999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Stochastic Numerical Analysis for Computer Virus Model with Vertical Transmission Over the Internet

2019-12-19 07:15:48MuhammadShoaibArifAliRazaWasfiShatanawiMuhammadRafiqandMairajBibi
Computers Materials&Continua 2019年12期

Muhammad Shoaib Arif,Ali Raza,Wasfi Shatanawi ,Muhammad Rafiq and Mairaj Bibi

Abstract: We are presenting the numerical analysis for stochastic SLBR model of computer virus over the internet in this manuscript.We are going to present the results of stochastic and deterministic computer virus model.Outcomes of the threshold number C? hold in stochastic computer virus model.If C?<1 then in such a condition virus controlled in the computer population while C?>1 shows virus spread in the computer population.Unfortunately,stochastic numerical techniques fail to cope with large step sizes of time.The suggested structure of the stochastic non-standard finite difference scheme (SNSFD) maintains all diverse characteristics such as dynamical consistency,bounded-ness and positivity as well-defined by Mickens.On this basis,we can suggest a collection of plans for eradicating viruses spreading across the internet effectively.

Keywords: Computer virus model,stochastic modelling,stochastic techniques,stability.

1 Literature survey

A computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user.Virus stands for vital information resources under siege.A computer virus has two features as the potential to duplicate itself and the potential to affix itself to an alternative computer folder.They spread via disks,network or services such as email.Earlier viruses were propagated by computer programs or by hiding in floppy disks.Modern viruses transmit in a subtler way such as phishing which is a fraudulent practise of sending emails inquiring personal information [Patil and Jadhav 2014)].A virus-infected computer shows various symptoms.A small number of signs that may inform that a computer has the virus are slow response time,random hard drive crashes and great pop-up ads.A carefully engineered computer virus can disrupt production and cause billions of dollars in damages.For example,the con-flicker,also known as down up virus,which was discovered in 2008,had infected millions of computers across the world.The estimated damage was over $9.1 billion [Zhu,Yang and Ren (2012)].Viruses have evolved over a period.Their numbers are increasing each day,and they are becoming more sophisticated and harmful.Each new virus assimilates new features along with the old ones,thus making it more difficult to detect and erase [Albazzaz and Almuhanna (2016)].The computers that we usually use do not have adequate built-in security measures as compared to larger systems,thus leaving it to the users to purchase,install and utilise anti-virus software.Among significant types of computer viruses,the first type is called the boot sector virus.The boot sector is that first portion of our hard disk where routines to load our operating system reside.If these routines are disturbed or modified,our computer will not be able to work.As the name suggests,the boot sector virus modifies the boot sector program and is loaded in the memory whenever the computer is turned on.The virus is attached with the system executable files for example exe,.com etc.Chernobyl virus detects all the Microsoft office files and corrupts them.It also deletes the logical partition information of the disks.Users cannot access their files from the drives because of this virus.Logic bomb virus occurs only when a particular condition is met.The condition could be any date or any completion of the process (time).After the condition is met,the virus is invoked.This virus can be discovered by chance.Trojan horse virus is embedded in the computer programs.When we run these programs,this virus is activated.Its primary purpose is destruction.The Redlof virus is a polymorphic virus,which is written in VB Script (language).When instructions are being written,this virus is embedded in the programs.It corrupts the folder data file,which is the part of windows active desktop.An ideal structure of a computer virus holds three subroutines.The task of first sub-routine known as infect-executable,is to find executable files and infect them by copying its code into them.Next sub-routine,namely do-damage also called the virus payload,is a code which delivers the malicious part of the virus.The final sub-routine trigger-pulled inspects if the required conditions are met in order to deliver its payload [Patil and Jadhav (2014)].Much work has been done on the concept of computer viruses such as new techniques for virus detection and its prevention.New researches help us to understand how sophisticated viruses work.To inspect computer viruses,the compartment modelling technique of risky viruses was proposed by Cohen et al.[Cohen (1987);Murray (1988)].In last decade of the twentieth century,the authors were the first ones to typical the spreading behaviour of the computer virus.This paved the way for developing mathematical models for computer virus propagation [Billings,Spears and Schwartz (2002);Han and Tan (2010);Mishra and Jha (2007);Piqueira and Araujo (2009);Piqueira,Vasconcelos,Gabriel et al.(2008);Ren,Yang,Yang et al.(2012);Ren,Yang,Zhu et al.(2012);Wierman and Marchette (2004);Yuan and Chen (2008)].Just like any biological virus,the computer virus also contains a dormant period.During this period a single computer is vulnerable to a computer virus but is not infectious yet.An exposed computer,which is infected in dormancy,will not transmit the virus to other computers quickly;but it still can be infected.The delay used in some models of computer virus is also based on these characteristics.It shows that although the exposed computer does not infect other computers,it still has infectivity [Han and Tan (2010);Zhu,Yang and Ren (2012)].The authors proposed SLB and SLBS models in which they observed that the computer has latency,[Yang,Yang,Zhu et al.(2013);Yang,Yang,Wen et al.(2012)] and in this period of latency it also has infectivity.Multilayer networks can be responsible for spreading computer viruses.Examples of computer virus include mobile phone virus,which can use 3G,4G,Wi-Fi,or Bluetooth as a tool to communicate with other networks.Founded on the notion of the multilayer network,the IBMF (Individual-Based Mean Field) was applied to the SLBS model by Zhang [Zhang (2018)].A model was developed to expect the activities of worm on the network.A time-delayed SIQVD worm propagation model with variable infection rate was framed.This model can be utilized for internet worms [Yao,Fu,Yang et al.(2018)].Research has been conducted on the susceptible,latent,breaking-out,quarantine and susceptible (SLBQRS) computer virus model.Three finite-difference patterns have been used to solve the warm virus's system [Fatima,Ali,Ahmed et al.(2018)].HAM (Homotopy Analysis Method) has been utilized to solve the modified nonlinear SIR epidemiological model of computer viruses [Noeiaghdam,Suleman and Budak (2018)].The propagation mechanism of computer viruses is explored by the nodebased models.To examine the dynamic behaviour of a computer virus a model named SLIS which is node-based has also been proposed which demonstrated that the virus-free equilibrium is asymptotically or exponentially stable [Yu,Hu and Zeng (2019)].However,the influence of installing anti-virus software and the period of inactivity was not taken into account.The interaction frequency of afresh entered computers on the internet from vulnerable status to unprotected status is the same as that of vulnerable status entering into infected status.This tabloid works on the stochastic model of a computer virus,namely SLBRS model.It describes the vulnerability of uninfected computers and how they can get infected from the internet.We suppose that computers which join the internet are categorized into four classes.A threshold factor C?is used to determine the dynamic characteristics of the suggested model.

