-
2
-
-
1842587928
-
The impact of countermeasure propagation on the prevalence of computer viruses
-
Chen LC, Carley KM. The impact of countermeasure propagation on the prevalence of computer viruses. IEEE Trans. Syst. Man Cy. B 2004; 34: 823-833. doi: 10.1109/TSMCB.2003.817098
-
(2004)
IEEE Trans. Syst. Man Cy. B
, vol.34
, pp. 823-833
-
-
Chen, L.C.1
Carley, K.M.2
-
3
-
-
84869142129
-
Distributive immunization of networks against viruses using the'honey-pot' architecture
-
Goldenberg J, Shavitt Y, Shir E, Solomon S. Distributive immunization of networks against viruses using the'honey-pot' architecture. Nature Phys. 2005; 1: 184-188. doi: 10.1038/nphys177
-
(2005)
Nature Phys.
, vol.1
, pp. 184-188
-
-
Goldenberg, J.1
Shavitt, Y.2
Shir, E.3
Solomon, S.4
-
4
-
-
80051651728
-
Modeling the dynamical interaction between epidemics on overlay networks
-
Marceau V, Noel P, Hebert-Dufresne L, Allard A, Dube LJ. Modeling the dynamical interaction between epidemics on overlay networks. Phys. Rev. E 2011; 84: Article ID 026105. doi: 10.1103/PhysRevE.84.026105
-
(2011)
Phys. Rev. E
, vol.84
-
-
Marceau, V.1
Noel, P.2
Hebert-Dufresne, L.3
Allard, A.4
Dube, L.J.5
-
6
-
-
55949131751
-
Network virus-epidemic model with the point-to-group information
-
Yuan H, Chen G. Network virus-epidemic model with the point-to-group information. Appl. Math. Comput. 2008; 206: 357-367. doi: 10.1016/j.amc.2008.09.025
-
(2008)
Appl. Math. Comput.
, vol.206
, pp. 357-367
-
-
Yuan, H.1
Chen, G.2
-
8
-
-
67349190516
-
A modified epidemiological model for computer viruses
-
Piqueira JRC, Araujo VO. A modified epidemiological model for computer viruses. Appl. Math. Comput. 2009; 213: 355-360. doi: 10.1016/j.amc.2009.03.023
-
(2009)
Appl. Math. Comput.
, vol.213
, pp. 355-360
-
-
Piqueira, J.R.C.1
Araujo, V.O.2
-
9
-
-
79956061729
-
Dynamic model of worms with vertical transmission in computer network
-
Mishra BK, Pandey SK. Dynamic model of worms with vertical transmission in computer network. Appl. Math. Comput. 2011; 217: 8438-8446. doi: 10.1016/j.amc.2011.03.041
-
(2011)
Appl. Math. Comput.
, vol.217
, pp. 8438-8446
-
-
Mishra, B.K.1
Pandey, S.K.2
-
10
-
-
84857030292
-
Stability analysis of VEISV propagation modeling for network worm attack
-
Toutonji OA, Yoo SM, Park M. Stability analysis of VEISV propagation modeling for network worm attack. Appl. Math. Model. 2012; 36: 2751-2761. doi: 10.1016/j.apm.2011.09.058
-
(2012)
Appl. Math. Model.
, vol.36
, pp. 2751-2761
-
-
Toutonji, O.A.1
Yoo, S.M.2
Park, M.3
-
11
-
-
84866383289
-
A computer virus model with graded cure rates
-
Yang LX, Yang X, Zhu Q, Wen L. A computer virus model with graded cure rates. Nonlinear Anal. RWA 2013; 14: 414-422. doi: 10.1016/j.nonrwa.2012.07.005
-
(2013)
Nonlinear Anal. RWA
, vol.14
, pp. 414-422
-
-
Yang, L.X.1
Yang, X.2
Zhu, Q.3
Wen, L.4
-
12
-
-
84911006265
-
Propagation of computer virus under the influences of infected external computers and removable storage media: Modeling and analysis
-
Gan C, Yang X, Zhu Q. Propagation of computer virus under the influences of infected external computers and removable storage media: Modeling and analysis. Nonlinear Dyn. 2014; 78: 1349-1356. doi: 10.1007/s11071-014-1521-z
-
(2014)
Nonlinear Dyn.
