# Modeling the spread of computer virus via Caputo fractional derivative and the beta-derivativeAcademic research paper on "Mathematics"

CC BY
0
0
Share paper
OECD Field of science
Keywords
{""}

## Academic research paper on topic "Modeling the spread of computer virus via Caputo fractional derivative and the beta-derivative"

﻿Bonyah et al. Asia Pac. J. Comput. Engin. (2017) 4:1 DOI 10.1186/S40540-016-0019-1

0 Asia Pacific Journal on Computational Engineering

RESEARCH

Open Access

Modeling the spread of computer virus via Caputo fractional derivative and the beta-derivative

CrossMark

Ebenezer Bonyah1*, Abdon Atangana2 and Muhammad Altaf Khan3

'Correspondence: ebbonya@yahoo.com 1 Department

of Mathematics and Statistics,

Kumasi Technical University,

Kumasi, Ghana

Full list of author information

is available at the end of the

article

Abstract

The concept of information science is inevitable in the human development as science and technology has become the driving force of all economics. The connection of one human being during epidemics is vital and can be studied using mathematical principles. In this study, a well-recognized model of computer virus by Piqueira et al. (J Comput Sci 1:31-34, 2005) and Piqueira and Araujo (Appl Math Comput 2(213):355-360, 2009) is investigated through the Caputo and beta-derivatives. A less detail of stability analysis was discussed on the extended model. The analytical solution of the extended model was solved via the Laplace perturbation method and the homotopy decomposition technique. The sequential summary of each of iteration method for the extend model was presented. Using the parameters in Piqueira and Araujo (Appl Math Comput 2(213):355—360, 2009), some numerical simulation results are presented.

Keywords: Computer virus, Caputo fractional derivative, Beta-derivative, Antidotal, Stability

Background

The idea of computer virus came into being around 1980 and has continued threatening the society. During these early stages, the threat of this virus was minimal [1]. Modern civilized societies are being automated with computer applications making life easy in the areas such as education, health, transportation, agriculture and many more. Following recent development in complex computer systems, the trend has shifted to sophisticate dynamic of computer virus which is difficult to deal with. In 2001, for example, the cost associated with computer virus was estimated to be 10.7 United State dollars for only the first quarter [1]. Consequently, a comprehensive understanding of computer virus dynamics has become inevitable to researchers considering the role played by this wonderful device. To ensure the safety and reliability of computers, this virus burden can be tackled in twofold: microscopic and macroscopic [2—6].

The microscopic level has been investigated by [3], who developed anti-virus program that removes virus from the computer system when detected. The program is capable of upgrading itself to ensure that new virus can be dealt with when attacks computer. The characteristics of this program are similar to that of vaccination against a disease. They are not able to guarantee safety in computer network system and also difficult to make

Springer Open

good future predictions. The macroscopic aspect of computer has seen tremendous attention in the area of modeling the spread of this virus and determining the long-term behavior of the virus in the network system since 1980 [4]. The concept of epidemiological modeling of disease has been applied in the study of the spread of computer virus in macroscopic scale [6-8].

Possibly reality of nature could be well understood via fractional calculus perspective. A considerable attention has been devoted to fractional differential equations by the fact that fractional-order system is capable to converge to the integer-order system timely. Fractional-order differential equations' applications in modeling processes have the merit of nonlocal property [9-11]. The model proposed in [10] is a deterministic one and fails to have hereditary and memory effect and therefore, cannot adequately describe the processes very well.

In this paper, we present the fractional-order derivative and obtain analytic numeric solution of the model presented in [10]. The rationale behind the application of fractional derivatives can also be ascertained from some of the current papers published on mathematical modeling [12-16]. In addition to this, the practical implication of fractional derivative can be established in [17].

Model formulation

In this study, we take into account the model proposed by [10]. In their study, the total population of this model is denoted by T which is subdivided into four groups. S denotes the non-infected computers capable of being infected after making contact with infected computer. A is the kind of computers non-infected equipped with antivirus. I denotes infected computers capable of infecting non-infected computers and R deals with removed ones due to infection or not. The recruitment rate of computers into the non-infected computers' class is denoted by N and i is the proportion coefficient for the mortality rate which is not attributable to the virus. p is the rate of proportion of infection as a result of product of SI. The conversion of susceptible computer into antidotal is the product of SI denoted by aSA. The proportion of converting infected computers into antidotal ones in the network is the product of SA denoted by a ¡a. The rate of removed computers being converted into susceptible class is represented by a and S denotes the rate at which the virus rate computers useless and remove from the system.

