Journal of Engineering and Applied Sciences

Year: 2009
Volume: 4
Issue: 3
Page No. 215 - 220

Predator-Prey Models for the Attack of Malicious Objects in Computer Network

Authors : Bimal Kumar Mishra and Gholam Mursalin Ansari

References

Anderson, R.M. and R.M. May, 1986. The invasion and spread of infectious diseases within animal and plant communities. Philos. Trans. Royal Soc. London, 314: 533-570.

Chen, Z., L. Gao and K. Kwiat, 2003. Modeling the spread of active worms. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, Mar. 30-Apr. 3, IEEE Publication, pp: 1890-1900.

Freedman, H.I., 1990. A model of predator-prey dynamics as modified by the action of a parasite. Math. Biosci., 99: 143-155.
PubMed  |  

Hyman, J.M. and J. Li, 1996. Differential susceptibility epidemic models. J. Math. Bio., 35: 240-260.

Jeffrey, K., G. Sorkin, D. Chess and S. White, 1997. Fighting computer viruses. Comput. Security, 16: 676-677.

Mishra, B.K. and D.K. Saini, 2007. Mathematical models on computer viruses. Applied Math. Comput., 187: 929-936.

Mishra, B.K. and D.K. Saini, 2007. SIERS epidemic model with delay for transmission of malicious objects in computer network. Math. Comput., 188: 1476-1482.

Mishra, B.K. and N. Jha 2009. SEIQRS model for the transmission of malicious objects in computer network. Applied Math. Modell., 34: 710-715.
CrossRef  |  

Mishra, B.K. and N. Jha, 2007. Fixed period of temporary immunity after run of anti-malicious software on computer nodes. Applied Math. Comput., 190: 1207-1212.
CrossRef  |  

Mukherjee, D., 2003. Stability analysis of a stochastic model for prey-predator system with disease in the prey. Nonlinear Anal. Model. Control, 8: 83-92.
Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved