Scholarly article on topic 'Stability and Bifurcation of a Computer Virus Propagation Model with Delay and Incomplete Antivirus Ability'

Stability and Bifurcation of a Computer Virus Propagation Model with Delay and Incomplete Antivirus Ability Academic research paper on "Mathematics"

CC BY
0
0
Share paper
Academic journal
Mathematical Problems in Engineering
OECD Field of science
Keywords
{""}

Academic research paper on topic "Stability and Bifurcation of a Computer Virus Propagation Model with Delay and Incomplete Antivirus Ability"

Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2014, Article ID 475934, 9 pages http://dx.doi.org/10.1155/2014/475934

Research Article

Stability and Bifurcation of a Computer Virus Propagation Model with Delay and Incomplete Antivirus Ability

Jianguo Ren1 and Yonghong Xu2

1 College of Computer, Jiangsu Normal University, Xuzhou 221116, China

2 College of Live Science, Jiangsu Normal University, Xuzhou 221116, China

Correspondence should be addressed to Jianguo Ren; rjgrjgrjgrjg@126.com

Received 12 March 2014; Revised 11 August 2014; Accepted 11 August 2014; Published 30 September 2014 Academic Editor: José R. C. Piqueira

Copyright © 2014 J. Ren and Y. Xu. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

A new computer virus propagation model with delay and incomplete antivirus ability is formulated and its global dynamics is analyzed. The existence and stability of the equilibria are investigated by resorting to the threshold value R0. By analysis, it is found that the model may undergo a Hopf bifurcation induced by the delay. Correspondingly, the critical value of the Hopf bifurcation is obtained. Using Lyapunov functional approach, it is proved that, under suitable conditions, the unique virus-free equilibrium is globally asymptotically stable if R0 < 1, whereas the virus equilibrium is globally asymptotically stable if R0 > 1. Numerical examples are presented to illustrate possible behavioral scenarios ofthe mode.

1. Introduction

With the rapid developments of information and communication technologies, computer has brought great convenience to our life. While enjoying the convenience from Internet, people have to confront the threat of virus intrusions. As the damaging programs, computer viruses parasitize themselves on a host mainly through the Internet and have also become an enormous threat to computers and network resources. So, understanding and predicting the dynamics of computer virus propagation are, therefore, an important pursuit. Consequently, a number of computer virus propagation models, ranging from conventional SIR compartment model [1-3] to its extensions [4-16], were proposed by borrowing from classical epidemic models to investigate the behaviors of computer virus propagation over network.

There is something strikingly different between computer viruses and biological viruses: computer viruses in latent status possess infectivity [17-19]. Consequently, recently proposed models can distinguish latent computers from infected ones by introducing the L and B compartments [1719], named as the S(susceptible)-L(latent)-£(breaking-out)-S(susceptible) model, which represents the dynamics of virus by systems of ordinary differential equations.

One common feature shared by a computer virus is latency [20], which means that, when viruses enter in a host, they do not always immediately break out, but they hide themselves and only become active after a certain period. It is therefore easy to show that there is an inevitable delay from virus invasion to its outbreak. On the other hand, in real networks, the limited cost results in the incomplete antivirus ability. Indeed, when attempting to model computer virus propagation, some of characteristics of viruses and networks should be taken into consideration.

In this paper, a new computer virus propagation model, which incorporates simultaneously the above-mentioned aspects, is established. The aim is to extend and analyze the SLBS computer virus propagation model without delay and incomplete antivirus ability first proposed by Yang et al. [17-19]. This study is motivated by the fact that the delay plays a key role and is inevitably a complex impact on the investigation of computer virus spreading behaviors [21]. The incorporation of the delay and incomplete antivirus ability of networks makes the model more realistic but its mathematical qualitative analysis may be difficult. In our model, the existence and stability of the equilibria are investigated by resorting to the threshold value R0, a certain condition. By analysis, it is found that the model may undergo

a Hopf bifurcation induced by the delay. Correspondingly, the critical value r0 of the Hopf bifurcation is obtained. When delay t < t0, the virus spreading is stable and easy to protect; whereas t > t0, the virus spreading is unstable and out of control. Applying Lyapunov functional approach, it is proven that the unique virus-free equilibrium is globally asymptotically stable under certain condition if R0 < 1, whereas the virus equilibrium is globally asymptotically stable if R0 > 1. Numerical examples are presented to demonstrate the analytical results and to illustrate possible behavioral scenarios of the mode. Our results may provide some understanding of the spreading behaviors of computer viruses.

