Table of Contents Author Guidelines Submit a Manuscript
Discrete Dynamics in Nature and Society
Volume 2014 (2014), Article ID 971497, 7 pages
http://dx.doi.org/10.1155/2014/971497
Research Article

An Immunization Strategy Based on Propagation Mechanism

1School of Computer Science and Engineering, University of Electronic Science and Technology of China, No. 2006 Xiyuan Avenue, West Hi-Tech Zone, Chengdu, Sichuan 611731, China
2School of Computer Science and Engineering, Xinjiang University of Finance and Economics, No. 449 Central Beijing Road, Urumqi, Xinjiang 830012, China

Received 9 June 2014; Accepted 19 August 2014; Published 1 September 2014

Academic Editor: Zbigniew Leśniak

Copyright © 2014 Yixin Zhu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Müller, B. Schönfisch, and M. Kirkilionis, “Ring vaccination,” Journal of Mathematical Biology, vol. 41, no. 2, pp. 143–171, 2000. View at Publisher · View at Google Scholar · View at MathSciNet
  2. R. Pastor-Satorras and A. Vespignani, “Immunization of complex networks,” Physical Review E, vol. 65, no. 3, Article ID 036104, 2002. View at Publisher · View at Google Scholar · View at Scopus
  3. R. Cohen, S. Havlin, and D. Ben-Avraham, “Efficient immunization strategies for computer networks and populations,” Physical Review Letters, vol. 91, no. 24, Article ID 247901, 2003. View at Google Scholar · View at Scopus
  4. P. Holme, “Efficient local strategies for vaccination and network attack,” Europhysics Letters, vol. 68, no. 6, pp. 908–914, 2004. View at Publisher · View at Google Scholar · View at Scopus
  5. Y. Chen, G. Paul, S. Havlin, F. Liljeros, and H. E. Stanley, “Finding a better immunization strategy,” Physical Review Letters, vol. 101, no. 5, Article ID 058701, 2008. View at Publisher · View at Google Scholar · View at Scopus
  6. P. Holme and J. Saramäki, “Temporal networks,” Physics Reports, vol. 519, no. 3, pp. 97–125, 2012. View at Google Scholar
  7. C. Gao and J. Liu, “Modeling and restraining mobile virus propagation,” IEEE Transactions on Mobile Computing, vol. 12, no. 3, pp. 529–541, 2013. View at Publisher · View at Google Scholar · View at Scopus
  8. C. Gao, J. Liu, and N. Zhong, “Network immunization and virus propagation in email networks: experimental evaluation and analysis,” Knowledge and Information Systems, vol. 27, no. 2, pp. 253–279, 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. D. Moore, C. Shannon, and K. Claffy, “Code-Red: a case study on the spread and victims of an internet worm,” in Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment (IMW '02), pp. 273–284, Marseille, France, November 2002. View at Scopus
  10. J. Goldenberg, Y. Shavitt, E. Shir, and S. Solomon, “Distributive immunization of networks against viruses using the “honey-pot” architecture,” Nature Physics, vol. 1, no. 3, pp. 184–188, 2005. View at Publisher · View at Google Scholar
  11. L. C. Chen and K. M. Carley, “The Impact of Countermeasure Propagation on the Prevalence of Computer Viruses,” IEEE Transactions on Systems, Man, and Cybernetics B Cybernetics, vol. 34, no. 2, pp. 823–833, 2004. View at Publisher · View at Google Scholar · View at Scopus
  12. B. Karrer and M. E. J. Newman, “Competing epidemics on complex networks,” Physical Review E, vol. 84, no. 3, Article ID 036106, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. M. E. J. Newman and C. R. Ferrario, “Interacting epidemics and coinfection on contact networks,” PLoS ONE, vol. 8, no. 8, Article ID e71321, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. M. E. J. Newman, “Threshold effects for two pathogens spreading on a network,” Physical Review Letters, vol. 95, no. 10, Article ID 108701, 2005. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Funk and V. A. Jansen, “Interacting epidemics on overlay networks,” Physical Review E, vol. 81, no. 3, Article ID 036118, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. V. Marceau, P.-A. Noël, L. Hébert-Dufresne, A. Allard, and L. J. Dubé, “Modeling the dynamical interaction between epidemics on overlay networks,” Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, vol. 84, no. 2, Article ID 026105, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. Y.-Y. Ahn, H. Jeong, N. Masuda, and J. D. Noh, “Epidemic dynamics of two species of interacting particles on scale-free networks,” Physical Review E, vol. 74, no. 6, Article ID 066113, 2006. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Funk, E. Gilad, and V. A. A. Jansen, “Endemic disease, awareness, and local behavioural response,” Journal of Theoretical Biology, vol. 264, no. 2, pp. 501–509, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. S. Funk, M. Salathé, and V. A. Jansen, “Modelling the influence of human behaviour on the spread of infectious diseases: a review,” Journal of the Royal Society Interface, vol. 7, no. 50, pp. 1247–1256, 2010. View at Publisher · View at Google Scholar · View at Scopus
  20. Z. Ruan, M. Tang, and Z. Liu, “Epidemic spreading with information-driven vaccination,” Physical Review E, vol. 86, no. 3, Article ID 036117, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. Y. Wang, G. Xiao, and J. Liu, “Dynamics of competing ideas in complex social systems,” New Journal of Physics, vol. 14, no. 1, Article ID 013015, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. M. J. Keeling and P. Rohani, Modeling Infectious Diseases in Humans and Animals, Princeton University Press, Princeton, NJ, USA, 2008. View at MathSciNet
  23. R. Pastor-Satorras and A. Vespignani, “Epidemic dynamics in finite size scale-free networks,” Physical Review E: Statistical, Nonlinear, and Soft Matter Physics, vol. 65, no. 3, Article ID 035108, 2002. View at Publisher · View at Google Scholar · View at Scopus
  24. J. Leskovec, J. Kleinberg, and C. Faloutsos, “Graph evolution: densification and shrinking diameters,” ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 1, article 2, 2007. View at Publisher · View at Google Scholar · View at Scopus
  25. M. Ripeanu, I. Foster, and A. Iamnitchi, “Mapping the gnutella network: properties of large-scale peer-to-peer systems and implications,” IEEE Internet Computing Journal, vol. 6, pp. 50–57, 2002. View at Google Scholar
  26. B. Klimt and Y. Yang, “Introducing the enron corpus,” in Proceedings of the 1st Conference on Email and Anti-Spam (CEAS '04), Mountain View, Calif, USA, July 2004.
  27. J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney, “Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters,” Internet Mathematics, vol. 6, no. 1, pp. 29–123, 2009. View at Publisher · View at Google Scholar · View at MathSciNet
  28. J. Leskovec, J. Kleinberg, and C. Faloutsos, “Graphs over time: densification laws, shrinking diameters and possible explanations,” in Proceeding of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '05), pp. 177–187, New York, NY, USA, August 2005. View at Publisher · View at Google Scholar · View at Scopus