数学与计算机科学 |
|
|
|
|
一类具有非线性发生率的无线传感网络蠕虫传播模型的延迟动力学行为 |
张子振, 储煜桂, KUMARISangeeta, RanjitKumar UPADHYAY |
1.安徽财经大学管理科学与工程学院,安徽蚌埠233030 2.印度理工学院(印度矿业学院) 应用数学系,印度丹巴德 826004 |
|
Delay dynamics of worm propagation model with non-linear incidence rates in wireless sensor network |
ZHANG Zizhen, CHU Yugui, KUMARI Sangeeta, Ranjit Kumar UPADHYAY |
1.School of Management Science and Engineering, Anhui University of Finance and Economics, Bengbu 233030, Anhui Province, China 2.Department of Applied Mathematics, Indian Institute of Technology (Indian School of Mines), Dhanbad 826004, India |
引用本文:
张子振, 储煜桂, KUMARISangeeta, RanjitKumar UPADHYAY. 一类具有非线性发生率的无线传感网络蠕虫传播模型的延迟动力学行为[J]. 浙江大学学报(理学版), 2019, 46(2): 172-195.
ZHANG Zizhen, CHU Yugui, KUMARI Sangeeta, Ranjit Kumar UPADHYAY. Delay dynamics of worm propagation model with non-linear incidence rates in wireless sensor network. Journal of Zhejiang University (Science Edition), 2019, 46(2): 172-195.
链接本文:
https://www.zjujournals.com/sci/CN/10.3785/j.issn.1008-9497.2019.02.005
或
https://www.zjujournals.com/sci/CN/Y2019/V46/I2/172
|
1 PARSAEIM R, JAVIDANR, KARGARN S, et al. On the global stability of an epidemic model of computer viruses[J].Theory in Biosciences, 2017, 136(3/4):169-178.DOI:10.1007/s12064-017-0253-2 2 KEPHARTJ O, WHITES R. Directed-graph epidemiological models of computer viruses[C]//1991 Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. Oakland:IEEE, 1991:343-359.DOI:10.1109/risp.1991.130801 3 KEPHARTJ O, WHITES R. Measuring and modeling computer virus prevalence[C]// 1993 Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy.Oakland:IEEE, 1993: 2-15.DOI:10.1109/risp.1993.287647 4 RENJ G, YANGX F, YANGL X, et al. A delayed computer virus propagation model and its dynamics[J].Chaos, Soliton and Fractals, 2012, 45(1):74-79.DOI:10.1016/j.chaos.2011.10.003 5 PENGM, HEX, HUANGJ J, et al. Modelling computer virus and its dynamics[J].Mathematical Problems in Engineering, 2013,Article ID:842614.DOI:10.1155/2013/842614 6 GUILLéNJ D H, REY A M D, ENCINASL H. Study of the stability of a SEIRS model for computer worm propagation[J].Physica A: Statistica Mechanics and Its Applications, 2017, 479(1):411-421.DOI:10.1016/j.physa.2017.03.023 7 HOSSEINIS, AZGOMIM A, RAHMANIA T. Malware propagation modeling considering software diversity and immunization[J]. Journal of Computational Science, 2016, 13:49-67.DOI:10.1016/j.jocs.2016.01.002 8 BADSHAHQ. Global stability of SEIQRS computer virus propagation model with nonlinear incidence function[J]. Applied Mathematics, 2015, 6(11):1926-1938.DOI:10.4236/am.2015.611170 9 LIY, THAIM T. Wireless Sensor Networks and Applications[M].Germany:Springer Science and Business Media,2008. 10 UPADHYAYR K, KUMARIS, MISRAA K. Modeling the virus dynamics in computer network with SVEIR model and nonlinear incident rate [J]. Journal of Applied Mathematics and Computing, 2017, 54(1/2):485-509.DOI:10.1007/s12190-016-1020-0 11 XIAOX, FUP, DOUC S, et al. Design and analysis of SEIQR worm propagation model in mobile internet [J]. Communications in Nonlinear Science and Numerical Simulation, 2017, 43:341-350.DOI:10.1016/j.cnsns.2016.07.012 12 KHANHN H. Dynamics of a worm propagation model with quarantine in wireless sensor networks [J]. Applied Mathematics and Information Sciences, 2016, 10(5):1739-1746.DOI:10.18576/amis/100513 13 MISHRAB K, JHA N. SEIQRS model for the transmission of malicious objects in computer network [J]. Applied Mathematical Modelling, 2010, 34(3):710-715.DOI:10.1016/j.apm.2009.06.011 14 ZIA T A, ZOMAYAA Y. A lightweight security framework for wireless sensor networks [J]. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 2011, 2(3):53-73.DOI:10.1109/ICC.2014.6883886 15 ZOUC C, GONGW, TOWSLEYD. Worm propagation modeling and analysis under dynamic quarantine defense [C]//2003 Proceedings of the ACM CCS Workshop on Rapid Malcode. Washington DC:ACM, 2003:51-60.DOI:10.1145/948187.948197 16 MOORED, SHANNONC, VOELKERG M, et al. Internet quarantine: Requirements for containing self-propagating code [C]//IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies.San Francisco:IEEE, 2003:1901-1910.DOI:10.1109/infcom.2003.1209212 17 CHENT M, JAMILN. Effectiveness of quarantine in worm epidemics [C]//2006 IEEE International Conference on Communications.Istanbul: IEEE, 2006: 2142-2147.DOI:10.1109/icc.2006.255087 18 BAYANIM, ALPIZARY, GAMBOAR, et al. Radio communication range effects on a flat wireless sensor network performance [C]// Central American and Panama Convention.San Jose:IEEE, 2016: 1-10.DOI:10.1109/concapan.2016.7942365 19 FENGL P, LIAOX F, LIH Q, et al. Hopf bifurcation analysis of a delayed viral infection model in computer networks [J]. Mathematical and Computer Modelling, 2012, 56(7/8):167-179.DOI:10.1016/j.mcm.2011.12.010 20 OJHAR P, SANYALG, SRIVASTAVAP K, et al. Design and analysis of modified SIQRS model for performance study of wireless sensor network [J]. Scalable Computing,2017, 18(3):229-241.DOI:10.12694/scpe.v18i3.1303 21 KADDARA. Stability analysis in a delayed SIR epidemic model with saturated incidence rate [J]. Nonlinear Analysis: Modelling and Control, 2010, 15(3):299-306. 22 WANGF W, HUANGW Y, SHENY L, et al. Analysis of SVEIR worm attack model with saturated incidence and partial immunization [J]. Journal of Communications and Information Networks, 2016, 1(4):105-115.DOI:10.1007/bf03391584 23 ZHANGZ Z, WANGY G, GUERRINIL. Bifurcation analysis of a delayed worm propagation model with saturated incidence [J].Advances in Mathematical Physics,2018, Article ID 7619074.DOI:10.1155/2018/7619074 24 CAPASSOV, SERIOG. A generalization of Kermack-McKendrick deterministic epidemic model [J].Mathematical Bioscience, 1978, 42(1/2):43-61.DOI:10.1016/0025-5564(78)90006-8 25 WEIC, CHENL. A delayed epidemic model with pulse vaccination [J].Discrete Dynamics in Nature and Society,2008, 2008(1):1-12.DOI:10.1155/2008/746951 26 ZHANGZ Z, BID J. Dynamical analysis of a computer virus propagation model with delay and infectivity in latent period [J]. Discrete Dynamics in Nature and Society, 2016(1):Article ID 3067872.DOI:10.1155/2016/3067872 27 RENJ G, XUY H, ZHANGC M. Optical control of a delay-varying computer virus propagation model [J]. Discrete Dynamics in Nature and Society,2013, Article ID 210291.DOI:10.1155/2013/210291 28 ZHUY L, SONGJ J, DONGF Z. Applications of wireless sensor network in the agriculture environment monitoring [J]. Procedia Engineering, 2011, 16:608-614.DOI:10.1016/j.proeng.2011.08.1131 29 VAN D D P, WATMOUGHJ. Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission [J]. Mathematical Biosciences, 2002, 180(1/2):29-48.DOI:10.1016/s0025-5564(02)00108-6 30 HASSARDB D, KAZARINOFFN D, WANY H. Theory and Applications of Hopf Bifurcation[M]. Cambridge:Cambridge University Press,1981.DOI:10.1090/conm/445 31 UPADHYAYR K, AGRAWALR. Dynamics and response of a predator-prey system with competitiveinterference and time delay [J]. Nonlinear Dynamics, 2016, 83(1/2):821-837. DOI:10.1007/s11071-015-2370-0 32 XUC J. Delay-induced oscillations in a competitorcompetitor-mutualist Lotka-Volterra model[J].Complexity, 2017, Article ID: 2578043.DOI:10.1155/2017/2578043 33 BIANCAC, FERRARAM, GUERRINIL. The cai model with time delay:Existence of periodic solutions and asymptotic analysis [J]. Applied Mathematics and Information Science, 2013, 7(1): 21-27. DOI:10.12785/amis/070103 34 GroupHerijavec. 2017 Cybercrime Report[R/OL]. http://cyberseurityventures.com/2015-wp/wp-content/uploads/2017/10/2017-Cybercrime-Report.pdf. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|