Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2014, Article ID 475934, 9 pages
http://dx.doi.org/10.1155/2014/475934
Research Article

Stability and Bifurcation of a Computer Virus Propagation Model with Delay and Incomplete Antivirus Ability

1College of Computer, Jiangsu Normal University, Xuzhou 221116, China
2College of Live Science, Jiangsu Normal University, Xuzhou 221116, China

Received 12 March 2014; Revised 11 August 2014; Accepted 11 August 2014; Published 30 September 2014

Academic Editor: José R. C. Piqueira

Copyright © 2014 Jianguo Ren and Yonghong Xu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. O. Kephart, T. Hogg, and B. A. Huberman, “Dynamics of computational ecosystems,” Physical Review A, vol. 40, no. 1, pp. 404–421, 1989. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  2. J. C. Wierman and D. J. Marchette, “Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction,” Computational Statistics and Data Analysis, vol. 45, no. 1, pp. 3–23, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  3. J. R. C. Piqueira and V. O. Araujo, “A modified epidemiological model for computer viruses,” Applied Mathematics and Computation, vol. 213, no. 2, pp. 355–360, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  4. J. G. Ren, X. F. Yang, Q. Y. Zhu, L. X. Yang, and C. Zhang, “A novel computer virus model and its dynamics,” Nonlinear Analysis: Real World Applications, vol. 13, no. 1, pp. 376–384, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. B. K. Mishra and D. K. Saini, “SEIRS epidemic model with delay for transmission of malicious objects in computer network,” Applied Mathematics and Computation, vol. 188, no. 2, pp. 1476–1482, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. M. Draief, A. Ganesh, and L. Massoulié, “Thresholds for virus spread on networks,” The Annals of Applied Probability, vol. 18, no. 2, pp. 359–378, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. B. K. Mishra and N. Jha, “SEIQRS model for the transmission of malicious objects in computer network,” Applied Mathematical Modelling, vol. 34, no. 3, pp. 710–715, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. B. K. Mishra and N. Jha, “Fixed period of temporary immunity after run of anti-malicious software on computer nodes,” Applied Mathematics and Computation, vol. 190, no. 2, pp. 1207–1212, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  9. Q. Zhu, X. Yang, and J. Ren, “Modeling and analysis of the spread of computer virus,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 12, pp. 5117–5124, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. C. Gan, X. Yang, W. Liu, Q. Zhu, and X. Zhang, “An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate,” Applied Mathematics and Computation, vol. 222, pp. 265–274, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. C. Zhang, Y. Zhao, and Y. Wu, “An impulse model for computer viruses,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 260962, 13 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  12. S. Kondakci, “Epidemic state analysis of computers under malware attacks,” Simulation Modelling Practice and Theory, vol. 16, no. 5, pp. 571–584, 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. F. G. Wang, Y. K. Zhang, C. G. Wang, J. F. Ma, and S. J. Moon, “Stability analysis of a SEIQV epidemic model for rapid spreading worms,” Computers and Security, vol. 29, no. 4, pp. 410–418, 2010. View at Publisher · View at Google Scholar · View at Scopus
  14. L. P. Song, Z. Jin, G. Q. Sun, J. Zhang, and X. Han, “Influence of removable devices on computer worms: dynamic analysis and control strategies,” Computers & Mathematics with Applications, vol. 61, no. 7, pp. 1823–1829, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  15. J. Amador, “The stochastic SIRA model for computer viruses,” Applied Mathematics and Computation, vol. 232, pp. 1112–1124, 2014. View at Publisher · View at Google Scholar · View at MathSciNet
  16. K. M. Fuhrman, G. A. Pinter, and J. A. Berges, “Dynamics of a virus-host model with an intrinsic quota,” Mathematical and Computer Modelling, vol. 53, no. 5-6, pp. 716–730, 2011. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  17. L. Yang, X. Yang, L. Wen, and J. Liu, “A novel computer virus propagation model and its dynamics,” International Journal of Computer Mathematics, vol. 89, no. 17, pp. 2307–2314, 2012. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  18. X. Yang and L.-X. Yang, “Towards the epidemiological modeling of computer viruses,” Discrete Dynamics in Nature and Society, vol. 2012, Article ID 259671, 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. L. Yang, X. Yang, Q. Zhu, and L. Wen, “A computer virus model with graded cure rates,” Nonlinear Analysis: Real World Applications, vol. 14, no. 1, pp. 414–422, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. Y. B. Kafai, “Understanding virtual epidemics: children’s folk conceptions of a computer virus,” Journal of Science Education and Technology, vol. 17, no. 6, pp. 523–529, 2008. View at Publisher · View at Google Scholar · View at Scopus
  21. Z. H. Zuo, Q. X. Zhu, and M. T. Zhou, “On the time complexity of computer viruses,” IEEE Transactions on Information Theory, vol. 51, no. 8, pp. 2962–2966, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. D. Li and W. Ma, “Asymptotic properties of a HIV-1 infection model with time delay,” Journal of Mathematical Analysis and Applications, vol. 335, no. 1, pp. 683–691, 2007. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. R. Naresh, A. Tripathi, and D. Sharma, “A nonlinear AIDS epidemic model with screening and time delay,” Applied Mathematics and Computation, vol. 217, no. 9, pp. 4416–4426, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. J. Wang, J. Zhang, and Z. Jin, “Analysis of an SIR model with bilinear incidence rate,” Nonlinear Analysis: Real World Applications, vol. 11, no. 4, pp. 2390–2402, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus