Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 35 publications
references
References 38 publications
0
21
0
Order By: Relevance
“…Hence, our model should be generalized so that different nodes have different infection rates, different bursting rates, and different curing rates. Additionally, that computers are likely to be infected by removable storage media [39] may lead to the emergence of a non-trivial steady state. In this situation, it makes sense to suppress the fraction of the infected nodes.…”
Section: Conclusion and Remarksmentioning
confidence: 99%
“…Hence, our model should be generalized so that different nodes have different infection rates, different bursting rates, and different curing rates. Additionally, that computers are likely to be infected by removable storage media [39] may lead to the emergence of a non-trivial steady state. In this situation, it makes sense to suppress the fraction of the infected nodes.…”
Section: Conclusion and Remarksmentioning
confidence: 99%
“…Recently, Yang et al [15] suggested the so-called SLBS model to capture the fact that, unlike exposed patients, computers with latent viral replicates inherently possess infectivity. Later, multifarious variations and generalizations of the original SLBS model have been presented in the literature, which can be roughly categorized into two classes: models with no external infections [16][17][18][19][20] and models with external infections [21,22].…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, the development of appropriate models to understand the mechanisms governing the spread of computer viruses is becoming of importance. Currently, a lot of computer virus propagation models such as SIR model [13], SLB model [45], SEIQV model [6] as well as their extensions [717], have been proposed. These models have mainly been built upon classical epidemic models [1828] and investigated the behavior of computer virus spread over computer networks by the analogy between computer and biological viruses [29].…”
Section: Introductionmentioning
confidence: 99%