“…The similarity between the spread of a biological virus and malicious worm propagation has encouraged researchers to adopt an epidemic model approach to the network environment [14]. Research in modeling computer viruses and worms implement epidemic models like susceptible-infectedrecovered (SIR) [13,41], susceptible-infected-susceptible (SIS) [14], SEIS [24], susceptible-exposed-infectious-recovered (SEIR) [16,17,23,30,38], SIRS [12,15,19], and susceptible-exposed-infected-quarantined-vaccinated (SEIQV) [20,35], vulnerable-exposed-infectious-secured-vulnerable (VEISV) [32].…”