zbMATH — the first resource for mathematics

Examples
Geometry Search for the term Geometry in any field. Queries are case-independent.
Funct* Wildcard queries are specified by * (e.g. functions, functorial, etc.). Otherwise the search is exact.
"Topological group" Phrases (multi-words) should be set in "straight quotation marks".
au: Bourbaki & ti: Algebra Search for author and title. The and-operator & is default and can be omitted.
Chebyshev | Tschebyscheff The or-operator | allows to search for Chebyshev or Tschebyscheff.
"Quasi* map*" py: 1989 The resulting documents have publication year 1989.
so: Eur* J* Mat* Soc* cc: 14 Search for publications in a particular source with a Mathematics Subject Classification code (cc) in 14.
"Partial diff* eq*" ! elliptic The not-operator ! eliminates all results containing the word elliptic.
dt: b & au: Hilbert The document type is set to books; alternatively: j for journal articles, a for book articles.
py: 2000-2015 cc: (94A | 11T) Number ranges are accepted. Terms can be grouped within (parentheses).
la: chinese Find documents in a given language. ISO 639-1 language codes can also be used.

Operators
a & b logic and
a | b logic or
!ab logic not
abc* right wildcard
"ab c" phrase
(ab c) parentheses
Fields
any anywhere an internal document identifier
au author, editor ai internal author identifier
ti title la language
so source ab review, abstract
py publication year rv reviewer
cc MSC code ut uncontrolled term
dt document type (j: journal article; b: book; a: book article)
Influence of removable devices on computer worms: dynamic analysis and control strategies. (English) Zbl 1219.37065
Summary: Worms spreading via both Web-based scanning and removable devices account for a major part of threats on internet. However, their dynamical behavior and controlling methods remain unclear. As a result, we present a computer worm model incorporating specific features unique to those worms, in this paper. The threshold value R 0 determining whether the worms die out is obtained. Theoretical analysis shows that if R 0 <1 the disease-free equilibrium is globally asymptotically stable; otherwise, the disease will be prevalent. Additionally, some control strategies are given. Our results are illustrated by numerical simulations.
MSC:
37N35Dynamical systems in control
68M11Internet topics
34D23Global stability of ODE
94A13Detection theory
References:
[1]Security spotlight: understanding USB malware, 2010 [Online]. Available: http://us.trendmicro.com/imperia/md/content/us/trendwatch/researchandanalysis/56understandingusbmalwareapril192010.pdf.
[2]Dan Raywood, Greater manchester police hit by conficker from infected USB that leaves it unconnected from its network for three days, SC Magazine February 2, 2010.
[3]National computer virus emergency response center: report, 2009 (in Chinese) [Online]. Available:http://www.antivirus-china.org.cn/head/diaocha2009/report2009.doc.
[4]Billings, L.; Spears, W. M.; Schwartz, I. B.: A unified prediction of computer virus spread in connected networks, Physics letters A 297, 261-266 (2002) · Zbl 0995.68007 · doi:10.1016/S0375-9601(02)00152-4
[5]Wierman, J. C.; Marchette, D. J.: Modeling computer virus prevalence with a susceptible–infected–susceptible model with reintroduction, Computational statistics and data analysis 45, 3-23 (2004)
[6]Mishra, B. K.; Saini, D.: Mathematical models on computer viruses, Applied mathematics and computation 187, 929-936 (2007) · Zbl 1120.68041 · doi:10.1016/j.amc.2006.09.062
[7]Piqueira, J.; Vasconcelos, A.; Gabriel, C.; Araujo, V.: Dynamic models for computer viruses, Computers and security 27, 355-359 (2008)
[8]Newman, M. E. J.; Forrest, S.; Balthrop, J.: Email networks and the spread of computer viruses, Physical review E 66 (2002)
[9]Tanachaiwiwat, P.; Helmy, A.: Encounter-based worms: analysis and defense, Ad hoc networks 7, 1414-1430 (2009)
[10]Song, L. P.; Jin, Z.; Sun, G. Q.: Modeling and analyzing of botnet interactions, Physica A 390, 347-358 (2011)
[11]Lewis, M.; Renclawowicz, J.; Den Driessche, P. Van: Traveling waves and spread rates for a west nile virus model, Bulletin of mathematical biology 68, 3-23 (2006)
[12]Markus, L.: Asymptotically autonomous differential systems, Annals of mathematics studies 36, 17-29 (1956) · Zbl 0075.27002
[13]Thieme, H. R.: Asymptotically autonomous differential equations in the plane, Journal of mathematics 24, 351-380 (1994) · Zbl 0811.34036 · doi:10.1216/rmjm/1181072470
[14]Anderson, R. M.; May, R. M.: Infectious diseases in humans: dynamics and control, (1991)
[15]Barbashin, E. A.: Introduction to the theory of stability, (1970) · Zbl 0198.19703
[16]La Salle, J.; Lefschetz, S.: Stability by liapunovs direct method, (1961) · Zbl 0098.06102
[17]Science and technology daily 2010 (in Chinese) [Online]. Available: http://www.stdaily.com/kjrb/content/2010-08/18/content220190.htm.