On computer virus spreading using node-based model with time-delayed intervention strategies

This is a preview of subscription content, access via your institution.

References

  1. 1

    Li A S, Li X C, Pan Y C, et al. Strategies for network security. Sci China Inf Sci, 2015, 58: 012107

    MATH  Google Scholar 

  2. 2

    Balthrop J, Forrest S, Newman M E J, et al. Technological networks and the spread of computer viruses. Science, 2004, 304: 527–529

    Article  Google Scholar 

  3. 3

    Mieghem P V, Omic J, Kooij R. Virus spread in networks. IEEE/ACM Trans Netw, 2009, 17: 1–14

    Article  Google Scholar 

  4. 4

    Zhang Z Z, Wang Y G. SVEIRS epidemic model with delays and partial immunization for internet worms. J Appl Math Comput, 2018, 57: 333–358

    MathSciNet  Article  MATH  Google Scholar 

  5. 5

    Zhang Z Z, Wang Y G, Bi D J, et al. Stability and hopf bifurcation analysis for a computer virus propagation model with two delays and vaccination. Discrete Dyn Nat Soc, 2017, 2017: 1–17

    MathSciNet  MATH  Google Scholar 

  6. 6

    Szor P. The Art of Computer Virus Research and Defense. Boston: Addison-Wesley Professional, 2005

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Science Foundation of China (Grants Nos. 61473061, 61104104), and Program for New Century Excellent Talents in University (Grant No. NCET-13-0091).

Author information

Affiliations

Authors

Corresponding author

Correspondence to Jiangping Hu.

Electronic supplementary material

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Yu, Y., Hu, J. & Zeng, Y. On computer virus spreading using node-based model with time-delayed intervention strategies. Sci. China Inf. Sci. 62, 59201 (2019). https://doi.org/10.1007/s11432-018-9675-1

Download citation