, vol.78
, pp. 1349-1356
-
-
Gan, C.1
Yang, X.2
Zhu, Q.3
-
13
-
-
84861987353
-
Hopf bifurcation analysis of a delayed viral infection model in computer networks
-
Feng L, Liao X, Li H, Han Q. Hopf bifurcation analysis of a delayed viral infection model in computer networks. Math. Comput. Model. 2012; 56: 167-179. doi: 10.1016/j.mcm.2011.12.010
-
(2012)
Math. Comput. Model.
, vol.56
, pp. 167-179
-
-
Feng, L.1
Liao, X.2
Li, H.3
Han, Q.4
-
14
-
-
84861073500
-
Stability and Hopf bifurcation in a computer virus model with multistate antivirus
-
Dong T, Liao X, Li H. Stability and Hopf bifurcation in a computer virus model with multistate antivirus. Abstr. Appl. Anal. 2012; 2012: Article ID 841987. doi: 10.1155/2012/841987
-
(2012)
Abstr. Appl. Anal.
, vol.2012
-
-
Dong, T.1
Liao, X.2
Li, H.3
-
15
-
-
80052789013
-
A novel computer virus model and its dynamics
-
Ren J, Yang X, Zhu Q, Yang LX, Zhang C. A novel computer virus model and its dynamics. Nonliear Anal. RWA 2012; 13: 376-384. doi: 10.1016/j.nonrwa.2011.07.048
-
(2012)
Nonliear Anal. RWA
, vol.13
, pp. 376-384
-
-
Ren, J.1
Yang, X.2
Zhu, Q.3
Yang, L.X.4
Zhang, C.5
-
16
-
-
84890094651
-
Hopf bifurcation in an Internet worm propagation model with time delay in quarantine
-
Yao Y, Xie X, Guo H, Yu G, Gao F, Tong X. Hopf bifurcation in an Internet worm propagation model with time delay in quarantine. Math. Comput. Model. 2013; 57: 2635-2646. doi: 10.1016/j.mcm.2011.06.044
-
(2013)
Math. Comput. Model.
, vol.57
, pp. 2635-2646
-
-
Yao, Y.1
Xie, X.2
Guo, H.3
Yu, G.4
Gao, F.5
Tong, X.6
-
17
-
-
84866346316
-
Pulse quarantine strategy of internet worm propagation Modeling and analysis
-
Yao Y, Guo L, Guo H, Yu G, Gao F, Tong X. Pulse quarantine strategy of internet worm propagation Modeling and analysis. Comput. Electr. Eng. 2012; 38: 1047-1061. doi: 10.1016/j.compeleceng.2011.07.009
-
(2012)
Comput. Electr. Eng.
, vol.38
, pp. 1047-1061
-
-
Yao, Y.1
Guo, L.2
Guo, H.3
Yu, G.4
Gao, F.5
Tong, X.6
-
18
-
-
84864951946
-
An impulse model for computer viruses
-
Zhang C, Zhao Y, Wu Y. An impulse model for computer viruses. Discrete Dyn. Nat. Soc. 2012; 2012: Article ID 260962. doi: 10.1155/2012/260962
-
(2012)
Discrete Dyn. Nat. Soc.
, vol.2012
-
-
Zhang, C.1
Zhao, Y.2
Wu, Y.3
-
19
-
-
84901045200
-
Analysis of a delayed Internet worm propagation model with impulsive quarantine Strategy
-
Yao Y, Feng X, Yang W, Xiang W, Gao F. Analysis of a delayed Internet worm propagation model with impulsive quarantine Strategy. Math Probl. Eng. 2014; 2014: Article ID 369360. doi: 10.1155/2014/369360
-
(2014)
Math Probl. Eng.
, vol.2014
-
-
Yao, Y.1
Feng, X.2
Yang, W.3
Xiang, W.4
Gao, F.5
-
20
-
-
84899622420
-
The pulse treatment of computer viruses: A modeling study
-
Yang LX, Yang X. The pulse treatment of computer viruses: a modeling study. Nonlinear Dyn. 2014; 76: 1379-1393. doi: 10.1007/s11071-013-1216-x
-
(2014)
Nonlinear Dyn.
