- About this Journal
- Abstracting and Indexing
- Aims and Scope
- Annual Issues
- Article Processing Charges
- Articles in Press
- Author Guidelines
- Bibliographic Information
- Citations to this Journal
- Contact Information
- Editorial Board
- Editorial Workflow
- Free eTOC Alerts
- Publication Ethics
- Reviewers Acknowledgment
- Submit a Manuscript
- Subscription Information
- Table of Contents
Abstract and Applied Analysis
Volume 2013 (2013), Article ID 296940, 6 pages
Influence of Removable Devices' Heterouse on the Propagation of Malware
1Department of Computer Science and Technology, North University of China, Taiyuan 030051, China
2Department of Mathematics, North University of China, Taiyuan 030051, China
3Department of Computer Science and Technology, Xinzhou Teachers University, Xinzhou 034000, China
Received 5 September 2013; Accepted 30 September 2013
Academic Editor: Carlo Bianca
Copyright © 2013 Xie Han et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
- C. C. Zou, D. Towsley, and W. Gong, “Modeling and simulation study of the propagation and defense of internet e-mail worms,” IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 2, pp. 106–118, 2007.
- Y. Li, J. X. Pan, and Z. Jin, “Dynamic modeling and analysis of the email virus propagation,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 472072, 22 pages, 2012.
- B. K. Mishra and S. K. Pandey, “Effect of anti-virus software on infectious nodes in computer network: a mathematical model,” Physics Letters A, vol. 376, no. 35, pp. 2389–2393, 2012.
- L. P. Song, Z. Jin, and G. Q. Sun, “Modeling and analyzing of botnet interactions,” Physica A, vol. 390, no. 2, pp. 347–358, 2010.
- L. Yang, X. Yang, J. Liu, Q. Zhu, and C. Gan, “Epidemics of computer viruses: a complex-network approach,” Applied Mathematics and Computation, vol. 219, no. 16, pp. 8705–8717, 2013.
- Symantec Security Response, http://www.symantec.com/connect/blogs/w32stuxnet-dossier.
- Kaspersky Security Bulletin, “Monthly Malware Statistics,” February 2012, http://www.securelist.com/en/analysis/204792223.
- Flame (malware), http://en.wikipedia.org/wiki/Flame_(malware).
- L. P. Song, Z. Jin, G. Q. Sun, J. Zhang, and X. Han, “Influence of removable devices on computer worms: dynamic analysis and control strategies,” Computers & Mathematics with Applications, vol. 61, no. 7, pp. 1823–1829, 2011.
- C. Jin and X. Y. Wang, “Analysis and control stratagems of flash disk virus dynamic propagation model,” Security and Communication Networks, vol. 5, no. 2, pp. 226–235, 2012.
- L. X. Yang and X. Yang, “The spread of computer viruses under the influence of removable storage devices,” Applied Mathematics and Computation, vol. 219, no. 8, pp. 3914–3922, 2012.
- Q. Zhu, X. Yang, and J. Ren, “Modeling and analysis of the spread of computer virus,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 12, pp. 5117–5124, 2012.
- Z. Z. Peng, L. P. Song, G. H. Li, and Y. H. Li, “Modeling and analyzing the spread of Flash Disk worms via multiple subnets,” International Journal of Computer Mathemati. In press.
- J. D. Murray, Mathematical Biology, Springer, Berlin, Germany, 2003.
- R. M. Anderson, R. M. May, and B. Anderson, Infectious Diseases in Humans: Dynamics and Control, Oxford University Press, New York, NY, USA, 1991.
- E. A. Barbashin, Introduction to the Theory of Stability, Wolters-Noordhoff, Groningen, Netherlands, 1970.
- J. P. LaSalle and S. Lefschetz, Stability by Liapunov's Direct Method, with Applications, Academic Press, New York, NY, USA, 1961.
- D. T. Gillespie, “Exact stochastic simulation of coupled chemical reactions,” Journal of Physical Chemistry, vol. 81, no. 25, pp. 2340–2361, 1977.
- D. Arnaud, F. Nando de, and G. Neil, Eds., Sequential Monte Carlo Methods in Practice, Springer, New York, NY, USA, 2001.