Mathematical modelling has become very advanced to understand the viruses thoroughly.Formation of models and simulation allows us to analyze the sensitivity and make a comparison of conclusive opinions originating out of examples.Lots of studies are present on computer virus transmission dynamics models.Nonlinear initial value problems (IVPs) do not always,provide analytical solutions to specific issues and classical explicit finite-difference schemes such as Runge-Kutta,and Euler methods can bring confusion and unexpected fluctuations for discretization parameters [Mickens (1994,2005].Many types of research have been done on various computer virus models [Cai and Li (2010);Peng,He,Huang et al.(2013)].Stochastic differential equation models play an essential role in many branches of applied sciences such as industries,including population dynamics,finance,mechanics,medicine and biology as they provide an extra degree of realism compared to their deterministic counterpart [Bayram,Partal and Buyukoz (2018)].The usual quantitative explicit techniques for ODEs never maintain dynamical possessions as we have seen in the deterministic modelling.We have also seen that in explicit stochastic techniques do not maintain the dynamical possessions in the stochastic case.So,from this a question arises and need to research more:Could we develop the random emphatical scheme which maintains all the dynamical possessions? A rule introduced in the deterministic case,which has been used to start the notion stochastic nonstandard finite difference technique (SNSFD).These regulations were given by Mickens.This is the primary point of this paper.

This paper is divided into the following sections:

In Section 2,we have explained the deterministic computer model and its equilibria.Next section is about the formulation of the stochastic computer model.Section 4 explains the stochastic numerical techniques for stochastic computer virus model and their convergence analysis.Section 5 deals with the comparison of deterministic and stochastic numerical outcomes.Finally,in the last section,we shall present our deduction and give the future work.

