Computer Science ›› 2017, Vol. 44 ›› Issue (Z6): 390-394.doi: 10.11896/j.issn.1002-137X.2017.6A.088
Previous Articles Next Articles
ZHANG Xiao-pan and YUAN Ling-yun
[1] 陈兴,翟林鹏.智慧农场信息化应用研究[J].农业网络信息,2014(1):11-13. [2] 张仁武,李钢,候整风.计算机病毒与反病毒技术[M].北京:清华大学出版社,2006. [3] 王倍昌.走进计算机病毒[M].北京:人民邮电出版社,2010. [4] MURRAY W H.The application of epidemiology to computer viruses[J].Computers & Security,1988,7(2):139-145. [5] PASTOR-SATORRAS R,VESPIGNANI A.Epidemic dynamics and endemic states in complex networks[J].Physical Review E Statistical Nonlinear & Soft Matter Physics,2001,63(6 Pt 2):138-158. [6] KEPHART J O.Directed-Graph Epidemiological Models of Com-puter Viruses[C]∥1991 IEEE Computer Society Symposium on Research in Security and Privacy,1991.1991:343-361. [7] KEPHART J O,WHITE S R.Measuring and Modeling Com-puter Virus Prevalence[C]∥1993 IEEE Computer Society Symposium on Research in Security and Privacy.IEEE,2002:2-15. [8] KESHRI N,MISHRA B K.Two time-delay dynamic model on the transmission of malicious signals in wireless sensor network[J].Chaos Solitons & Fractals,2014,68:151-158. [9] KUSAKABE T,HAYASHIDA Y,MATSUDA H,et al.Mathematical model on the transmission of worms in wireless sensor network[J].Applied Mathematical Modelling,2013,37(6):4103-4111. [10] WANG X,LI Q,LI Y.EiSIRS:a formal model to analyze the dynamics of worm propagation in wireless sensor networks[J].Journal of Combinatorial Optimization,2010,20(1):47-62. [11] KHAYAM S A,RADHA H.Using signal processing techniques to model worm propagation over wireless sensor networks[J].IEEE Signal Processing Magazine,2006,23(2):164-169. [12] DE P,LIU Y,DAS S K.Deployment-aware modeling of nodecompromise spread in wireless sensor networks using epidemic theory[J].Acm Transactions on Sensor Networks,2009,5(3):1792-1794. [13] HAN X,TAN Q.Dynamical behavior of computer virus on Internet[J].Applied Mathematics & Computation,2010,217(6):2520-2526. [14] ENG L,LIAO X,LI H,et al.Hopf bifurcation analysis of a delayed viral infection model in computer networks[J].Mathema-tical & Computer Modelling,2012,56(7/8):167-179. [15] WANG X M,ZAOBO H E,ZHAO X Q,et al.Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks[J].Sciece China Information Sciences,2013,56(9):1-18. [16] HE Z,WANG X.A Spatial-temporal Model for the MalwarePropagation in MWSNs Based on the Reaction-Diffusion Equations[M].Web-Age Information Management,2012:45-56. [17] ZHU Q,YANG X,YANG L X,et al.A mixing propagationmodel of computer viruses and countermeasures[J].Nonlinear Dynamics,2013,73(3):1433-1441. [18] ZHU L,ZHAO H,WANG X.Bifurcation analysis of a delayreaction-diffusion malware propagation model with feedback control[J].Communications in Nonlinear Science & Numerical Simulation,2015,22(1-3):747-768. |
No related articles found! |
|