The organization of this paper is as follows. In the next section, we present the mathematical model to be discussed. In Section 3, we study the existence and local and global stability of the virus-free and virus equilibria, respectively, and investigate the Hopfbifurcation. In Section 4, numerical examples are presented to demonstrate the analytical results. Finally, some conclusions are given in Section 5.

2. Mathematical Model

Consider the typical SLBS mode [17-19], which is formulated as the following system of ordinary differential equations:

= p-ßS(t)L (t) - ßS (t) B (t) + yB (t) - pS (t),

^ = 08 (t) L (t) + 6S (t) B (t) - aL (t) - pL (t), (1) di

— =aL (t) - yB (t) - p (t) B.

Here, it is assumed that a computer (or node) is categorized as internal or external depending on whether or not it is currently connected to the network. The total number of computers connected to the network is divided into three compartments: internal uninfected compartment, (i.e., virus-free computers), internal infected compartment where computers are currently latent (latent computers, for short), and internal infected compartment where computers are currently breaking out (breaking-out computers, for short). Let S(t), L(t), and B(t) denote their corresponding percentages at time t, respectively. This model involves four positive parameters: ^ denotes the rate at which external virus-free computers are connected to the network and at which an internal node is disconnected from the network; p denotes the rate at which, when having connection to one latent or breaking-out computer, one virus-free computer can become infected; y denotes the rate at which a breaking-out computer gets a scan by running the antivirus software; a denotes the rate at which the latent computer is triggered.

By carefully considering the natures of computer virus, the following assumptions are made.

(i) At time t, the transition from the latent to the breaking-out is given by L(t-r), which means a latent computer moves into the breaking-out compartment after a period of time r.

(ii) Since the antivirus ability is incomplete, at time t, the breaking-out computers may either be temporarily suppressed in their latency with probability e or be cured into the virus-free ones with probability (1 - e), where e > 0 is a constant. If e = 0, then the antivirus ability is fully effective, whereas e = 1 means that antivirus ability is utterly ineffective.

Based on the assumptions above, one can obtain the following computer virus propagation model:

= p-ßS(t)L (t) - ßS (t) B (t) + (l-e)yB(t)- pS (t),

= ßS (t) L (t) + ßS (t) B (t) -aL(t-r) + eyB (t) - pL (t),

— = aL(t -t) - yB (t) - p (t) B.

Let S(t) + L(t) + B(t) = 1. Thus, model (2) can be written as the following:

— = ß[\-L(t)-B(t)] [L(t) + B(t)] -aL(t-r)+ eyB (t) - pL (t),

— = aL(t -t) - yB (t) - pB (t).

All the parameters are positive constants. The initial conditions are

(h (9), (0)) e C+ = ((-t, 0],R2+), (0) > 0, i = 1,2,

where R+ = {(L, B) e R2,L>0,B> 0}. 3. Model Analysis

In this section, we intended to study the dynamical behaviors of model (3). First, a threshold value R0 is defined as the number of virus-free computers that are infected by a single computer virus during its lift span. The threshold value R0 plays a key role in the epidemic dynamics. By resorting to it, the existence and stability of the equilibria can be determined. Generally speaking, if R0 < 1, the virus-free equilibrium is globally asymptotically stable, and when R0 >1, the virus equilibrium exists and is globally asymptotically stable. A direct computation gives

ß(a + ^ + y) + a) + y) - aey

3.1. Stability of Virus-Free Equilibrium. It is clear that model (3) always admits unique virus-free equilibrium E0(0,0). We

first consider its stability. For model (3), the corresponding characteristic equation at E0 is

X +m1X + m0 + (aX + n0)e T = 0,

which is similar to the relative forms in [22-24], where m1 = + y - p,

mo = (V- P) (V + Y)' (7)

no = [(y + y)-(p + ey)]a.