The mathematical model under consideration here is given as:

Df = N - aAsSA - PSI - /S + aR, f = PSI - aAIAI - SI - /I,

DR = SI - aR - /R, (1)

DA = «asSA + aASAI - /A.

Here, the recruitment rate is taken to be N = 0, indicating that there is no new computer entering into the system during the propagation of the virus. This is because in reality the transfer of virus is faster than adding new computers into the system. The same reason can assign to the choice of ¡i = 0, taking into account the fact that the computer outmodedness time is longer than the time of the virus action being manifested. Accordingly, equation system (1) is reformulated as follows:

DS = -aAsSA - pSI + aR, % = PSI - aAiAI - SI,

DR x J (2)

dT = SI - aR>

DA = aAsSA + aAsAI.

In this paper, we shall fully explore the concept of fractional derivatives and other current proposed derivatives, and in this study, we shall examine this model in the context of fractional derivatives as well as the beta-derivatives. Consequently, Eq. (2) can be transformed into the following:

' AD?S(t) = -aASSA - pSI + aR, ADat I (t) = pSI - aAiAI - SI,

where qDJ* represents the Caputo derivative or the new derivative called beta-derivative. In the next section, some background on the use of fractional and beta-derivatives will be presented. The basic aim of this study is to explore both fractional and beta-derivatives for modeling epidemiological problem in computers. The fractional derivatives are noted for non-local problems and maybe appropriate for epidemiological issues. The fractional order, however, is an indispensable tool for numerical simulations, and therefore, a local derivative with fractional order is presented in this study to model the propagation of computer virus in a network.

This provides the invariance of ^ as to be determined. We conclude from this theorem, that it is sufficient to deal with the dynamics of (1) in In this respect, the model can be assumed as being epidemiologically and mathematically well-posed [18].

Basic concept about the beta-derivative and Caputo derivative

Definition 1 Let f be a function, such that, f : [a, to) ^ R. Then, the beta-derivative is expressed as follows:

oDf f (*)) = lim

(x + s (x + -Tj)) ^ -f (x)

I - f (x)

for all x > a, p e (0,1]. Then if the limit of the above exists, it is said to be beta-differen-tiable. It can be noted that the above definition does not depend on the interval stated. If the function is differentiable, then definition given at a point zero is different from zero.

Theorem 1 Assuming that g = 0 and there are two functions beta-differentiable with P e (0,1]; then, the following relations can be presented:

1. ADa{af (x) + bg (x)) = a^D^f (x)) + ¿oD^f (x)) /or a// a and b being real numbers,

2. AAD%(c) = 0/or c any given constant,

4 A^ifiM _ g (x)ADa (f (x))-f (xD (g (x))

4. 0Dx\g(x) J _ g2x

The proofs of the above relations are identical to the one in [19].

Definition 2 Assuming that f : [a, to) ^ R be a function in a way that f is differenti-able and also alpha-differentiable. Assume g be a function defined in the range of f and also differentiable, then we obtain the following rule:

adix V(x)) = j(t+r^y V(t) dt. (5)

The above operator is referred to as the inverse operator of the proposed fractional derivative. We shall present the principle behind this statement using the following theorem.

Theorem 2 A D [A/if (x)] = f (x)for all x > a with fa given continuous and differenti-able function.

Definition 3 The Caputo fractional derivative of a differentiable function is expressed as:

D f (x}) = a) J (X - t)n-a-1(d) f(i) di' n - 1 < a ^ (6)

The properties behind the use of the Caputo derivative can be established in [14-16, 19]. Given all the information discussed, we shall introduce in the subsequent section the analysis of this model.

Analysis of the mathematical model

This section is devoted to discuss the stability analysis of the model. The disease-free equilibrium and endemic equilibrium points are established. To determine the equilibria points, we make an asumption that the system does not depend on time; hence,

0 = -aASS*A* - p S* I * + a R* 0 = p S*I * - aAIA*I * - SI *

0 = SI * - aR* 0 = aAsS*A + aAsA*I *

Solving the above system, we obtain

* 5 * T - S/B * T - S/B

S* = -; I * = -—; R = -—; A = 0. (9)

B 1 + S/a 1 + a/5 KJ

Hence, the disease-free equilibria are given as:

Ei = (S, I, R, A) = (0,0,0, T); (10)

£2 = (S, I, R, A) = (T,0,0,0). (11)

The stability analysis of this model has been extensively dealt with in [10]. The next section will be concentrated on an approximate solution based on the two analytical techniques for each situation.

Analysis of approximate solutions

One of the most challenging tasks in non-linear fractional differential equation systems is probably how to obtain exact analytical solutions. This accounts for the reasons why in recent times, a lot of attention has been devoted in the quest for obtaining techniques that can ensure asymptotic solutions in such situations. We shall make reference to some of the recent techniques on this subject which are efficient and effective and have been widely used; for instance, the decomposition method [12], Sumudu homotopy perturbation method [20], the Adomian Decomposition method [11, 21], homotopy perturbation method [19, 22, 23], the homotopy Laplace perturbation method [24], and the homotopy. In this study however, we shall make use of two of these stated techniques, specifically the Laplace homotopy perturbation method and the homotopy decomposition method. The homotopy decomposition method will be employed to provide solution to the model with the beta-derivative, followed by the Laplace homotopy perturbation method which will be used to solve the system with Caputo derivative.

Solution with the Laplace homotopy perturbation method

This form was initially proposed in [18], and has been also employed in various scientific researches. We shall explore the methodology for obtaining solution to system (3) with the Caputo fractional derivative in this section:

' S(t) = -aASSA - pSI + aR,

CD"I (t) = pSI - uaiAI - SI, C (12) CDaR(t) = SI - aR,

CD%A(t) = aASSA + íXaiAI .

Applying the Laplace transform operator on both sides of the above system, we obtain the following:

S(T) = £S(0) + Tai—AsSA - PSI + aR), I(T) = (0) + ±l(PSI - aAiAI - SI),

R(T) = TaR(0) + ±l(SI - aR), (13)

A(t) = Ta A(0) + ±l(aAsSA + uaIAI).

The Laplace variable is denoted by t s. Further, the inverse Laplace transform is applied on both sides of the system to yield

' S(t) = S(0) + l-1{ ^¿(-«asSA - 0SI + aR) j, I(t) = I(0) + l-1{ Tal(0SI - (xaiAI - SI)}, R(t) = R(0) + l-1{ Tal(SI - aR) j, ^ A(t) = A(0) + l-1{±1(<*asSA + aMAI)}.

Following the system above, we shall make an assumption that a solution can be obtained in the form of series as follows:

S(t) = Sn(t), I (t) = In(t), R(t) = Rn(t), A(t) = An(t). (15)

Conversely, substituting the above solution in system (11) and adding the embedding parameter p e (0,1], bringing all the terms of the same power of the embedding parameter p together, we have

( So(t) = S(0) I 1o(t) = I (0) ) Ro(t) = R(0) { Ao(t) = A(0)

Si(t) = l-1{^¿(-«asSoAc - 0S0I0 + aRc)} Ii(t) = l-1{£¿(0ScIc - «aiAcIc - SIc)} Ri(t) = l-1{±l(SIc - aRc)} A1(t) = l-1{ ^¿(«asScAc + «aiAcIc)}

In broad-spectrum, we shall obtain the following system of iteration formulas (15):

( / n-1 n-1

Sn(t) = l-il ¡(l -«as E A(n-j-i)SjAj - PY. I(n-j-i)Sj + ^R(n-i)

In(t) = i-H ¡(l P £ I(n-j-i)Sj - «Al E I(n-j-i)Aj - SI(n-i)

{ \ j=o Rn(t) = i-i{ Sai(si(n-1) - o-R(n-i))}

An(t) = l-^ ¡(l I «AS«AS E A(n-j-i)SjAj + «Al E I(n-j-i)Aj

1 * j=o j=0 ,

The above general rule can be simplified in the following algorithm steps:

( So(t) = S(0) p0 . I Io(t) = I(0) P : 1 Ro(t) = R(0) { A0(t) = A(0)

n-i n-i

Algorithm 1. This technique can be employed to obtain a special solution to system (2) via a Caputo fractional derivative ( So(t) = S(0)

Input p0 : < ROo([t)=/R00) as initial input, { A°(t) = A(0)

/'-number terms in the rough computation, ( Sappr (t) = S(0)

Output- J ^appr (t) = 1 (0)

Uutput' ) Rappr(t) = R(0) { Aappr(t) = A(0),

the estimated solution.

So(t) = S(0) ( Sappr(t) = S(0)

StePl : P^ RZrJZ J R^==%

Ao(t) = A(0) Uappr(t) = A(0)

Step 2: For j = 1 to n — 1 do step 3, step 4 and step 5:

Si(t) = l-1{ ±l(-aAsSoAo - PS0I0 + aRo)} h(t) = l-1{ SoIo - «AiAoIo - 5Io)} Ri(t) = l-1{ ^l(5Io - aRo)} ^ Ai(t) = l-1{ T1al(aAsSoAo + «aiAoIo) } Step 3: Compute

So(t ) = S(t ) Io(t ) = I (t ) Ro(t) = R(t) Ao(t) = A(t ),

I / n-1 n-1

Sn(t) = l-ll -uasY. A(n-j-i)SjAj - P £ /(n-j-i)Sj + aR(n-1)

In(t) = I-11 l(n-j-i)Sj - aAl E l(n-j-i)Aj

A/ - Sl(n-

Rn(t) = ¿-1{ Tal(5l(n-i) - aR(n-i)

^ ¿¿(a

i n-i n-i

Tn(t) = l-^ I aAsaAS E A(n-j-i)SjAj + ?ai E l(n-j-i)Aj 1 1 j=0 j=0 ,

Step 4: Compute

' S(m+1) (t) = Bm (t) + S(appr) (t) I(m+l)(t) = Bm(t) + I(appr) (T) R(m+l)(t ) = Km(t ) + R(appr)(t) A(m+l)(t) = Km(t) + A(appr) (t)

Step 5: Compute

S(appr)(t ) = Sappr(t) + S(m+l)(t ) I(appr) (T) = Iappr(i) + I(m+1) (t) R(appr) (t) = Rappr(t) + R(m+1) (t) A(appr) (t) = Aappr (t) + A(m+l)(t)

n-i n-i

The above algorithm shall be applied to obtain the unique solution of system (3) via the Caputo derivative. We shall explore the situation where the beta-derivative is used and this will be discussed in "Basic concept about the beta-derivative and Caputo derivative" section.

Solution with the homotopy decomposition method

This method is explored here to obtain a special solution to system (3) with the betaderivative. The reason is that using the Laplace transform on this derivative does not guarantee desirable results. The inverse operator of this derivative, however, can be applied which is termed as the beta-integral, and this helps to convert the ordinary differential equation into an integral equation in a way that the concept of homotopy can be applied. Consequently, taking the inverse operator on both sides of system (2), we have the following system of integral equations:

S(T) = S(0) + Al?(-aAsSA - pSI + aR) I (T) = I (0) + AW SI - CXaiAI - SI)

R(T) = R(0) + Al?(SI - aR)

A(T) = A(0) + At (®asSA + aMAI)

oW(*)) =J (j + ^J f (T)dT. (26)

Additionally, we shall make an assumption that a solution of the above can be derived in a form of series as follows:

œ œ œ œ

S(t ) = Sn(t ), I (t) = J2 In(t), R(t) = Rn(t), A(t) = Y, An(t). (27)

n=0 n=0 n=0 n=0

Conversely, substituting the above solution in system (15) and adding the embedding parameter p e (0,1], bringing all the terms of the same power of the embedding parameter p together, we have

( So(t) = S(0) p0 . J Io(t) = I(0)

p . | Ro(t) = R(0) (28)

{ Ao(t) = A(0)

/ i \ ß Si(t) = / ( t + wgy J {-aasSoAo - ßS0I0 + aRo}dr

t ( \ 1-ß Ii (t) = / It + jjrpr) {ß S0I0 - aAiAoIo - 5Io}dr o v '

Ri(t) = / (t + ^1-ß{5Io - aRo}dT (29)

t / i \i-ß Ai(t) = / ( t + ^7-gy J {aasSoAo + aaiAoIo}dT.

