References
Li A S, Li X C, Pan Y C, et al. Strategies for network security. Sci China Inf Sci, 2015, 58: 012107
Balthrop J, Forrest S, Newman M E J, et al. Technological networks and the spread of computer viruses. Science, 2004, 304: 527–529
Mieghem P V, Omic J, Kooij R. Virus spread in networks. IEEE/ACM Trans Netw, 2009, 17: 1–14
Zhang Z Z, Wang Y G. SVEIRS epidemic model with delays and partial immunization for internet worms. J Appl Math Comput, 2018, 57: 333–358
Zhang Z Z, Wang Y G, Bi D J, et al. Stability and hopf bifurcation analysis for a computer virus propagation model with two delays and vaccination. Discrete Dyn Nat Soc, 2017, 2017: 1–17
Szor P. The Art of Computer Virus Research and Defense. Boston: Addison-Wesley Professional, 2005
Acknowledgements
This work was supported by National Science Foundation of China (Grants Nos. 61473061, 61104104), and Program for New Century Excellent Talents in University (Grant No. NCET-13-0091).
Author information
Authors and Affiliations
Corresponding author
Electronic supplementary material
Rights and permissions
About this article
Cite this article
Yu, Y., Hu, J. & Zeng, Y. On computer virus spreading using node-based model with time-delayed intervention strategies. Sci. China Inf. Sci. 62, 59201 (2019). https://doi.org/10.1007/s11432-018-9675-1
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-018-9675-1