Modeling and analysis of the spread of computer virus

From MaRDI portal
Revision as of 17:02, 1 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1948249

DOI10.1016/j.cnsns.2012.05.030zbMath1261.93012OpenAlexW1966023556MaRDI QIDQ1948249

Qingyi Zhu, Xiaofan Yang, Jianguo Ren

Publication date: 2 May 2013

Published in: Communications in Nonlinear Science and Numerical Simulation (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.cnsns.2012.05.030



Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).


Related Items (41)

A spectral collocation method for computer virus spread case of delayed optimal control problemOptimal control strategy for a novel computer virus propagation model on scale-free networksGlobal exponential stability of nonresident computer virus modelsGlobal dynamics and optimal control of a viral infection model with generic nonlinear infection rateDynamics and control of worm epidemic based on mobile networks by SEIQR-type model with saturated incidence rateGlobal stability of nonresident computer virus modelsThe effect of infected external computers on the spread of viruses: a compartment modeling studyHopf bifurcation in an SEIDQV worm propagation model with quarantine strategyEffects of resource limitations and cost influences on computer virus epidemic dynamics and tipping pointsAdaptive human behavior in a two-worm interaction modelModeling and analysis of peer-to-peer botnetsEnhanced mechanical properties of ZnO nanowire-reinforced nanocomposites: a size-scale effectModeling malware propagation using a carrier compartmentA mixing propagation model of computer viruses and countermeasuresAnalysis of a delayed Internet worm propagation model with impulsive quarantine strategyModeling and bifurcation research of a worm propagation dynamical system with time delayStability and bifurcation of a computer virus propagation model with delay and incomplete antivirus abilityFractional dynamics of computer virus propagationModeling peer-to-peer botnet on scale-free networkSolving a modified nonlinear epidemiological model of computer viruses by homotopy analysis methodStability analysis of a virulent code in a network of computersCapturing the interplay between malware and anti-malware in a computer networkThe pulse treatment of computer viruses: a modeling studyThe combined impact of external computers and network topology on the spread of computer virusesInfluence of removable devices' heterouse on the propagation of malwareThe influence of user protection behaviors on the control of Internet worm propagationAnalysis of computer virus propagation behaviors over complex networks: a case study of Oregon routing networkStability analysis of a computer virus model in latent periodStability analysis and control strategies for worm attack in mobile networks via a VEIQS propagation modelNumerical solution of a modified epidemiological model for computer virusesMathematical analysis of the effectiveness of control strategies to prevent the autorun virus transmission propagationA compartmental model to explore the interplay between virus epidemics and honeynet potencyA new epidemic model of computer virusesPropagation of computer virus both across the Internet and external computers: a complex-network approachOptimal control of a delay-varying computer virus propagation modelModeling COVID-19 pandemic with hierarchical quarantine and time delaySufficient conditions for the existence of positive periodic solutions of a generalized nonresident computer virus modelA novel technique to solve the modified epidemiological model of computer virusesA dynamic model of viruses with the effect of removable media on a computer network with heterogeneous immunityThe impact of neighboring infection on the computer virus spread in packets on scale-free networksGlobal stability of VEISV propagation modeling for network worm attack



Cites Work


This page was built for publication: Modeling and analysis of the spread of computer virus