2 Deterministic computer virus model

Here,we observe the deterministic computer virus model presented by Yang et al.[Yang,Zhang,Li et al.(2012)].Consider at any non-specific time t,the defined variables are S (exemplifies uninfected computers' fraction),L (exemplifies infected computers' fraction in latency),B (exemplifies infected computers' fraction which is broke-out) and R (exemplifies recovered computers' fraction with short-term immunity).The communication dynamics of computer virus model is illustrated below.

Figure 1:Flow map of computer virus model

The variables of the model are illustrated as μ (depicts the connected and withdrawn computer rate from the internet),β (pronounces the bilinear incidence rate of virus-free computers with infected computers),ε (pronounces the latent computers break out rate),r (pronounces the breaking out computers recovery rate) and α (pronounces the recovered computer rate that become virus-free).

The governing equations of the computer virus model as follows:

with conditions S ≥0,L ≥0,B ≥0,R ≥0

The reduced form of computer virus model is

with conditions S ≥0,L ≥0,B ≥0 and S+L+B ≤1.

2.1 Equilibria of the computer virus model

Given below are two ways of equilibrium points of computer virus model (3) as:

Virus-free equilibrium is V1=(S,L,B)=(1,0,,0)

Virus existence equilibrium is

C?=C?is the computer virus transmission generation number of model (3).It has an important part in virus dynamics.

3 Stochastic computer virus model

Let C(t)=[S,L,B]Tformulates the SDEs of computer virus model (3).We will determine the expectations Ε?[?C] and Ε?[?C?CT].In order to find them the likely changes and their related transition probabilities are as follows (see Tab.1).

Table 1:Changes that may occur in the computer virus model

Following is the expectation of computer virus model (3):

The variance of the computer virus model is defined as Var= Ε?[?C?CT]=

where

W11=μ(1-S)+βS(L+B)+α(1-S-L-B),W12=-βS(L+B),W13=0,W21=-βS(L+B),W22=βS(L+B)+(ε+μ)L,W23=-εL,.W31=0,W32=-εL,W33=εL+(γ+μ)B.

The SDE satisfy the diffusion processes,therefore,

Here,we have C(0)=Co=[0.2,0.7,0.1]T,0 ≤t ≤C as initial conditions and B as Brownian motion.

3.1 Euler maruyama technique

We used the parameters given by Yang et al.[Yang,Zhang,Li et al.(2012)] and euler maruyama technique presented in Maruyama [Maruyama (1955)],to analyze the numerical outcome of SDE (4).

The euler maruyama technique of (4) as:

where ?t and ?Bnis normally distributed between stochastic drift and stochastic diffusion,i.e.,?Bn~N(0,1).The confidence interval holds the solution to stochastic differential equations for both equilibria as presented in the above numerical investigations.The outcome of deterministic computer virus model for the virus-free symmetry V1?=(1,0,0) and C?=0.0300 <1 may control the virus in the computer population through the internet.The viral equilibrium Ε1?=(0.4353,0.5625,0.001607) and C?=2.2974 >1 shows that the virus rapidly infects to the computer population through the internet.

4 Parametric perturbation of stochastic computer virus model

In this technique,we shall choose parameters from the system (3) and change into the random parameters with small noise as βdt=βdt+σdB.So,the stochastic system (3) is as follows [Allen,Allen,Arciniega et al.(2008)].

with initial conditions C(0)=[S(0),L(0),B(0)]T=[0.2,0.7,0.1]Twhere σ is casualness of each compartment of the computer virus model.

4.1 Equilibria of stochastic computer virus model

Two equilibria of the stochastic computer virus model (6) are as follows:

Virus-free equilibrium=(VFE)=(S,L,B)=(1,0,0).

Virus existence equilibrium= (VEE)=(So,Lo,Bo)

where,

4.2 Stochastic euler technique

The designed form of the model (6) as presented in Raza et al.[Raza,Arif and Rafiq (2019)]:

where “h” is represented as the discretized parameter of the method and i.e.,?Bn~N(0,1).

