Table of Contents Author Guidelines Submit a Manuscript
Journal of Control Science and Engineering
Volume 2017, Article ID 9360430, 9 pages
https://doi.org/10.1155/2017/9360430
Research Article

Stability and Hopf Bifurcation for a Delayed Computer Virus Model with Antidote in Vulnerable System

1School of Management Science and Engineering, Anhui University of Finance and Economics, Bengbu 233030, China
2Department of Law and Economics, Mediterranea University of Reggio Calabria, Via dei Bianchi 2, 89127 Reggio Calabria, Italy
3ICRIOS, Bocconi University, Milan, Italy

Correspondence should be addressed to Zizhen Zhang; moc.361@adiahzzz

Received 6 March 2017; Revised 21 May 2017; Accepted 25 May 2017; Published 20 June 2017

Academic Editor: Petko Petkov

Copyright © 2017 Zizhen Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Ren, X. Yang, Q. Zhu, L.-X. Yang, and C. Zhang, “A novel computer virus model and its dynamics,” Nonlinear Analysis: Real World Applications, vol. 13, no. 1, pp. 376–384, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  2. J. Ren, X. Yang, L.-X. Yang, Y. Xu, and F. Yang, “A delayed computer virus propagation model and its dynamics,” Chaos, Solitons & Fractals, vol. 45, no. 1, pp. 74–79, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  3. L. Feng, X. Liao, H. Li, and Q. Han, “Hopf bifurcation analysis of a delayed viral infection model in computer networks,” Mathematical and Computer Modelling, vol. 56, no. 7-8, pp. 167–179, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  4. X. Han and Q. Tan, “Dynamical behavior of computer virus on Internet,” Applied Mathematics and Computation, vol. 217, no. 6, pp. 2520–2526, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. Y. Muroya, Y. Enatsu, and H. Li, “Global stability of a delayed {SIRS} computer virus propagation model,” International Journal of Computer Mathematics, vol. 91, no. 3, pp. 347–367, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. B. K. Mishra and D. K. Saini, “SEIRS epidemic model with delay for transmission of malicious objects in computer network,” Applied Mathematics and Computation, vol. 188, no. 2, pp. 1476–1482, 2007. View at Publisher · View at Google Scholar · View at MathSciNet
  7. B. K. Mishra and N. Jha, “SEIQRS model for the transmission of malicious objects in computer network,” Applied Mathematics and Computation, vol. 34, no. 3, pp. 710–715, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  8. J. Liu, “Hopf bifurcation in a delayed SEIQRS model for the transmission of malicious objects in computer network,” Journal of Applied Mathematics, vol. 2014, Article ID 492198, 8 pages, 2014. View at Publisher · View at Google Scholar
  9. L.-X. Yang and X. F. Yang, “A new epidemic model of computer viruses,” Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 6, pp. 1935–1944, 2014. View at Publisher · View at Google Scholar · View at MathSciNet
  10. L.-X. Yang, X. F. Yang, Q. Zhu, and L. Wen, “A computer virus model with graded cure rates,” Nonlinear Analysis. Real World Applications, vol. 14, no. 1, pp. 414–422, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  11. L.-X. Yang and X. F. Yang, “Propagation behavior of virus codes in the situation that infected computers are connected to the internet with positive probability,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 693695, 13 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. Muroya and T. Kuniya, “Global stability of nonresident computer virus models,” Mathematical Methods in the Applied Sciences, vol. 38, no. 2, pp. 281–295, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. Y. Muroya, H. Li, and T. Kuniya, “On global stability of a nonresident computer virus model,” Acta Mathematica Scientia. Series B. English Edition, vol. 34, no. 5, pp. 1427–1445, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. N. H. Khanh and N. B. Huy, “Stability analysis of a computer virus propagation model with antidote in vulnerable system,” Acta Mathematica Scientia. Series B. English Edition, vol. 36, no. 1, pp. 49–61, 2016. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. Z. Zhang and D. Bi, “Bifurcation analysis in a delayed computer virus model with the effect of external computers,” Advances in Difference Equations, vol. 317, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  16. T. Dong, X. Liao, and H. Li, “Stability and Hopf bifurcation in a computer virus model with multistate antivirus,” Abstract and Applied Analysis, Article ID 841987, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  17. Y. Yao, X.-w. Xie, H. Guo, G. Yu, F.-X. Gao, and X.-j. Tong, “Hopf bifurcation in an Internet worm propagation model with time delay in quarantine,” Mathematical and Computer Modelling, vol. 57, no. 11-12, pp. 2635–2646, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. J. Ren and Y. Xu, “Stability and bifurcation of a computer virus propagation model with delay and incomplete antivirus ability,” Mathematical Problems in Engineering, Article ID 475934, 2014. View at Publisher · View at Google Scholar · View at MathSciNet
  19. S. G. Ruan and J. J. Wei, “On the zeros of transcendental functions with applications to stability of delay differential equations with two delays,” Dynamics of Continuous, Discrete & Impulsive Systems A: Mathematical Analysis, vol. 10, no. 6, pp. 863–874, 2003. View at Google Scholar · View at MathSciNet · View at Scopus
  20. X. Li and J. Wei, “On the zeros of a fourth degree exponential polynomial with applications to a neural network model with delays,” Chaos, Solitons & Fractals, vol. 26, no. 2, pp. 519–526, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  21. B. D. Hassard, N. D. Kazarinoff, and Y.-H. Wan, Theory and Applications of Hopf Bifurcation, Cambridge University Press, 1981. View at MathSciNet
  22. G. Stepan, “Great delay in a predator-prey model,” Nonlinear Analysis. Theory, Methods & Applications, vol. 10, no. 9, pp. 913–929, 1986. View at Publisher · View at Google Scholar · View at MathSciNet