In broad sense, we shall have the ensuing system of iteration formulas:

t , _ \i-ß f n-i n-i 1

Sn(t) = / T + < -«AS E A(n-j-i)SjAj - ß E l(n-j-i)Sj + aR(n-1) >dr

o v \ j=o j=o J

t / , \1-ß ( n-1 n-1 1

1n(t) = J (j + r(ß) J j ß =o I(n-j-1)Sj - aAl =0 1(n-j-1)Aj - SI(n-1)>dT

t 1-ß

t 1-ß R»(t) = / (t + rkj) {51(n-i) - aR(n-i)}dT o

t / , \ n-1 n-1 1

An(t) = / ( T + We) ) 1 aASaAS E A(n-j-1)SjAj + aAi E I(n-j-l)Aj >dr.

o v \ j=0 j=0 J

The above embellishment can be taken up in the succeeding procedure. ( So(t) = S(0)

I 1o(t) = 1 (0) ...... .

Input < r(t) = R(o) as initial input,

{ Ao(t) = A(0) /'-number terms in the rough computation,

{Sappr (t)

Rappr (fl the estimated solution.

Rappr (t) Aappr (t)

Step 1:

( So(t) = S(t) ( Sappr(t) ( So(t)

I /o(t) = 1 (°) and I /appr(t) = I /o(t)

put1 Ro(t) = R(0) and \ Rappr(t) = 1 Ro(t) (31)

Uo(t) = A(o) Uappr (t) Uo(t)

Step 2: For J — 1 to n — 1 do step 3, step 4 and step 5:

/ 1 \i-ß Si(t) = / ( t + ^ißv J {-aAsSoAo - ßSolo + aRo}dT 0

t / \ i-ß Ii(t) = / I t + {ßSolo - aA/Ao/o - SIo}dT

t / \ i-ß Ri(t) = / (t + pijy) {SIo - aRo}dT o

t i i-ß Ai(t) = / ^t + pißy J {aAsSoAo + aA/Ao/o}dT

Step 3: Compute:

w i \±-p n-1 n-1

Bn(t) = / t + i -«as e A(n-j-i)SjAj - P52 I(n-j-i)Sj + aR(n-1)>dt

0 V ' I j=0 j=0 )

t , . n-1 n-1 "I

Bn(t) = f T + We) E I(n-j-1)Sj - aAlT, I(n-j-1)Aj - SI(n-1) >dr

0 j=0 j=0 t i \1-P

Kn(t) = / (r + p^gyj {5I(n-i) - aR(n-1)}dT

t , \ 1-^1 n-1 n-1

/ 1 \ 1-p n-1 n-1

Kn(t) = f It + J1)) < aAs aAs E A(n-j-1)SjAj + o<ai E I(n-j-1)Aj >dT 0 j=0 j=0

Step 4: Compute:

S(m+1)(T) = Bm (T) + S(appr)(T) I(m+1)(T) = Bm(t) + I(appr) (T) R(m+1) (T) = Km(t) + R(appr) (T) „ A(m+1)(T) = Km (T) + A(appr)(T)

Step 5: Compute:

' S(appr) (i) = S(appr) (i) + S(m+1) (T) Aappr) (T) = ^(appr) (T) + ^(rn+1) (T) R(appr) (i) = R(appr) (i) + R(m+1) (T)

. A(appr) (i) = A(appr) (i) + A(m+1) (T)

Numerical results

We shall employ both Algorithms 1 and 2 to obtain an approximate solution of system (3) via the Caputo fractional derivative and the beta-derivative methods.

With the Caputo fractional derivative

In this part, Algorithm 1 is applied to obtain an approximation solution of system (3):

So(t) = e Io(t) = f Ro(t) = g Ao (t) = h

s (t) _ t^(-aAseh-/3ef+qg) Sl(t) _ r [i+|

( ) _ t1 (fief-aMhf-f)

Il(t) _ r[1+|] Rl(t) _ tl(sf g)

R1(t) _ r[i+|]

A /.N. _ t1 (aAseh+aAlhf) Al(t) _ r[i+|]

With the beta-derivative

Algorithm 2 is used to derive the following series solutions:

Si(t ) =

Ii(t) =

Ri(t ) =

Ai(t ) =

rill) - - (t + m) V + t r M)2) (-aAseh - 0 ef + ag )

(-2 + ^r W

(m)^ - (t + m)+ tr [^ (Pef - aAIhf - Sf ) (-2 + M2

rra) ^ - (t + rk) + tr^)2) (f - ag)

(-2 + ^r

m) ^ - (t + m) + tr[^l)^ ("Aseh + <*Aihf )

(-2 + p)r [p]2

Numerical simulations

In this section, we use parameters in [10], to obtain numerical simulation on illustration of the approximate solutions based on function of time as well as alpha. The parameter values used are aAS = 0.6, a ¡a = 0.4, 0 = 0.2, a = 0.85, S = 0.40 and with the following initial conditions S(0) = 100, I (0) = 10, R( 0) = 5 and A(0) = 20.

Figures 1, 2, 3, 4, 5, 6, 7 and 8 depict the graphical representations of system (3). It is clearly seen from the graph that susceptible class which also represents the total population get quickly infected due to how fast the virus spread with the system. It is obvious in the above figures that the total number of infected computers decreased as the total number of antidotal increased which is a strategy to reduce the number of susceptible computers. The numerical predictions (Figs. 1, 2, 3, 4, 5, 6, 7, 8) are also attributable to fractional order of beta. Realistically, when the beta is above 0.5, the non-realistic prediction is attained. As the beta value increases above 0.5, it appears that anodotal computers exceed the entire initial population. Thus, there exists unrealistic prediction. The best option to secure more computers is put anti-virus on both infected and susceptible computers to avoid disaster and huge cost. This is achieved when the beta value is <0.5 as observed in (Figs. 4, 5, 6, 7, 8). It is not surprising, given the potential danger of anti virus in a computer system because the entire initial population ends up in that compartment. It is remarkable to note that when beta is 1 we obtain the ordinary derivative which implies the model ordinary derivative and hardly give good predictions. The newly introduced beta-calculus, however, has the potential of vividly describing a given physical problem. The obtained Figs. 1, 2, 3, 4, 5, 6, 7 and 8 is far better and accurate as compared to those obtained in [17]. This work has given better predictions as shown in Figs. 1, 2, 3, 4, 5, 6, 7 and 8 which is not the case of integer order in [17].

Appro sol,(blue S and yellow A)

Fig. 1 Approximate solution for a = 0.105

Conclusions

The concept of beta-derivative and Caputo fractional derivative has assisted in investigating the spread of computer virus in a system. This computer virus has been found all over the world where computers are available and causing major financial losses to many establishments. It is worthy to note that the definition of fractional derivative is associated with the convolution of the derivative of a given function with its function power. Convolution is applied to many branches of engineering including image processing as a filter. Fractional derivative, however, in epidemiology serves a memory capable of tracing the spread from beginning to the infected individual. For beta-derivative which

Future Prédiction

Fig. 5 Approximate solution for fi = 0.65

Future Prediction

100 — Susceptible

Infected

50 Antidotal

---i-Time (days)

2 4 6 8 10

Fig. 6 Approximate solution for fi = 0.3

ranges between fractional order and local derivative, the spread of computer virus at local level is identified with a given fractional order. In this study, two distinct concepts of derivatives are employed to investigate the spread of computer virus. The proposed model based on the methodology used was solved iteratively. The numerical simulation results depict that the prediction is based on the fractional order of beta. Simply when beta is close to 1, we obtain non-realistic prediction which is not the case in [10] and when beta is <0.5, a good prediction is attained. Since it is the desire of any institution to have their computers with virus free, the initial computers at the end of the simulation moved into Anodotal section when beta is <0.5 as observed in Figs. 4, 5, 6, 7 and 8.

Future Prediction

Fig. 8 Approximate solution for fi = 0.2

It worthy to notice that when beta is 1, we have ordinary differential derivative cases for both derivatives which do not provide a good prediction. Thus, with the newly introduced, beta-calculus has the potential of providing a vivid account of physical problem more precisely. Authors' contributions

All the authors have contributed equally for the production of this study. All authors read and approved the final manuscript.