4.3 Stochastic runge-kutta technique

The designed form of the model (6) as presented in Raza et al.[Raza,Arif and Rafiq (2019)]:

First Stage

Α1=h[μ(1-Sn)-βSn(Ln+Bn)+α(1-Sn-Ln-Bn)-σSn(Ln+Bn)?Bn]

B1=h[βSn(Ln+Bn)-(?+μ)Ln+σSn(Ln+Bn)?Bn]

C1=h[?Ln-(γ+μ)Bn]

Second Stage

Third Stage

Fourth Stage

Final Stage

where “h” is represented as the discretized parameter of the method and i.e.,?Bn~N(0,1).

4.4 Stochastic NSFD technique

The recommended frameworks of SNSFD for the model (6) as presented in Raza et al.[Raza,Arif and Rafiq (2019)]:

where “h” is represented as the discretized parameter of the method and i.e.,?Bn~N(0,1).

4.4.1Convergence analysis

Here we are to discuss the following theorems:

Theorem 1

For any given initial value (Sn(0),Ln(0),Bn(0)) ∈ R+3system (9) has a unique nonnegative solution (Sn,Ln,Bn) ∈ R+3on n ≥ 0,almost surely.

Theorem2

For all n ≥0 is a non-negative invariant set for the system (9).

Proof:Rewriting the system (9) as follows:

Adding the corresponding sides,we have

almost surely.

Theorem 3

The discrete dynamical system (9) has the same equilibria as that of the continuous dynamical system (6) for all n ≥0.

Proof:For solving the system (9),we get two states as follows:

VFE i.e.,V3=(Sn,Ln,Bn)=(1,0,0).

VPE i.e.,Ε3=(Sn,Ln,Bn).

where,

almost surely.

Theorem 4

The eigenvalues of the discrete dynamical system (9) lie in the unit circle for all n ≥0.

Proof:

We consider F,G,and H from the system (9) as follows:

Now we want to linearize the model about the equilibria of the model for virus-free equilibrium V1=(S,L,B)=(1,0,0) and C?<1.

The given Jacobean is

The eigenvalues are

This is guaranteed to the fact that all eigenvalues of the Jacobean lie in the unit circle.So,the system (9) is LAS around V1.

4.5 Numerical trials

By using the values of parameters given in Yang et al.[Yang,Zhang,Li et al.(2012)],the numerical simulation is:

Table 2:Parameter values

M 0.5 0.5 σ 0.05 Estimated

4.5.1 Euler maruyama technique

The simulation for the system (5) is as follows:

Figure 2:(a) Uninfected computers fraction for VFP at h=0.1 (b) Uninfected computers fraction for VFP at h=2 (c) Infected computers attached with network fraction for VP at h=0.1 (d) Infected computers attached with network fraction for VP at h=2

4.5.2 Stochastic euler technique

We pretend the solutions of the model (7) by utilizing Matlab database and parameters values assumed in Yang et al.[Yang,Zhang,Li et al.(2012)] (see Tab.2)

Figure 3:(a) Uninfected computers fraction for VFP at h=0.1 (b) Uninfected computers fraction for VFP at h=3 (c) Infected computers attached with network fraction for VP at h=0.1 (f) Infected computers attached with network fraction for VP at h=3

4.5.3 Stochastic runge kutta technique

We pretend the solutions of the model (8) by utilizing Matlab database and parameters values assumed in Yang et al.[Yang,Zhang,Li et al.(2012)] (see Tab.2)

Figure 4:(a) Uninfected computers fraction for VFP at h=0.1 (b) Uninfected computers fraction for VFP at h=4 (c) Infected computers attached with network fraction for VP at h=0.1 (d) Infected computers attached with network fraction for VP at h=4

4.5.4 Stochastic NSFD technique

We pretend the solutions of the model (9) by utilizing Matlab database and parameters values assumed in Yang et al.[Yang,Zhang,Li et al.(2012)] (see Tab.2)

Figure 5:(a) Uninfected computers fraction for VFP at h=0.1 (b) Uninfected computers fraction for VFP at h=100 (c) Infected computers attached with network fraction for VP at h=0.1 (d) Infected computers attached with network fraction for VP at h=100

4.5.5 Comparison section

Comparison of explicit stochastic techniques with proposed SNSFD technique can be observed in this section as follows:

euler mayuyama and its average at h=2 (c) Spreader class with stochastic euler and its average at h=0.1 (d) Spreader class with stochastic euler and its average at h=3 (e) Spreader class with stochastic runge kutta and its average at h=0.1 (f) Spreader class with stochastic runge kutta and its average at h=4

4.5.6 Covariance of sub-populations

The covariance of different sub-populations of computer virus model has been discussed in this section.The outcomes of covariance of sub populations are as follows in Tab.3.

