2021
DOI: 10.1155/2021/6694098
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the Effect of External Computers and Removable Devices on a Computer Network with Heterogeneous Immunity

Abstract: This paper intends to investigate the impact of external computers and removable devices on virus spread in a network with heterogeneous immunity. For that purpose, a new dynamical model is presented and discussed. Theoretical analysis reveals the existence of a unique viral equilibrium that is locally and globally asymptotically stable with no criteria. This result implies that efforts to eliminate viruses are not possible. Therefore, sensitivity analysis is performed to have more insight into parameters’ imp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 24 publications
0
6
0
Order By: Relevance
“…A method was proposed in [4] of targeted immunization based on self-similarity. It has been shown experimentally that immunization based on the self-similarity method is the most effective in comparison with other types of immunization.…”
Section: Backroundmentioning
confidence: 99%
See 1 more Smart Citation
“…A method was proposed in [4] of targeted immunization based on self-similarity. It has been shown experimentally that immunization based on the self-similarity method is the most effective in comparison with other types of immunization.…”
Section: Backroundmentioning
confidence: 99%
“…A lack of redundancy and the interchangeability of nodes, determined by the inability to stop the system or the violation of permanent data transmission systems. 4.…”
mentioning
confidence: 99%
“…In a networked system, whenever the computers are contaminated with viruses, the regular resident applications may lose the ability to function properly, corrupt saved les, or cause the loss of essential data on those machines. Subsequently, through the infected computers, the virus infection is transmitted to other computers through several means, which include able storage media (CD, USB, and ash drives) and e-mail attachments [6].…”
Section: Introductionmentioning
confidence: 99%
“…Mathematical models have been developed to grasp the spread of malicious programs fully. ese models are based on intriguing parallels between virtual viruses and their biological counterparts; wherein numerous phenomena are represented [2,6,7].…”
Section: Introductionmentioning
confidence: 99%
“…Obviously, the infection rate of D nodes is less than S nodes. Besides, in [19,20], the author proposed S and W compartments similar to S and D compartments in this article, where the conversion rate of the two is a constant. However, we noticed that the change in user awareness is related to the number of infections.…”
Section: Introductionmentioning
confidence: 99%