: 84873149027     PISSN: 16609336     EISSN: 16627482     Source Type: Book Series    
DOI: 10.4028/www.scientific.net/AMM.278-280.2033     Document Type: Conference Paper
Times cited : (1)

References (15)
  • 1
    • 77955517848 scopus 로고    scopus 로고
    • Fuzzy epidemic model for the transmission of worms in computer network
    • B. K. Mishra, S. K. Pandey, Fuzzy epidemic model for the transmission of worms in computer network, Nonlinear Analysis: Real World Applications, 2010, 11(5): 4335-4341.
    • (2010) Nonlinear Analysis: Real World Applications , vol.11 , Issue.5 , pp. 4335-4341
    • Mishra, B.K.1    Pandey, S.K.2
  • 2
    • 77957993272 scopus 로고    scopus 로고
    • Dynamical behavior of computer virus on Internet
    • X. Han, Q. Tan, Dynamical behavior of computer virus on Internet, Applied Mathematics and Computation, 2010, 217(6): 2520-2526.
    • (2010) Applied Mathematics and Computation , vol.217 , Issue.6 , pp. 2520-2526
    • Han, X.1    Tan, Q.2
  • 3
    • 79951858522 scopus 로고    scopus 로고
    • Compromise through USB-based Hardware Trojan Horse device
    • J. Clark, S. Leblanc, S. Knight, Compromise through USB-based Hardware Trojan Horse device, Future Generation Computer Systems, 2011, 27(5): 555-563.
    • (2011) Future Generation Computer Systems , vol.27 , Issue.5 , pp. 555-563
    • Clark, J.1    Leblanc, S.2    Knight, S.3
  • 5
    • 34250656571 scopus 로고    scopus 로고
    • Fixed period of temporary immunity after run of anti-malicious software on computer nodes
    • B. Mishra, N. Jha, Fixed period of temporary immunity after run of anti-malicious software on computer nodes, Applied Mathematics and Computation, 2007, 190(2): 1207-1212.
    • (2007) Applied Mathematics and Computation , vol.190 , Issue.2 , pp. 1207-1212
    • Mishra, B.1    Jha, N.2
  • 6
    • 67349217836 scopus 로고    scopus 로고
    • Mathematical analysis of a sex-structured HIV/AIDS model with a discrete time delay. Nonlinear Analysis: Theory
    • Z. Mukandavirea, C. Chiyaka, W. Garira, G. Musuka, Mathematical analysis of a sex-structured HIV/AIDS model with a discrete time delay. Nonlinear Analysis: Theory, Methods and Applications, 2009, 71(3-4): 1082-1093.
    • (2009) Methods and Applications , vol.71 , Issue.3-4 , pp. 1082-1093
    • Mukandavirea, Z.1    Chiyaka, C.2    Garira, W.3    Musuka, G.4
  • 7
    • 35348933704 scopus 로고    scopus 로고
    • Optimal and sub-optimal quarantine and isolation control in SARS epidemics
    • X. Yan, Y. Zou, Optimal and sub-optimal quarantine and isolation control in SARS epidemics, Mathematical and Computer Modelling, 2008, 47(1-2): 235-245.
    • (2008) Mathematical and Computer Modelling , vol.47 , Issue.1-2 , pp. 235-245
    • Yan, X.1    Zou, Y.2
  • 8
    • 17044414106 scopus 로고    scopus 로고
    • A Discrete Epidemic Model for SARS Transmission and Control in China
    • Y. Zhou, Z. Ma, A Discrete Epidemic Model for SARS Transmission and Control in China, Mathematical and Computer Modelling, 2004, 40(13): 1491-1506.
    • (2004) Mathematical and Computer Modelling , vol.40 , Issue.13 , pp. 1491-1506
    • Zhou, Y.1    Ma, Z.2
  • 9
    • 37349003324 scopus 로고    scopus 로고
    • A mathematical analysis of the effects of control strategieson the transmission dynamics of malaria
    • C. Chiyaka, J.M. Tchuenche, W. Garira, S. Dube, A mathematical analysis of the effects of control strategieson the transmission dynamics of malaria, Applied Mathematics and Computation, 2008, 195, (2): 641-662.
    • (2008) Applied Mathematics and Computation , vol.195 , Issue.2 , pp. 641-662
    • Chiyaka, C.1    Tchuenche, J.M.2    Garira, W.3    Dube, S.4
  • 11
    • 0442280819 scopus 로고    scopus 로고
    • Modeling computer virus prevalence with a susceptibleinfected - susceptible model with reintroduction
    • J. C. Wierman, D. J. Marchette, Modeling computer virus prevalence with a susceptibleinfected - susceptible model with reintroduction, Computational Statistics & Data Analysis, 2004, 45(1): 3-23.
    • (2004) Computational Statistics & Data Analysis , vol.45 , Issue.1 , pp. 3-23
    • Wierman, J.C.1    Marchette, D.J.2
  • 12
    • 55949131751 scopus 로고    scopus 로고
    • Network virus-epidemic model with the point-to-group information propagation
    • H. Yuan, G. Chen, Network virus-epidemic model with the point-to-group information propagation, Applied Mathematics and Computation, 2008, 206(1): 357-367.
    • (2008) Applied Mathematics and Computation , vol.206 , Issue.1 , pp. 357-367
    • Yuan, H.1    Chen, G.2
  • 13
    • 34248175732 scopus 로고    scopus 로고
    • SEIRS epidemic model with delay for transmission of malicious objects in computer network
    • B. K. Mishra, D. K. Saini, SEIRS epidemic model with delay for transmission of malicious objects in computer network. Applied Mathematics and Computation, 2007, 188(2): 1476-1482.
    • (2007) Applied Mathematics and Computation , vol.188 , Issue.2 , pp. 1476-1482
    • Mishra, B.K.1    Saini, D.K.2
  • 14
    • 70349479276 scopus 로고    scopus 로고
    • Towards controlling virus propagation in information systems with point-to-group information sharing
    • H. Yuan, G. Chen, J. Wu, H. Xiong, Towards controlling virus propagation in information systems with point-to-group information sharing, Decision Support Systems, 2009, 48(1): 57-68.
    • (2009) Decision Support Systems , vol.48 , Issue.1 , pp. 57-68
    • Yuan, H.1    Chen, G.2    Wu, J.3    Xiong, H.4
  • 15
    • 10644288443 scopus 로고    scopus 로고
    • Global stability of an epidemic model with nonlinear incidence rate and differential infectivity
    • La-di Wang, Jian-quan Li, Global stability of an epidemic model with nonlinear incidence rate and differential infectivity, Applied Mathematics and Computation, 2005, 161(3): 769-778.
    • (2005) Applied Mathematics and Computation , vol.161 , Issue.3 , pp. 769-778
    • Wang, L.-D.1    Li, J.-Q.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.