An inverse relationship can be seen between the uninfected class and the other two subpopulations.It shows that the increase in the uninfected class will occur with the decline in other sub-populations and ultimately the system attains virus-free equilibrium.

5 Outcomes and analysis

For discretisation parameter h=0.1,we see that euler maruyama technique meets to equilibria of the model,this can be seen by Fig.2(a) and Fig.2(c).On the other hand,the euler maruyama technique fails to sustain nonnegativity and even divergent,this can be seen by Fig.2(b) and Fig.2(d).For parameter h=0.1,we see that the stochastic euler technique meets to both equilibria,this can be seen by Fig.3(a) and Fig.3(c).On the other hand,for both equilibria the stochastic euler technique fails to maintain nonnegativity and consistency as shown in Fig.3(b) and Fig.3(d).For step size h=0.1,we see that the stochastic runge kutta technique converges to both equilibria,this can be seen graphically by Fig.4(a) and Fig.4(c).

The stochastic runge kutta technique fails to uphold stability and nonnegativity for both equilibrium points when we increase the step size this change happens in Fig.4(b) and Fig.4(d).Thus the aforementioned stochastic techniques do not sanctuary all the dynamical properties [Mickens (1994,2005)].On the other hand,for taking any discretisation parameter the stochastic NSFD technique converges for both equilibria,this can be seen by Fig.5.In Fig.6,we have presented the comparison of stochastic explicit and well-posed SNSFD techniques.

6 Conclusion and future framework

In comparison to deterministic computer virus model,the stochastic computer virus model is a more reliable strategy.The stochastic numerical techniques are detail-oriented and they work well for even minute time step size.They may lose the necessary properties of continuous dynamical system due to divergence on specific values of time step size.The SNSFD for computer virus model is capable of preserving important properties like positivity,dynamical consistency and boundedness.It is also appropriate for any time step size [Mickens (1994,2005)].For our future work,we are aiming to execute SNSFD to sophisticated stochastic delay and Spatio-temporal systems.Additionally,we could utilize the current numerical work in the extension of networking flows and fractional networking flows systems [Singh,Kumar and Baleanu (2019)].In future,we are going to work for the reaction diffusion and fractional-order stochastic computer virus models.

Acknowledgement:We are the greatful to Vice-Chancellor,Air Vice Marshal Faaiz Amir (Retd.),Air University,Islamabad for providing an excellent research environment and facilities.The third author also thanks Prince Sultan University for funding this work through research-group number RG-DES2017-01-17.

Declaration:All author(s) have no competation regarding about publication of this article.

References

Albazzaz,J.M.A.;Almuhanna,N.E.(2016).Avoiding computer viruses and malware threats.International Journal of Advanced Research in Computer and Communication Engineering,vol.5,no.11,pp.288-291.

Allen,E.J.;Allen,L.J.S.;Arciniega,A.;Greenwood,P.E.(2008):Construction of equivalent stochastic differential equation models.Stochastic Analysis and Applications,vol.26,no.2,pp.274-297.

Bayram,M.;Partal,T.;Buyukoz,G.O.(2018):Numerical methods for simulation of stochastic differential equations.Advances in Difference Equations,vol.17,no.5,pp.1466-1476.

Billings,L.;Spears,W.M.;Schwartz,I.B.(2002):A unified prediction of computer virus spread in connected networks.Physics Letters A,vol.297,no.3,pp.261-266.

Cai,L.;Li,X.Z.(2010):Global analysis of a vector-host epidemic model with nonlinear incidences.Applied Mathematics and Computation,vol.217,no.7,pp.3531-3541.

Cohen,F.(1987):Computer viruses.Computers and Security,vol.6,no.1,pp.22-35.

Fatima,U.;Ali,M.;Ahmed,N.;Rafiq,M.(2018):Numerical modeling of susceptible latent breaking-out quarantine computer virus epidemic dynamics.Heliyon,vol.5,no.5,pp.631-652.

