A propagation model of computer virus with nonlinear vaccination probability

C Gan, X Yang, W Liu, Q Zhu - Communications in nonlinear science and …, 2014 - Elsevier
This paper is intended to examine the effect of vaccination on the spread of computer
viruses. For that purpose, a novel computer virus propagation model, which incorporates a …

Security countermeasures of a SCIRAS model for advanced malware propagation

JDH Guillen, AM Del Rey, R Casado-Vara - IEEE Access, 2019 - ieeexplore.ieee.org
In the new and sophisticated cyber attacks (mainly, advanced persistent threats) the
advanced specimens of malware such that zero-day malware play a crucial role. Due to its …

An epidemic model of computer worms with time delay and variable infection rate

Y Yao, Q Fu, W Yang, Y Wang… - Security and …, 2018 - Wiley Online Library
With rapid development of Internet, network security issues become increasingly serious.
Temporary patches have been put on the infectious hosts, which may lose efficacy on …

On the optimal dynamic control strategy of disruptive computer virus

J Bi, X Yang, Y Wu, Q Xiong, J Wen… - Discrete Dynamics in …, 2017 - Wiley Online Library
Disruptive computer viruses have inflicted huge economic losses. This paper addresses the
development of a cost‐effective dynamic control strategy of disruptive viruses. First, the …

Analysis of a delayed Internet worm propagation model with impulsive quarantine strategy

Y Yao, X Feng, W Yang, W Xiang… - … Problems in Engineering, 2014 - Wiley Online Library
Internet worms exploiting zero‐day vulnerabilities have drawn significant attention owing to
their enormous threats to Internet in the real world. To begin with, a worm propagation model …

Dynamics of a delayed worm propagation model with quarantine

Z Zhang, L Song - Advances in Difference Equations, 2017 - Springer
Abstract A delayed SEIQRS-V model with quarantine describing the dynamics of worm
propagation is considered in the present paper. Local stability of the endemic equilibrium is …

Hopf bifurcation analysis for an epidemic model over the Internet with two delays

T Zhao, D Bi - Advances in Difference Equations, 2018 - Springer
Taking the delay due to the latent period of computer viruses and the delay due to the period
that the anti-virus software uses to clean the computer viruses as the bifurcation parameters …

[PDF][PDF] 基于度相关性的病毒传播模型及其分析

徐久强, 王进法, 张君, 赵海 - 中国科学: 信息科学, 2014 - researchgate.net
摘要近年来网络病毒传播已对网络安全构成严重威胁. 研究表明, 互联网宏观拓扑结构与病毒
传播有很大关系. 度相关性是互联网宏观拓扑的一个重要特征, 度相关性的改变意味着互联网 …

Influences of removable devices on the anti-threat model: dynamic analysis and control strategies

J Ma, Z Chen, W Wu, R Zheng, J Liu - Information, 2015 - mdpi.com
With the rapid development of M2M wireless network, damages caused by malicious worms
are getting more and more serious. The main goal of this paper is to explore the influences …

Modeling the propagation of mobile phone virus under complex network

W Yang, X Wei, H Guo, G An, L Guo… - The Scientific World …, 2014 - Wiley Online Library
Mobile phone virus is a rogue program written to propagate from one phone to another,
which can take control of a mobile device by exploiting its vulnerabilities. In this paper the …