Author details

1 Department of Mathematics and Statistics, Kumasi Technical University, Kumasi, Ghana. 2 Institute for Groundwater Studies, University of the Free State, Bloemfontein 9301, South Africa. 3 Department of Mathematics Abdul Wali Khan, University Mardan, Mardan 23200, Pakistan.

Acknowledgements

The authors are thankful to the editor and reviewers for their careful reading and suggestion that greatly improved the quality of the paper.

Competing interests

The authors declare that they have no competing interests.

Received: 8 September 2016 Accepted: 7 December 2016 Published online: 03 January 2017

References

1. Denning PJ (1990) Computers under attack. Addison-Wesley, New York. http://www.washtech.com/news/ netarch/12267-1.html

2. Forrest S, Hofmayer SA, Somayaj A (1997) Computer immunology. Commun ACM 40(10):88-96

3. Kephart JO, Hogg T, Huberman BA (1989) Dynamics of computational ecosystems. Phys Rev A 40(1):404-421

4. Kephart JO, White SR, Chess DM (1993) Computers and epidemiology. IEEE Spectr 30(5):20-26

5. Kephart JO, Sorkin GB, Swimmer M (1997) An immune system for cyberspace. In: Proceedings of the IEEE international conference on systems, men, and cybernetics. IEEE, Orlando, p 879-884

6. Mishra BK, Saini D (2007) Mathematical models on computer viruses. Appl Math Comput 187(2):929-936

7. Mishra BK, Jha N (2007) Fixed period of temporary immunity after run of the anti-malicious software on computer nodes. Appl Math Comput 190:1207-1212

8. Draief M, Ganesh A, Massouili L (2008) Thresholds for virus spread on networks. Ann Appl Probab 18(2):359-378

9. Piqueira JRC, Navarro BF, Monteiro LHA (2005) Epidemiological models applied to viruses in computer networks. J Comput Sci 1:31-34

10. Piqueira JRC, Araujo VO (2009) A modified epidemiological model for computer viruses. Appl Math Comput 2(213):355-360

11. Wazwaz AM (2005) Adomian decomposition method for a reliable treatment of the Bratu-type equations. Appl Math Comput 166:652-663

12. Atangana A, Bildik N (2013) The use of fractional order derivative to predict the groundwater flow. Math Probl Eng 2013:9

13. Cloot A, Botha JF (2005) A generalised groundwater flow equation using the concept of non-integer order derivatives. Water SA 32(1):1-7

14. Atangana A, Vermeulen PD (2014) Analytical solutions of a space-time fractional derivative of groundwater flow equation. Abstr Appl Anal 2014:11

15. Su W, Baleanu D, Yang X, Jafari H (2013) Damped wave equation and dissipative wave equation in fractal strings within the local fractional variational iteration method. Fixed Point Theory Appl 2013(1):1

16. Miller KS, Ross B (1993) An introduction to the fractional calculus and fractional differential equations. Wiley, New York

17. Podlubny I (2002) Geometric and physical interpretation of fractional integration and fractional differentiation. Fract Calc Appl Anal 5:367-386

18. Hethcote HW (2000) The mathematics of infectious diseases. SIAM Rev 42(4):599-653

19. Ganji DD, Sadighi A (2007) Application of homotopy-perturbation and variational iteration methods to nonlinear heat transfer and porous media equations. J Comput Appl Math 207:24-34

20. Singh J, Devendra Kumar S (2011) Homotopy perturbation Sumudu transform method for nonlinear equations. Adv Appl Mech 4:165-175

21. Adomian G, Rach R (1993) Analytic solution of nonlinear boundary value problems in several dimensions by decomposition. J Math Anal Appl 174:118-137

22. Atangana A, Bildik N (2013) Approximate solution of Tuberculosis disease population dynamics model. Appl Anal 2013:1-8

23. Jafari H, Momani S (2007) Solving fractional diffusion and wave equations by modified homotopy perturbation method. Phys Lett A 370:388-396

24. Khan Y (2009) An effective modification of the Laplace decomposition method for nonlinear equations. Int J Nonlinear Sci Num Simul 10:1373-1376

Submit your next manuscript to BioMed Central and take full advantage of:

• Convenient online submission

• Thorough peer review

• No space constraints or color figure charges

• Immediate publication on acceptance

• Inclusion in PubMed, CAS, Scopus and Google Scholar

• Research which is freely available for redistribution