Gard,T.C.(1988):Introduction to Stochastic Differential Equations.Marcel Dekker,New York.

Han,X.;Tan,Q.(2010):Dynamical behavior of computer virus on Internet.Applied Mathematics and Computation,vol.2,no.17,pp.2520-2526.

Karatzas,I.,Shreve,S.E.(1988):Brownian Motion and Stochastic Calculs.Springer-Verlag.

Karatzas,I.;Shreve,S.E.(1991):Brownian Motion and Stochastic Calculus,2nd Edition.Springer Verlag,Berlin.

Kloeden,P.E.;Platen,E.;Schurz,H.(1994):Numerical Solution of SDE Through Computer Experiments.Springer Verlag,Berlin.

Maruyama,G.(1955):Continuous markov processes and stochastic equations.Rendiconti Del Circolo Matematico Di Palermo,vol.4,no.1,pp.48-90.

Mickens,R.E.(1994):Nonstandard Finite Difference Models of Differential Equations.World Scientific,Singapore.

Mickens,R.E.(2005):A fundamental principle for constructing nonstandard finite difference schemes for differential equations.Journal of Difference Equations and Applications,vol.11,no.7,pp.645-653.

Mickens,R.E.(2005):Advances in Applications of Nonstandard Finite Difference Schemes.World Scientific,Singapore.

Mishra,B.K.;Jha,N.(2007):Fixed period of temporary immunity after run of antimalicious software on computer nodes.Applied Mathematics and Computation,vol.190,no.2,pp.1207-1212.

Murray,W.H.(1988):The application of epidemiology to computer viruses.Computers and Security,vol.7,no.2,pp.139-150.

Noeiaghdam,S.;Suleman,M.;Budak,H.(2018):Solving a modified nonlinear epidemiological model of computer viruses by homotopy analysis method.Mathematical Sciences,vol.12,no.3,pp.211-222.

Oksendal,B.(2003):Stochastic Differential Equations.Springer Verlag,Berlin.

Patil,B.V.;Jadhav,R.J.(2014).Computer virus and antivirus software a brief review.International Journal of Advances in Management and Economics,vol.4,no.2,pp.1-4.

Peng,M.;He,X.;Huang,J.;Dong,T.(2013):Modeling computer virus and its dynamics.Mathematical problems in Engineering,vol.1,no.6,pp.1-5.

Piqueira,J.R.C.;Araujo,V.O.(2009):A modified epidemiological model for computer viruses.Applied Mathematics and Computation,vol.2,no.13,pp.355-360.

Piqueira,J.R.C.;Vasconcelos,A.A.D.;Gabriel,C.E.C.J.;Araujo,V.O.(2008):Dynamic models for computer viruses.Computers and Security,vol.27,no.8,pp.355-359.Platen,E.(1991):An introduction to numerical methods for stochastic differential equations.Acta Numerica,vol.8,no.1,pp.197-246.

Raza,A.;Arif,M.S.;Rafiq,M.(2019).A reliable numerical analysis for stochastic dengue epidemic model with incubation period of virus.Advances in Difference Equations,vol.3,no.2,pp.1958-1977.

Ren,J.;Yang,X.;Yang,L.X.;Xu,Y.;Yang,F.(2012):A delayed computer virus propagation model and its dynamics.Chaos Soliton and Fractals,vol.45,no.1,pp.74-79.

Ren,J.;Yang,X.;Zhu,Q.;Yang,L.X.;Zhang,C.(2012):A novel computer virus model and its dynamics.Nonlinear Analysis Real World Applications,vol.13,no.1,pp.376-384.

Singh,J.;Kumar,D.;Baleanu,D.(2019):New aspects of fractional Biswas-Milovic model with mittag-leffer law.Mathematical Modeling of Natural Phenomena,vol.14,no.1,pp.303-319.

Wierman,J.C.;Marchette,D.J.(2004):Modeling computer virus prevalence with a susceptible infected susceptible model with reintroduction.Computational Statistics and Data Analysis,vol.45,no.1,pp.3-23.

Yang,L.X.;Yang,X.;Wen,L.;Liu,J.(2012):A novel computer virus propagation model and its dynamics.International Journal of Computer Mathematics,vol.89,no.17,pp.2307-2314.