, vol.76
, pp. 1379-1393
-
-
Yang, L.X.1
Yang, X.2
-
21
-
-
84880919302
-
A mixing propagation model of computer viruses and countermeasures
-
Zhu Q, Yang X, Yang LX, Zhang X. A mixing propagation model of computer viruses and countermeasures. Nonlinear Dyn. 2013; 73: 1433-1441. doi: 10.1007/s11071-013-0874-z
-
(2013)
Nonlinear Dyn.
, vol.73
, pp. 1433-1441
-
-
Zhu, Q.1
Yang, X.2
Yang, L.X.3
Zhang, X.4
-
24
-
-
84881166951
-
Asymptotically autonomous differential equations in the plane
-
Thieme HR. Asymptotically autonomous differential equations in the plane. Rocky Mountain J. Math. 1993; 24: 351-380. doi: 10.1216/rmjm/1181072470
-
(1993)
Rocky Mountain J. Math.
, vol.24
, pp. 351-380
-
-
Thieme, H.R.1
-
25
-
-
0035363452
-
Epidemic dynamics and endemic states in complex networks
-
Pastor-Satorras R, Vespignani A. Epidemic dynamics and endemic states in complex networks. Phys. Rev. E 2001; 63: Article ID 066117. doi: 10.1103/PhysRevE.63.066117
-
(2001)
Phys. Rev. E
, vol.63
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
26
-
-
84876152319
-
Epidemics of computer viruses: A complex-network approach
-
Yang LX, Yang X, Liu J, Zhu Q, Gan C. Epidemics of computer viruses: A complex-network approach. Appl. Math. Comput. 2013; 219: 8705-8717. doi: 10.1016/j.amc.2013.02.031
-
(2013)
Appl. Math. Comput.
, vol.219
, pp. 8705-8717
-
-
Yang, L.X.1
Yang, X.2
Liu, J.3
Zhu, Q.4
Gan, C.5
-
28
-
-
79958294924
-
An individual-based approach to SIR epidemics in contact networks
-
Youssef M, Scoglio C. An individual-based approach to SIR epidemics in contact networks. J. Theo. Biol. 2011; 283: 136-144. doi: 10.1016/j.jtbi.2011.05.029
-
(2011)
J. Theo. Biol.
, vol.283
, pp. 136-144
-
-
Youssef, M.1
Scoglio, C.2
-
29
-
-
84909943520
-
Optimal vaccination and treatment of an epidemic network model
-
Chen L, Sun J. Optimal vaccination and treatment of an epidemic network model. Phys. Lett. A 2014; 378: 3028-3036. doi: 10.1016/j.physleta.2014.09.002
-
(2014)
Phys. Lett. A
, vol.378
, pp. 3028-3036
-
-
Chen, L.1
Sun, J.2
-
30
-
-
84923197121
-
A sword with two edges: Propagation studies on both positive and negative information in online social networks
-
Wen S, Haghighi MS, Chen C, Xiang Y, Zhou W, Jia W. A sword with two edges: Propagation studies on both positive and negative information in online social networks. IEEE Trans. Comput. 2015; 64: 640-653. doi: 10.1109/TC.2013.2295802
-
(2015)
IEEE Trans. Comput.
, vol.64
, pp. 640-653
-
-
Wen, S.1
Haghighi, M.S.2
Chen, C.3
Xiang, Y.4
Zhou, W.5
Jia, W.6
-
31
-
-
84910602883
-
To shut them up or to clarify: Restraining the spread of rumors in online social networks
-
Wen S, Jiang J, Xiang Y, Yu S, Zhou W, Jia W. To shut them up or to clarify: Restraining the spread of rumors in online social networks. IEEE Trans. Parallel Distrib. System. 2014; 25: 3306-3316. doi: 10.1109/TPDS.2013.2297115
-
(2014)
IEEE Trans. Parallel Distrib. System
, vol.25
, pp. 3306-3316
-
-
Wen, S.1
Jiang, J.2
Xiang, Y.3
Yu, S.4
Zhou, W.5
Jia, W.6
-
32
-
-
84907892313
-
Are the popular users always important for the information dissemination in online social networks?
-
Wen S, Jiang J, Xiang Y, Yu S, Zhou W. Are the popular users always important for the information dissemination in online social networks? IEEE Network. 2014; 28: 64-67. doi: 10.1109/MNET.2014.6915441
-
(2014)
IEEE Network
, vol.28
, pp. 64-67
-
-
Wen, S.1
Jiang, J.2
Xiang, Y.3
Yu, S.4
Zhou, W.5
|