| Publication | Date of Publication | Type |
|---|
Distributed denial of service attack on targeted resources in a computer network for critical infrastructure: a differential e-epidemic model Physica A | 2022-01-17 | Paper |
A mathematical model for a distributed attack on targeted resources in a computer network Communications in Nonlinear Science and Numerical Simulation | 2020-02-27 | Paper |
Dynamic model of worm propagation in computer network Applied Mathematical Modelling | 2018-12-07 | Paper |
Impact of reduced scale free network on wireless sensor network Physica A | 2018-11-13 | Paper |
Mathematical model on attack by malicious objects leading to cyber war | 2018-09-06 | Paper |
scientific article; zbMATH DE number 6933124 (Why is no real title available?) | 2018-09-06 | Paper |
Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network Chaos, Solitons and Fractals | 2017-02-01 | Paper |
Mathematical model on malicious attacks in a mobile wireless network with clustering Chaos, Solitons and Fractals | 2017-01-11 | Paper |
scientific article; zbMATH DE number 6402916 (Why is no real title available?) | 2015-02-12 | Paper |
A mathematical model on acquired immunodeficiency syndrome Journal of the Egyptian Mathematical Society | 2014-11-03 | Paper |
Stability analysis of a predator-prey model in wireless sensor network International Journal of Computer Mathematics | 2014-10-14 | Paper |
Differential infectivity \(e\)-epidemic model in computer network Far East Journal of Applied Mathematics | 2014-10-10 | Paper |
Mathematical model on pulmonary and multidrug-resistant tuberculosis patients with vaccination Journal of the Egyptian Mathematical Society | 2014-10-08 | Paper |
Spread of malicious objects in computer network: a fuzzy approach Applications and Applied Mathematics | 2014-01-14 | Paper |
Mathematical model on the transmission of worms in wireless sensor network Applied Mathematical Modelling | 2013-08-15 | Paper |
Two quarantine models on the attack of malicious objects in computer network Mathematical Problems in Engineering | 2013-06-11 | Paper |
Mathematical modeling on concentration levels of pollutants dumped into the river Acta Ciencia Indica. Mathematics | 2012-07-30 | Paper |
Dynamic model of worms with vertical transmission in computer network Applied Mathematics and Computation | 2011-06-24 | Paper |
Global stability of worms in computer network | 2011-02-21 | Paper |
Fuzzy epidemic model for the transmission of worms in computer network Nonlinear Analysis. Real World Applications | 2010-10-14 | Paper |
SEIQRS model for the transmission of malicious objects in computer network Applied Mathematical Modelling | 2010-05-02 | Paper |
Alternating group explicit iterative method for nonlinear singular Fredholm Integro-differential boundary value problems International Journal of Computer Mathematics | 2009-09-18 | Paper |
Effect of various parameters of RBC on oxygen concentration in tissues | 2009-02-10 | Paper |
Magnetic effect on blood flow through a tapered artery with stenoses | 2008-06-11 | Paper |
Bingham plastic fluid model of blood flow through an arterial stenosis | 2008-06-11 | Paper |
A mathematical model for the analysis of blood flow in arterial stenosis | 2008-01-21 | Paper |
Fixed period of temporary immunity after run of anti-malicious software on computer nodes Applied Mathematics and Computation | 2007-09-19 | Paper |
SEIRS epidemic model with delay for transmission of malicious objects in computer network Applied Mathematics and Computation | 2007-07-10 | Paper |
Mathematical models on computer viruses Applied Mathematics and Computation | 2007-06-12 | Paper |
scientific article; zbMATH DE number 1791727 (Why is no real title available?) | 2002-08-28 | Paper |
Some vedic values of Trigrha-maurvī The Mathematics Education | 2001-06-20 | Paper |