zbMATH — the first resource for mathematics

Examples
Geometry Search for the term Geometry in any field. Queries are case-independent.
Funct* Wildcard queries are specified by * (e.g. functions, functorial, etc.). Otherwise the search is exact.
"Topological group" Phrases (multi-words) should be set in "straight quotation marks".
au: Bourbaki & ti: Algebra Search for author and title. The and-operator & is default and can be omitted.
Chebyshev | Tschebyscheff The or-operator | allows to search for Chebyshev or Tschebyscheff.
"Quasi* map*" py: 1989 The resulting documents have publication year 1989.
so: Eur* J* Mat* Soc* cc: 14 Search for publications in a particular source with a Mathematics Subject Classification code (cc) in 14.
"Partial diff* eq*" ! elliptic The not-operator ! eliminates all results containing the word elliptic.
dt: b & au: Hilbert The document type is set to books; alternatively: j for journal articles, a for book articles.
py: 2000-2015 cc: (94A | 11T) Number ranges are accepted. Terms can be grouped within (parentheses).
la: chinese Find documents in a given language. ISO 639-1 language codes can also be used.

Operators
a & b logic and
a | b logic or
!ab logic not
abc* right wildcard
"ab c" phrase
(ab c) parentheses
Fields
any anywhere an internal document identifier
au author, editor ai internal author identifier
ti title la language
so source ab review, abstract
py publication year rv reviewer
cc MSC code ut uncontrolled term
dt document type (j: journal article; b: book; a: book article)
A modified epidemiological model for computer viruses. (English) Zbl 1185.68133
Summary: Since the computer viruses pose a serious problem to individual and corporative computer systems, a lot of effort has been dedicated to study how to avoid their deleterious actions, trying to create anti-virus programs acting as vaccines in personal computers or in strategic network nodes. Another way to combat viruses propagation is to establish preventive policies based on the whole operation of a system that can be modeled with population models, similar to those that are used in epidemiological studies. Here, a modified version of the SIR (Susceptible-Infected-Removed) model is presented and how its parameters are related to network characteristics is explained. Then, disease-free and endemic equilibrium points are calculated, stability and bifurcation conditions are derived and some numerical simulations are shown. The relations among the model parameters in the several bifurcation conditions allow a network design minimizing viruses risks.
MSC:
68M99Computer system organization
68N99Software
92D30Epidemiology
References:
[1]Denning, P. J.: Computers under attack, (1990)
[2]P.S. Tippett, The kinetics of computer viruses replication: A theory and preliminary survey, in: Safe Computing: Proceedings of the Fourth Annual Computer Virus and Security Conference, New York, March 1991, pp. 66 – 87.
[3]Cohen, F.: A short course of computer viruses, Computer and security 8, 149-160 (1990)
[4]Forrest, S.; Hofmayer, S. A.; Somayaj, A.: Computer immunology, Communications of the ACM 40, No. 10, 88-96 (1997)
[5]Piqueira, J. R. C.; Navarro, B. F.; Monteiro, L. H. A.: Epidemiological models applied to viruses in computer networks, Journal of computer science 1, No. 1, 31-34 (2005)
[6]Kephart, J. O.; Hogg, T.; Huberman, B. A.: Dynamics of computational ecosystems, Physical review A 40, No. 1, 404-421 (1989)
[7]Kephart, J. O.; White, S. R.; Chess, D. M.: Computers and epidemiology, IEEE spectrum, 20-26 (1993)
[8]J.O. Kephart, G.B. Sorkin, M. Swimmer, An immune system for cyberspace, in: Proceedings of the IEEE International Conference on Systems, Men, and Cybernetics, Orlando, CA, October 1997, pp. 879 – 884.
[9]Piqueira, J. R. C.; Cesar, F. B.: Dynamical models for computer viruses propagation, Mathematical problems in engineering (2008) · Zbl 1189.68036 · doi:10.1155/2008/940526
[10]Billings, L.; Spears, W. M.; Schartz, I. B.: A unified prediction of computer virus spread in connected networks, Physics letters A 297, 261-266 (2002) · Zbl 0995.68007 · doi:10.1016/S0375-9601(02)00152-4
[11]Newman, M. E. J.; Forrest, S.; Balthrop, J.: Email networks and the spread of computer viruses, Physical review E 66, 035101-1-035101-4 (2002)
[12]Mishra, B. K.; Saini, D.: Mathematical models on computer viruses, Applied mathematics and computation 187, No. 2, 929-936 (2007) · Zbl 1120.68041 · doi:10.1016/j.amc.2006.09.062
[13]Mishra, B. K.; Jha, N.: Fixed period of temporary immunity after run of the anti-malicious software on computer nodes, Applied mathematics and computation 190, 1207-1212 (2007) · Zbl 1117.92052 · doi:10.1016/j.amc.2007.02.004
[14]Draief, M.; Ganesh, A.; Massouili, L.: Thresholds for virus spread on networks, Annals of applied probability 18, No. 2, 359-378 (2008) · Zbl 1137.60051 · doi:10.1214/07-AAP470
[15]Piqueira, J. R. C.; De Vasconcelos, A. A.; Gabriel, C. E. C.J.; Araujo, V. O.: Dynamic models for computer viruses, Computers & security 27, No. 7 – 8, 355-359 (2008)
[16]Murray, J. D.: Mathematical biology, (2002)
[17]Guckenheimer, J.; Holmes, P.: Nonlinear oscillations, dynamical systems and bifurcation of vector fields, (1983)
[18]Ogata, K.: Modern control engineering, (1997)
[19]Moler, C. B.: Numerical computing with Matlab, (2004)