Our aim is to investigate the stability behavior in the case t = 0. Obviously, (6) is a transcendental equation, and iq (q > 0) is its root if and only if tf satisfies

-rj2 + m1iq + m2 = - (aiq + n2) (cos ^t - i sinqr). (8) Separating the real and imaginary parts, we have

-q + m0 = -n0 cos qt - aq sin qt = -aq cos qT + n0 sin qt.

Eliminating t by squaring and adding (9), we obtain a polynomial in q as

4(2 2 - \ 2 2 2 n

q + (m1 -a -2m0)q + m0 -n0 = 0

i2^ - 2m0 - a2 = [(p - ß) + (p + y)]2

- 2 (y - ß) (y + y) - a2

= (V + Y)2 + (V- ßf -m0 + n0 = (y - ß) (y + y) + (y + y) a - (ß + ey) a = (p + y)(p + a) - aey - ß(y + y + a)

= [(p + y)(p + a) - aey] (i - R0) > o,

m0 - n0 = (y - ß) (y + y) - (y + y) a + (ß + ey) a

= (y - ß - a)(y + y) + aß + aey, ml -nl = (m0 + ti0) (m0 - ti0)

= {[(V + Y) (H + a)- aeY] (1 - R0)} x {(p - ß - a) (y + y) + aß + aey}.

Clearly, if y > a+^,then m\-2m0-a2 > 0 and m20-n0 > 0. It follows from the Hurwitz criterion that the roots of (10) have negative real parts. Hence, we have the following.

Theorem 1. When R0 < 1, the virus-free equilibrium E0 is locally asymptotically stable for all t > 0 provided that y > a + p.

Now, it is the turn to examine the global stability ofvirus-free equilibrium. The following theorem is obtained.

Theorem 2. When R0 < 1, the virus-free equilibrium E0 is globally asymptotically stable for all t > 0.

Proof. By use of the Lyapunov Direct Method, consider the following function:

V(L,B) = L + B.

It is clear that V is a positive definite. Then the derivative of V is

V(L,B) = jt(1-S)

= -y + ßS(L + B)-(1-e)yB + ^S = p(S - 1) + ßS (1 - S) - (1 - e) yB

= (S-1)(p-pS)-(1-e)yB.

If p > a + p hold, then (S - 1)(p - ftS) < 0. Furthermore, V(L'B) < 0 bytheLyapunov-LaSalletypetheoremshowsthat limt^TOL(i) = 0 and limt^TOB(i) = 0. Hence, when R0 <1, the virus-free equilibrium Et is globally asymptotically stable. □

3.2. Stability of Virus Equilibrium. Next, we examine the stability of virus equilibrium. After direct computations, the unique virus equilibrium Et (L t,Bt) of model (3) reads

(Y + h)B. = (Y + P) (R0 -1)

a R0 (y + y + a)

ßa(y + y + a) - a(y + y) (y + a) + a2ey ß(y + y + a)2

= a(Ro -1) R0 (y + y + a)

If R0 < 1, the E„(Lt,Bt) does not exist. It suffices to show the local asymptotical stability of Et for model (3). Indeed, the Jacobian matrix of the linearized system of this system evaluated at Et is

P-2fi(L, + B,)- y-ae-Xx -X l3-2j3(L„ +Bt,) + ey) ae-Xr -(y + y)-X

Its characteristic equation is

X2 + p1X + p2 + (aX + q2) e-Xr = 0, (16)

Pi = 2y + y- l3 + 2p(L, +B,),

Po = (p- ¡3) (y + y) + 2p(p + y) (L. + Bt), (17)

% = (^ + y)a- [fi + ey-2p(L. +Bt)]a.

In the case t = 0, for our purpose, if iq (q > 0) is a solution of (16), separating real and imaginary parts, we derive that

-tf2 + P1 ill + P2 = - + 1o) (cos qr - i sinqr). (18)

Separating the real and imaginary parts yields

+ p0 = cos ^r - a^ sin ^T,

= -a^ cos ^r + sin ^r.