Yang,L.X.;Yang,X.;Zhu,Q.;Wen,L.(2013):A computer virus model with graded cure rates.Nonlinear Analysis Real World Applications,vol.14,no.1,pp.414-422.

Yang,M.;Zhang,Z.;Li,Q.;Zhang,G.(2012):An SLBRS model with vertical transmission of computer virus over the Internet.Discrete Dynamics in Nature and Society,vol.20,no.12,pp.1-17.

Yao,Y.;Fu,Q.;Yang,W.;Wang,Y.;Sheng,C.(2018):An epidemic model of computer worms with time delay and variable infection rate.Security and Communication Networks,vol.2,no.1,pp.982-993.

Yu,Y.;Hu,J.;Zeng,Y.(2019):On computer virus spreading using node-based model with time-delayed intervention strategies.Science China Information Sciences,vol.62,no.5,pp.59201-59203.

Yuan,H.;Chen,G.(2008).Network virus epidemic model with the point to group information propagation.Applied Mathematics and Computation,vol.206,no.1,pp.357-367.

Zhang,C.(2018):Global behavior of a computer virus propagation model on multilayer networks.Security and Communication Networks,vol.1,no.1,pp.195-204.

Zhu,Q.;Yang,X.;Ren,J.(2012).Modeling and analysis of the spread of computer virus.Communication in Nonlinear Science and Numerical Simulation,vol.17,no.12,pp.5117-5124.

主站蜘蛛池模板: 欧美色图第一页| 日韩欧美中文字幕在线精品| 成年人视频一区二区| 99热这里只有精品免费| 国模视频一区二区| 精品91视频| 999精品色在线观看| 午夜少妇精品视频小电影| 激情国产精品一区| 成人av手机在线观看| 四虎永久免费地址| 婷五月综合| 久久青草精品一区二区三区| 亚洲第一极品精品无码| 狠狠色噜噜狠狠狠狠色综合久| AV在线天堂进入| 免费高清a毛片| 日韩成人在线视频| 亚洲AV无码久久精品色欲| 午夜高清国产拍精品| 国产69囗曝护士吞精在线视频| 在线国产综合一区二区三区| 亚洲V日韩V无码一区二区| 视频二区中文无码| 伊人激情综合网| 国产玖玖玖精品视频| 色有码无码视频| 岛国精品一区免费视频在线观看| 日本久久网站| 国产视频一区二区在线观看| 国产精品国产主播在线观看| 一区二区三区成人| 中文字幕在线永久在线视频2020| 午夜免费小视频| 女人18毛片一级毛片在线 | 9久久伊人精品综合| 亚洲成人免费在线| 91精品在线视频观看| 一区二区理伦视频| 一级全免费视频播放| 91精品国产一区自在线拍| 波多野结衣中文字幕一区二区| 国产亚洲欧美日本一二三本道| 欧美日韩第三页| 又爽又黄又无遮挡网站| 精品乱码久久久久久久| 91久久夜色精品国产网站| 91久久国产热精品免费| 國產尤物AV尤物在線觀看| 亚洲激情99| 亚洲一区二区三区国产精品| 欧美97欧美综合色伦图| 亚洲综合激情另类专区| 啦啦啦网站在线观看a毛片| 好吊妞欧美视频免费| 高清色本在线www| 中文字幕无码电影| 日本欧美一二三区色视频| 久久国产精品夜色| 91青青草视频在线观看的| 亚洲v日韩v欧美在线观看| 亚洲精品男人天堂| 中文一级毛片| 亚洲成a∧人片在线观看无码| Aⅴ无码专区在线观看| 毛片免费高清免费| 国产乱码精品一区二区三区中文 | 日本尹人综合香蕉在线观看| 欧美特黄一级大黄录像| 日韩欧美中文| 18禁黄无遮挡免费动漫网站| 2021国产乱人伦在线播放| 91高清在线视频| 秋霞午夜国产精品成人片| 欧美亚洲一区二区三区导航 | 欧美一道本| 国产亚洲精品资源在线26u| 国产在线视频福利资源站| 久久91精品牛牛| 久久这里只有精品国产99| 日韩国产高清无码| 伊人久久婷婷|