Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2012, Article ID 407064, 13 pages
http://dx.doi.org/10.1155/2012/407064
Research Article

Two Quarantine Models on the Attack of Malicious Objects in Computer Network

1Department of Applied Mathematics, Birla Institute of Technology, Mesra, Ranchi 835215, India
2Department of Applied Mathematics, Nilai Educational Trust's Group of Institutions, Thakurgaon, Ranchi 835205, India

Received 5 April 2011; Accepted 3 June 2011

Academic Editor: Zidong Wang

Copyright © 2012 Bimal Kumar Mishra and Aditya Kumar Singh. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

How to Cite this Article

Bimal Kumar Mishra and Aditya Kumar Singh, “Two Quarantine Models on the Attack of Malicious Objects in Computer Network,” Mathematical Problems in Engineering, vol. 2012, Article ID 407064, 13 pages, 2012. https://doi.org/10.1155/2012/407064.