Eliminating r by squaring and adding (19), we obtain a polynomial in ^ as

+ (rf - a2 - 2pa) ^ + Po' - ^ = 0.

For convenience, let ^ = pf - a2 - 2_p0 and = p^ -If ^ >0 and > 0, then both of the two roots of (20) have negative real parts. By the Hurwitz criterion, Et is locally asymptotically stable for all r > 0. However, if ^ <0 and > 0, then (20) has the positive root ^ = (1/2)(a2 + 2_p0 -

^2 + ^(^2 - «2 - 2_p0)2 - 4(p2 - <j0)). It follows that (16) has a positive root. Say, the characteristic equation (16) has a pair of imaginary roots ±«^0, and corresponding delay r0 is given by (19):

r0 = - arccos

k = 0,1,2,3,...

Furthermore, we can also verify the transversality condition dR((A(r)))/dryT=To > 0. Then, we establish the following theorem.

Theorem 3. With .R0 > l, model (3) has a unique virus equilibrium Et. Furthermore,

(1) Et is locally asymptotically stable when r < r0 and is unstable when r > r0, where

Y (1-aPi)-,ft)'

r0 = - arccos

k = 0,1,2,3,...;

(2) when r = r0, the model (3) undergoes a Hopfbifurca-tion.

Now, we are ready to examine the global stability of virus equilibrium Et. Then we have the following.

Theorem 4. When .R0 > 1,thevirusequilibrium E. is globally asymptotically stable.

Proof. We consider the following function:

1 2 1 2 Vi (!,£) = ^[(L-L.) + (£-£.)]2 + 2"(L-L.)2, (23)

where w is a positive constant to be determined. The derivative of V1 is

Vi(L,B) = (S-S.) g + ^(L-L.) f

= (S-S.)[-j3(S-S.)(l-S-S.)

-(1-e)y(L-L.) -[(1-e)y + F] (S-S.)]

+ to(L-L .)[0(S-S.)(1-S-S.)

-a(Lr-L J-ey (S-S„) -(ey + ^ (L-L.)] = [^(S + S.-1)-(1-e)y-F] x (S - S.)2 - w(ey + p) (L - L .)2 -«a (L-L ,)(Lr-L.) + [^(1-S-S»)-toey-(1-e)y] x(S-S.)(L-L.) = £(S-1)(S-S.)° + [£S.-(1-e)y-F] x(S-SJ2-to(ey + F) (L-L .)2 -«a (L-L ,)(Lr-L.) + [^(1-S-S»)-toey-(1-e)y] x(S-S.)(L-L.)

= £(S-1)(S-SJ2 -

(^ + y)(1 -e)y a + ^ + y

x (S - S.)2 - w(ey + p) (L - L .)2 -«a (L-L ,)(Lr-L.) + [^(1-S-S»)-toey-(1-e)y] x(S-S.)(L-L.)

(^ + y)(1-e)y(S. -S)2 a + ^ + y

+ «(ey + ^) (L-L.)2

- [wß (S - 1) + wßS. + wey + (1 - e) y]

x(S. -S) (L-L.)

+ £(S-1)(S-SJ2 -«a (L-L ,)(Lr-L.).

(^ + y)(1 e)y x w (ey + „) > 2«ß (S - 1)

a + ^ + y (25)

+ + 2«ey + 2(1 - e) y.

That is, (^ + y)(1 -e)y

a + ^ + y

x to (ey + - (ßS4 + ey) > (1 - e) y,

The number of latent nodes L

Figure 1: Phase diagram of L(i) and B(i) in the case ^ = 0.02, a = 0.23, ^ = 0.4, y = 0.58, e = 0.35,andr = 1 under the different values of L(0) and B(0).

Figure 3: Phase diagram ofL(i) and B(i) in the case ^ = 0.4, a = 0.1, ^ = 0.05, y = 0.15, e = 0.5, t = 1, R0 = 5.33 > 1, and E, = (0.542,0.271) under the different values of L(0) and B(0).

Time t

Figure 2: Evolutions of L(i) + B(t) in the case ^ = 0.05, a = 0.3, ^ = 0.4, y = 0.58, e = 0.18, andr = 2 under the values of L(0) = 0.1 and B(0) = 0.1.

Time t

Figure 4: Evolutions of L(i) + B(t) in the case ^ = 0.56, a = 0.15, ^ = 0.05, y = 0.15, e = 0.5, t = 3, and R0 = 6.817 > 1 under the values of L(0) = 0.3 and B(0) = 0.2.

under the condition of + y)(1 - e)A(ey + - +

ey)(a + ^ + y) > 0, from which we can conclude that w > (1-e)y(a+^+y)/((^+y)(1-e)A(ey+^)-2(^S, +ey)(a+^+y)). In addition, suppose that r is small enough, then Lr = L. They lead to V < 0. Applying the Lyapunov-LaSalle type theorem, it shows that limt^TOL(i) = L, and limt^TOB(i) = Hence, when R0 > 1, the virus equilibrium E, is globally asymptotically stable. □

4. Numerical Simulations and Discussion

In this section, numerical simulations are carried out to support the analytical conclusion and to illustrate possible behavioral scenarios of the model. Figure 1 exhibits the evolutions of L(i) and £(i) with time, where the virus-free

equilibrium is globally asymptotically stable, consistent with Theorem 2. Furthermore, an equilibrium is virus-free if and only if L(i) + £(i) = 0, which means that the virus would be extinct in the network, as shown in Figure 2. Figure 3 plots the evolutions of L(i) and £(i) with time. One can observe that, for any initial state, the solution would approach a fixed level; that is, the virus equilibrium is globally asymptotically stable. Besides, an equilibrium is viral if and only if L(i) + £(i) = 0, and its global asymptotical stability means that the virus spreads in the network continuously and stably, as shown in Figure 4. Figure 5 illustrates the complex impacts of delay r on the spreading behavior of the virus. The evolutions of comparing r < r0 with r > r0 between L(i) and £(i) are carried out. It can be seen that, virus equilibrium E, is stable when r < r0and then when delay r increases to the critical

T > To

0 50 100 150 200 250 300 350 400 450 500 Time t

50 100 150 200 250 300 350 400 450 500 Time t

Figure 5: Evolutions of comparison of t < t0 with t < t0 between L(i) and B(i) in the case ^ = 0.85, a = 0.85, ^ = 0.2, y = t = 2.3 (left) and t = 2.4 (right), R0 = 4.05 > 1, and E, = (0.193,0.559) under the values of L(0) = 0.006 and B(0) = 0.001.

0.095, e = 0.85,

T = 10

300 400 Time t

300 400 Time t

T = 15

300 400 Time t

T = 25

0 100 200 300 400 500

Time t

Figure 6: Evolutions of L(i) and B(i) with the different values of time delay t in the case ^ (0.399,0.295) under the values of L(0) = 0.006 and B(0) =0.001.

0.85, a = 0.85, ^ = 0.2, y = 0.95, e = 0.85,

R0 = 3.26 > 1, and E,

0.65 0.6 0.55 L 0.5 0.45 0.4

0.35 0.3

B 0.25

0 10 20 30 40 50 60 70 80 90 100 Time t

- y = 0.15

- y = 0.55

0 10 20 30 40 50 60 70 80 90 100 Time t

- y = 0.15

- y = 0.55

Figure 7: Evolutions of L(t) and B(t) with the different scan rates in the case fi = 0.85, a = 0.25, ^ = 0.2, e = 0.15, and t = 2.5 under the values of L(0) = 0.6 and B(0) = 0.2.

0.38 0.36 0.34 0.32

B °.3 0.28 0.26 0.24 0.22

0 10 20 30 40 50 60 70 80 90 100 Time t

e = 0.35 e = 0.65

10 20 30 40 50 60 70 Time t

e = 0.35 e = 0.65

90 100

Figure 8: Evolutions of L(i) and B(i) with the different parameter e in the case ^ = 0.85, a = 0.25, ^ = 0.2, y = 0.35, and t = 2.5 under the values of L(0) = 0.6 and B(0) = 0.2.

value T0,itloses itsstability andaHopfbifurcationarises; then it exceeds the value of r0 beyond which the virus propagation will become unstable, in agreement with Theorem 3. In Figure 6, the effect of delay with r e (5,10,15,25) on the number of latent and breaking-out computers is illustrated. The role of key parameters y and e in the variation of the latent and breaking-out compartments is shown in Figures 7-8. As expected, one can observe that, for higher value of scan rates y, the percentage of latent computers increases, in contrast to that of breaking-out ones. However, the percentages of both latent and breaking-out computers rise as e increases. Figure 9 shows the appearance of periodic solutions with the transmission from the stable state to the unstable one.

5. Conclusions

In real networks, the outbreak of computer virus usually lags and the antivirus ability of network is not fully complete. Aiming at characterizing these situations, a new computer virus propagation model is established. By theoretical analysis, the following conclusions can be obtained.

(1) If .Rq < 1 hold, the virus-free equilibrium E0 is globally asymptotically stable under certain conditions for all t > 0, which implies that the virus would be extinct in the network. In such conditions, it is unnecessary for us to take practices in a real network. Say, the virus should be left alone.

10 20 30

40 50 60 Time t

70 80 90 100

Figure 9: Appearance ofperiodic solutions in the case ft = 0.85, a = 0.85, ^ = 0.2, y = 0.095, e = 0.85, t = 2.375, and E, = (0.193,0.559) under the values of L(0) = 0.35 and B(0) = 0.45.

(2) If R0 > 1 hold, the virus equilibrium E0 is globally asymptotically stable, which means that the viruses spread in the network continuously and stably. In this case, some efforts can be made to keep the virus prevalence to below a proper level.

(3) The critical delay r0 where the Hopf bifurcation occurs is obtained, where

rn = - arccos

n2 (1 - ^l) - PQ

^2a2 + ^Q

k = 0,1,2,3,....

(4) When the delay r < r0, the virus propagation is stable. In such conditions, the spreading behavior of virus would be divinable.

(5) When the delay r > r0, the virus propagation is unstable. In such conditions, the virus spreading would be out of control.

Moreover, numerical simulations are presented to demonstrate the analytical results and to illustrate possible behavioral scenarios of the model. It is shown that

(1) For virus equilibrium, the larger the delay is, the longer it takes to settle down towards its steady states.

(2) As expected, the increase of the scan rate can reduce the percentage of the breaking-out computers but increase the percentage of the latent ones, which suggests that we run the antivirus software as often as possible.

(3) As expected, the increase of the antivirus ability of the software can reduce the percentage of the infected

(latent and breaking-out) computers in the network, which suggests that we invest more in their developments.

Our results may provide some understanding of the spreading behaviors of computer viruses.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

This workis supported by the National Natural Science Foundation of China under Grant no. 61304117, the Natural Science Foundation of the Jiangsu Higher Education Institutions of China under Grant no. 13KJB520008, and the Doctorate Teacher Support Project of Jiangsu Normal University under Grant no. 12XLR021.

References

[1] J. O. Kephart, T. Hogg, and B. A. Huberman, "Dynamics of computational ecosystems," Physical Review A, vol. 40, no. 1, pp. 404-421,1989.

[2] J. C. Wierman and D. J. Marchette, "Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction," Computational Statistics andDataAnalysis,vol. 45, no. 1, pp. 3-23, 2004.

[3] J. R. C. Piqueira and V. O. Araujo, "A modified epidemiological model for computer viruses," Applied Mathematics and Computation, vol. 213, no. 2, pp. 355-360, 2009.

[4] J. G. Ren, X. F. Yang, Q. Y. Zhu, L. X. Yang, and C. Zhang, "A novel computer virus model and its dynamics," Nonlinear Analysis: Real World Applications, vol. 13, no. 1, pp. 376-384, 2012.

[5] B. K. Mishra and D. K. Saini, "SEIRS epidemic model with delay for transmission of malicious objects in computer network," Applied Mathematics and Computation, vol. 188, no. 2, pp. 14761482, 2007.

