Stability analysis of an SEIQV epidemic model with saturated incidence rate

X Liu, L Yang - Nonlinear analysis: real world applications, 2012 - Elsevier
In this article, an SEIQV epidemic model with saturated incidence rate is considered. The
basic reproduction number R0 is found. If R0≤ 1, the disease-free equilibrium is globally …

Security countermeasures of a SCIRAS model for advanced malware propagation

JDH Guillen, AM Del Rey, R Casado-Vara - IEEE Access, 2019 - ieeexplore.ieee.org
In the new and sophisticated cyber attacks (mainly, advanced persistent threats) the
advanced specimens of malware such that zero-day malware play a crucial role. Due to its …

[PDF][PDF] A survey on various security threats and classification of malware attacks, vulnerabilities and detection techniques

S Divya - International Journal of Computer Science & …, 2013 - online.lincoln.edu.my
The rapid growth of Wireless Network has raised a great concern for security threats.
Currently, security is regarded as one of the critical parameter for the acceptance of any …

Stability analysis of an e-SEIAR model with point-to-group worm propagation

F Wang, Y Zhang, C Wang, J Ma - Communications in Nonlinear Science …, 2015 - Elsevier
Internet worms have drawn significant attention due to their enormous threats to the Internet.
The main goal of this paper is to explore the interaction dynamics between a malicious worm …

A Baseline Investigation into the Evolution and Prevalence of Mirai and Hajime Utilizing a Network Telescope

SP Anh, Y Nakamura - IEEE Access, 2024 - ieeexplore.ieee.org
In recent years, with the advancement of information technology and digital transformation,
the number of IoT devices has been rapidly increasing. Despite efforts to raise awareness …

[PDF][PDF] Malware risk analysis on the campus network with Bayesian belief network

A Mohammed, HA Jamil, SM Nor… - International Journal of …, 2013 - academia.edu
ABSTRACT A security network management system is for providing clear guidelines on risk
evaluation and assessment for enterprise networks. The threat and risk assessment is …

[引用][C] 基于隔离和免疫的蠕虫传播模型及稳定性分析

任军, 贾克 - 河北工业科技, 2015

[引用][C] Stability analysis of the interaction between malicious and benign worms

F Wang, Y Yang, Y Zhang, J Ma - Future Comput. Inf. Technol, 2014

[引用][C] Analysis of an internet worm propagation model with graded infection rates

F Wang, Y Zhang, H Guo, J Ma - Future Computer and Information …, 2014 - WIT Press