期刊文献+

一类时滞SIQRS网络病毒传播模型的稳定性和Hopf分支 被引量:5

Stability and Hopf Bifurcation of a Delayed SIQRS Model for Computer Virus Propagation
在线阅读 下载PDF
导出
摘要 考虑到网络中的计算机对网络病毒的临时免疫期,基于SIQR网络病毒传播模型提出了具有临时免疫期时滞的SIQRS网络病毒传播模型.利用特征方程方法,得到了模型有病毒平衡点局部渐近稳定和产生Hopf分支的充分条件.并给出一个仿真示例,对理论分析结果的正确性进行了验证. Considering the temporary immunity period of the recovered computers in the Internet ,a delayed SIQRS model is proposed based on the SIQR computer virus propagation model .Sufficient condi-tions for the locally asymptotical stability and existence of Hopf bifurcation are obtained by the characteris-tic equation method .A simulation example is given to test the theoretical results .
出处 《菏泽学院学报》 2015年第5期31-35,共5页 Journal of Heze University
基金 安徽财经大学2015年度大学生科研创新基金项目(XSKY1529) 安徽省高等学校省级自然科学研究项目(KJ2014A005)
关键词 时滞 HOPF分支 SIQRS模型 稳定性 time delay Hopf bifurcation SIQRS model stability
  • 相关文献

参考文献7

  • 1Piqueira J. tL C, Araujo V. O. A modified epidemiological model for computer viruses [J]. Applied Mathematics and Computation, 2009,213(2) : 355-360.
  • 2肖丽,包骏杰,冯丽萍.一种新的计算机病毒模型的稳定性分析[J].湘潭大学自然科学学报,2012,34(2):94-96. 被引量:12
  • 3叶晓梦,杨小帆.基于两阶段免疫接种的SIRS计算机病毒传播模型[J].计算机应用,2013,33(3):739-742. 被引量:19
  • 4Peng M, He X, Huang J. J, Dong T. Modelling computer virus and its dynamics [J]. Mathematical Problems in Engineer- ing, vol. 2013, Article ID 842614, 5 pages.
  • 5杨斌.具有时滞的SIQR计算机病毒模型分析[J].重庆工商大学学报(自然科学版),2013,30(9):70-73. 被引量:5
  • 6Li X. L, Wei J. J. On the zeros of a fourth degree exponential polynomial with applications to a neural network model with delays [J]. Chaos, Solitons and Fractals, 2005, 26(2).519-526.
  • 7Hassard 13. D, Kazarinoff N. D, Wan Y. H. Theory and Applications of Hopf Bifurcation [M]. Cambridge University Press, Cambridge (1981).

二级参考文献17

  • 1张海峰,傅新楚.含有免疫作用的SIR传染病模型在复杂网络上的动力学行为[J].上海大学学报(自然科学版),2007,13(2):189-192. 被引量:21
  • 2GOLDBERG L A, GOLDBERG P W, PHILLIPS C A, et al. Constructing computer virus phylogenies[J]. J Algorithms,1998,26: 188-208.
  • 3ZOU C C, GONG W B,TOWSLEY D,et al. Code red worm propagation modeling and analysis[C]//CCS:02. 2002:18-22.
  • 4DATTA S, WANG H. The effectiveness of vaccinations on the spread of email-borne computer viruses[C]//IEEE CCECE/CCGEI. Saskatoon.. 2005: 219-223.
  • 5KEPHART J ,WHITE S. Directed-graph epidemiological models of computer viruses[C]//1991 IEEE Symposium on Security and Privacy. 1991 :343-359.
  • 6KEPHART J , WHITE S. Directed-graph epidemiologieai models of computer viruses[C]//1991 IEEE Symposium on Security and Privacy. 1991:343-359.
  • 7KEPHART J O, WHITE S R. Measuring and modeling computer virus prevalence[C]//IEEE Computer Security Symposium on Research in Security and Privacy. IEEE, 1993:2-15.
  • 8ZOU C C, TOWSLEY D, GONG W B. On the performance of Internet worm scanning strategies[J]. Performance Evaluation, 2006,63: 700-723.
  • 9BLYUSS K B, KYRYCHKO Y N. Stability and bifurcations in an epidemic model with varying immunity period[J]. Bulletin of Mathematical Biology, 2010,72 : 490- 505.
  • 10I KEPHART J O, WHITE S R. Directed graph epidemiological model of computer viruses [ C ] / / Proceedings of the 1991 IEEE Symposium on Security and Privacy. Washington DC: IEEE Computer Society, 1991:343 - 359.

共引文献29

同被引文献27

引证文献5

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部