Table of Contents Author Guidelines Submit a Manuscript
Abstract and Applied Analysis
Volume 2013 (2013), Article ID 560804, 18 pages
http://dx.doi.org/10.1155/2013/560804
Research Article

Hopf Bifurcation Analysis for a Computer Virus Model with Two Delays

1Key Laboratory of Advanced Process Control for Light Industry, Jiangnan University, Wuxi 214122, China
2School of Management Science and Engineering, Anhui University of Finance and Economics, Bengbu 233030, China

Received 18 August 2013; Accepted 26 August 2013

Academic Editor: Luca Guerrini

Copyright © 2013 Zizhen Zhang and Huizhong Yang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. O. Kephart and S. R. White, “Directed-graph epidemiological models of computer viruses,” in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 343–359, May 1991. View at Scopus
  2. J. O. Kephart and S. R. White, “Measuring and modeling computer virus prevalence,” in Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pp. 2–15, May 1993. View at Scopus
  3. J. C. Wierman and D. J. Marchette, “Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction,” Computational Statistics & Data Analysis, vol. 45, no. 1, pp. 3–23, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  4. B. K. Mishra and N. Jha, “Fixed period of temporary immunity after run of anti-malicious software on computer nodes,” Applied Mathematics and Computation, vol. 190, no. 2, pp. 1207–1212, 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. J. R. C. Piqueira and V. O. Araujo, “A modified epidemiological model for computer viruses,” Applied Mathematics and Computation, vol. 213, no. 2, pp. 355–360, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  6. X. Han and Q. L. Tan, “Dynamical behavior of computer virus on internet,” Applied Mathematics and Computation, vol. 217, no. 6, pp. 2520–2526, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  7. J. G. Ren, X. F. Yang, L.-X. Yang, Y. Xu, and F. Yang, “A delayed computer virus propagation model and its dynamics,” Chaos, Solitons & Fractals, vol. 45, no. 1, pp. 74–79, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  8. J. G. Ren, X. F. Yang, Q. Zhu, L.-X. Yang, and C. Zhang, “A novel computer virus model and its dynamics,” Nonlinear Analysis. Real World Applications, vol. 13, no. 1, pp. 376–384, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  9. H. Yuan and G. Chen, “Network virus-epidemic model with the point-to-group information propagation,” Applied Mathematics and Computation, vol. 206, no. 1, pp. 357–367, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  10. T. Dong, X. F. Liao, and H. Q. Li, “Stability and Hopf bifurcation in a computer virus model with multistate antivirus,” Abstract and Applied Analysis, vol. 2012, Article ID 841987, 16 pages, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  11. B. K. Mishra and D. K. Saini, “SEIRS epidemic model with delay for transmission of malicious objects in computer network,” Applied Mathematics and Computation, vol. 188, no. 2, pp. 1476–1482, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  12. B. K. Mishra and S. K. Pandey, “Dynamic model of worms with vertical transmission in computer network,” Applied Mathematics and Computation, vol. 217, no. 21, pp. 8438–8446, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  13. F. W. Wang, Y. K. Zhang, C. G. Wang, J. Ma, and S. Moon, “Stability analysis of a SEIQV epidemic model for rapid spreading worms,” Computers and Security, vol. 29, no. 4, pp. 410–418, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. Y. Yao, X.-W. Xie, H. Guo, G. Yu, F.-X. Gao, and X.-J. Tong, “Hopf bifurcation in an Internet worm propagation model with time delay in quarantine,” Mathematical and Computer Modelling, vol. 57, pp. 2635–2646, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. T. L. Zhang, J. L. Liu, and Z. D. Teng, “Stability of Hopf bifurcation of a delayed SIRS epidemic model with stage structure,” Nonlinear Analysis. Real World Applications, vol. 11, no. 1, pp. 293–306, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  16. S. Gakkhar and A. Singh, “Complex dynamics in a prey predator system with multiple delays,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 2, pp. 914–929, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  17. X.-Y. Meng, H.-F. Huo, and H. Xiang, “Hopf bifurcation in a three-species system with delays,” Journal of Applied Mathematics and Computing, vol. 35, no. 1-2, pp. 635–661, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  18. T. K. Kar and A. Ghorai, “Dynamic behaviour of a delayed predator-prey model with harvesting,” Applied Mathematics and Computation, vol. 217, no. 22, pp. 9085–9104, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  19. J.-F. Zhang, “Bifurcation analysis of a modified Holling-Tanner predator-prey model with time delay,” Applied Mathematical Modelling, vol. 36, no. 3, pp. 1219–1231, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  20. S. Guo and W. Jiang, “Global stability and Hopf bifurcation for Gause-type predator-prey system,” Journal of Applied Mathematics, vol. 2012, Article ID 260798, 17 pages, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  21. S. Jana and T. K. Kar, “Modeling and analysis of a prey-predator system with disease in the prey,” Chaos, Solitons & Fractals, vol. 47, pp. 42–53, 2013. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  22. C. J. Xu and X. F. He, “Stability and bifurcation analysis in a class of two-neuron networks with resonant bilinear terms,” Abstract and Applied Analysis, vol. 2011, Article ID 697630, 21 pages, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  23. Y. K. Li and C. Z. Li, “Stability and Hopf bifurcation analysis on a delayed Leslie-Gower predator-prey system incorporating a prey refuge,” Applied Mathematics and Computation, vol. 219, no. 9, pp. 4576–4589, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  24. B. D. Hassard, N. D. Kazarinoff, and Y. H. Wan, Theory and Applications of Hopf Bifurcation, Cambridge University Press, Cambridge, UK, 1981.