About this Journal Submit a Manuscript Table of Contents
Discrete Dynamics in Nature and Society
Volume 2012 (2012), Article ID 106950, 8 pages
http://dx.doi.org/10.1155/2012/106950
Research Article

Propagation of Computer Virus under Human Intervention: A Dynamical Model

1College of Computer Science, Chongqing University, Chongqing 400044, China
2School of Electronic and Information Engineering, Southwest University, Chongqing 400715, China

Received 13 May 2012; Accepted 7 June 2012

Academic Editor: Yanbing Liu

Copyright © 2012 Chenquan Gan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. F. Cohen, “Computer virus: theory and experiments,” Computers & Security, vol. 6, pp. 22–35, 1987.
  2. F. Cohen, A Short Course on Computer Viruses, John Wiley & Sons, New York, NY, USA, 2nd edition, 1994.
  3. P. J. Denning, Computers Under Attack, Addison-Wesley, Reading, Mass, USA, 1990.
  4. J. R. C. Piqueira and V. O. Araujo, “A modified epidemiological model for computer viruses,” Applied Mathematics and Computation, vol. 213, no. 2, pp. 355–360, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  5. P. S. Tippett, “The kinetics of computer viruses replication: a theory and preliminary survey, in: safe computing,” in Proceedings of the 4th Annual Computer Virus and Security Conference, pp. 66–87, New York, NY, USA, March 1991.
  6. B. K. Mishra and S. K. Pandey, “Dynamic model of worms with vertical transmission in computer network,” Applied Mathematics and Computation, vol. 217, no. 21, pp. 8438–8446, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  7. H. Yuan and G. Q. Chen, “Network virus-epidemic model with the point-to-group information propagation,” Applied Mathematics and Computation, vol. 206, no. 1, pp. 357–367, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  8. B. K. Mishra and D. K. Saini, “SEIRS epidemic model with delay for transmission of malicious objects in computer network,” Applied Mathematics and Computation, vol. 188, no. 2, pp. 1476–1482, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  9. X. Han and Q. L. Tan, “Dynamical behavior of computer virus on internet,” Applied Mathematics and Computation, vol. 217, no. 6, pp. 2520–2526, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  10. A. Lahrouz, L. Omari, D. Kiouach, and A. Belmaâti, “Complete global stability for an SIRS epidemic model with generalized non-linear incidence and vaccination,” Applied Mathematics and Computation, vol. 218, pp. 6519–6525, 2012.
  11. B. K. Mishra and N. Jha, “Fixed period of temporary immunity after run of anti-malicious software on computer nodes,” Applied Mathematics and Computation, vol. 190, no. 2, pp. 1207–1212, 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. B. K. Mishra and S. K. Pandey, “Fuzzy epidemic model for the transmission of worms in computer network,” Nonlinear Analysis: Real World Applications, vol. 11, no. 5, pp. 4335–4341, 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Ren, X. Yang, L. X. Yang, Y. Xu, and F. Yang, “A delayed computer virus propagation model and its dynamics,” Chaos, Solitons & Fractals, vol. 45, no. 1, pp. 74–79, 2012. View at Publisher · View at Google Scholar
  14. J. Ren, X. Yang, Q. Zhu, L. X. Yang, and C. Zhang, “A novel computer virus model and its dynamics,” Nonlinear Analysis: Real World Applications, vol. 13, no. 1, pp. 376–384, 2012. View at Publisher · View at Google Scholar
  15. C. Vargas-De-León, “On the global stability of SIS, SIR and SIRS epidemic models with standard incidence,” Chaos, Solitons & Fractals, vol. 44, pp. 1106–1110, 2011.
  16. F. W. Wang, Y. K. Zhang, C. G. Wang, J. F. Ma, and S. J. Moon, “Stability analysis of a SEIQV epidemic model for rapid spreading worms,” Computers & Security, vol. 29, no. 4, pp. 410–418, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. B. K. Mishra and N. Jha, “SEIQRS model for the transmission of malicious objects in computer network,” Applied Mathematical Modelling, vol. 34, no. 3, pp. 710–715, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH