[1] | Denning, P. J.: Computers under attack, (1990) |

[2] | P.S. Tippett, The kinetics of computer viruses replication: A theory and preliminary survey, in: Safe Computing: Proceedings of the Fourth Annual Computer Virus and Security Conference, New York, March 1991, pp. 66 – 87. |

[3] | Cohen, F.: A short course of computer viruses, Computer and security 8, 149-160 (1990) |

[4] | Forrest, S.; Hofmayer, S. A.; Somayaj, A.: Computer immunology, Communications of the ACM 40, No. 10, 88-96 (1997) |

[5] | Piqueira, J. R. C.; Navarro, B. F.; Monteiro, L. H. A.: Epidemiological models applied to viruses in computer networks, Journal of computer science 1, No. 1, 31-34 (2005) |

[6] | Kephart, J. O.; Hogg, T.; Huberman, B. A.: Dynamics of computational ecosystems, Physical review A 40, No. 1, 404-421 (1989) |

[7] | Kephart, J. O.; White, S. R.; Chess, D. M.: Computers and epidemiology, IEEE spectrum, 20-26 (1993) |

[8] | J.O. Kephart, G.B. Sorkin, M. Swimmer, An immune system for cyberspace, in: Proceedings of the IEEE International Conference on Systems, Men, and Cybernetics, Orlando, CA, October 1997, pp. 879 – 884. |

[9] | Piqueira, J. R. C.; Cesar, F. B.: Dynamical models for computer viruses propagation, Mathematical problems in engineering (2008) · Zbl 1189.68036 · doi:10.1155/2008/940526 |

[10] | Billings, L.; Spears, W. M.; Schartz, I. B.: A unified prediction of computer virus spread in connected networks, Physics letters A 297, 261-266 (2002) · Zbl 0995.68007 · doi:10.1016/S0375-9601(02)00152-4 |

[11] | Newman, M. E. J.; Forrest, S.; Balthrop, J.: Email networks and the spread of computer viruses, Physical review E 66, 035101-1-035101-4 (2002) |

[12] | Mishra, B. K.; Saini, D.: Mathematical models on computer viruses, Applied mathematics and computation 187, No. 2, 929-936 (2007) · Zbl 1120.68041 · doi:10.1016/j.amc.2006.09.062 |

[13] | Mishra, B. K.; Jha, N.: Fixed period of temporary immunity after run of the anti-malicious software on computer nodes, Applied mathematics and computation 190, 1207-1212 (2007) · Zbl 1117.92052 · doi:10.1016/j.amc.2007.02.004 |

[14] | Draief, M.; Ganesh, A.; Massouili, L.: Thresholds for virus spread on networks, Annals of applied probability 18, No. 2, 359-378 (2008) · Zbl 1137.60051 · doi:10.1214/07-AAP470 |

[15] | Piqueira, J. R. C.; De Vasconcelos, A. A.; Gabriel, C. E. C.J.; Araujo, V. O.: Dynamic models for computer viruses, Computers & security 27, No. 7 – 8, 355-359 (2008) |

[16] | Murray, J. D.: Mathematical biology, (2002) |

[17] | Guckenheimer, J.; Holmes, P.: Nonlinear oscillations, dynamical systems and bifurcation of vector fields, (1983) |

[18] | Ogata, K.: Modern control engineering, (1997) |

[19] | Moler, C. B.: Numerical computing with Matlab, (2004) |