2022
DOI: 10.1016/j.sciaf.2022.e01125
|View full text |Cite
|
Sign up to set email alerts
|

HOPF- bifurcation analysis of delayed computer virus model with holling type iii incidence function and treatment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…The detection policy mainly detects external dangers and guards against foreign intrusion. And the recovery policy can repair high-level independent security functions [9].…”
Section: Optimized Technology Modelmentioning
confidence: 99%
“…The detection policy mainly detects external dangers and guards against foreign intrusion. And the recovery policy can repair high-level independent security functions [9].…”
Section: Optimized Technology Modelmentioning
confidence: 99%
“…We adopt the saturation incidence rate [22,23], which can present the inhibition effect of susceptible devices and the crowding effect of infectious devices and can also ensure the boundness of contact rate by choosing suitable parameters [24]. In addition, considering the latent character of computer worms, the exposed compartments of computer and USB are introduced [25][26][27][28]. The rest of the article is organized as follows: in Section 2, qualitative analysis of the dynamical system is carried out, and sufficient conditions for the existence of equilibria and asymptotic stability are given; numerical findings and discussion are conducted in Section 3; in Section 4, optimal control strategy is proposed; and conclusion is presented in Section 5. numbers of susceptible computers, exposed computers, infectious computers and recovered computers at time t. And similarly for USB devices population, which is classified into three vector population subclasses, namely S u (t), E u (t), and I u (t), represent the numbers of susceptible USB devices, exposed USB devices and infectious USB devices at time t, respectively.…”
Section: Introductionmentioning
confidence: 99%