[6] M. Draief, A. Ganesh, and L. Massoulie, "Thresholds for virus spread on networks," The Annals of Applied Probability, vol. 18, no. 2, pp. 359-378, 2008.

[7] B. K. Mishra and N. Jha, "SEIQRS model for the transmission of malicious objects in computer network," Applied Mathematical Modelling, vol. 34, no. 3, pp. 710-715, 2010.

[8] B. K. Mishra and N. Jha, "Fixed period of temporary immunity after run of anti-malicious software on computer nodes," Applied Mathematics and Computation, vol. 190, no. 2, pp. 12071212, 2007.

[9] Q. Zhu, X. Yang, and J. Ren, "Modeling and analysis of the spread of computer virus," Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 12, pp. 5117-5124, 2012.

[10] C. Gan, X. Yang, W. Liu, Q. Zhu, and X. Zhang, "An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate," Applied Mathematics and Computation, vol. 222, pp. 265-274, 2013.

[11] C. Zhang, Y. Zhao, and Y. Wu, "An impulse model for computer viruses," Discrete Dynamics in Nature and Society, vol. 2012, Article ID 260962,13 pages, 2012.

[12] S. Kondakci, "Epidemic state analysis of computers under malware attacks," Simulation Modelling Practice and Theory, vol. 16, no. 5, pp. 571-584, 2008.

[13] F. G. Wang, Y. K. Zhang, C. G. Wang, J. F. Ma, and S. J. Moon, "Stability analysis of a SEIQV epidemic model for rapid spreading worms," Computers and Security, vol. 29, no. 4, pp. 410-418, 2010.

[14] L. P. Song, Z. Jin, G. Q. Sun, J. Zhang, and X. Han, "Influence of removable devices on computer worms: dynamic analysis and control strategies," Computers & Mathematics with Applications, vol. 61, no. 7, pp. 1823-1829, 2011.

[15] J. Amador, "The stochastic SIRA model for computer viruses," Applied Mathematics and Computation, vol. 232, pp. 1112-1124, 2014.

[16] K. M. Fuhrman, G. A. Pinter, and J. A. Berges, "Dynamics of a virus-host model with an intrinsic quota," Mathematical and Computer Modelling, vol. 53, no. 5-6, pp. 716-730, 2011.

[17] L. Yang, X. Yang, L. Wen, and J. Liu, "A novel computer virus propagation model and its dynamics," International Journal of Computer Mathematics, vol. 89, no. 17, pp. 2307-2314, 2012.

[18] X. Yang and L.-X. Yang, "Towards the epidemiological modeling of computer viruses," Discrete Dynamics in Nature and Society, vol. 2012, Article ID 259671, 2012.

[19] L. Yang, X. Yang, Q. Zhu, and L. Wen, "A computer virus model with graded cure rates," Nonlinear Analysis: Real World Applications, vol. 14, no. 1, pp. 414-422, 2013.

[20] Y. B. Kafai, "Understanding virtual epidemics: children's folk conceptions of a computer virus," Journal of Science Education and Technology, vol. 17, no. 6, pp. 523-529, 2008.

[21] Z. H. Zuo, Q. X. Zhu, and M. T. Zhou, "On the time complexity of computer viruses," IEEE Transactions on Information Theory, vol. 51, no. 8, pp. 2962-2966, 2005.

[22] D. Li and W. Ma, "Asymptotic properties of a HIV-1 infection model with time delay," Journal of Mathematical Analysis and Applications, vol. 335, no. 1, pp. 683-691, 2007.

[23] R. Naresh, A. Tripathi, and D. Sharma, "A nonlinear AIDS epidemic model with screening and time delay," Applied Mathematics and Computation, vol. 217, no. 9, pp. 4416-4426, 2011.

[24] J. Wang, J. Zhang, and Z. Jin, "Analysis of an SIR model with bilinear incidence rate," Nonlinear Analysis: Real World Applications, vol. 11, no. 4, pp. 2390-2402, 2010.

Copyright of Mathematical Problems in Engineering is the property of Hindawi Publishing Corporation and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.