Journal of Engineering and Applied Sciences
Year:
2009
Volume:
4
Issue:
3
Page No.
215 - 220
References
Anderson, R.M. and R.M. May, 1986. The invasion and spread of infectious diseases within animal and plant communities. Philos. Trans. Royal Soc. London, 314: 533-570.
Chen, Z., L. Gao and K. Kwiat, 2003. Modeling the spread of active worms. Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, Mar. 30-Apr. 3, IEEE Publication, pp: 1890-1900.
Freedman, H.I., 1990. A model of predator-prey dynamics as modified by the action of a parasite. Math. Biosci., 99: 143-155.
PubMed | Hyman, J.M. and J. Li, 1996. Differential susceptibility epidemic models. J. Math. Bio., 35: 240-260.
Jeffrey, K., G. Sorkin, D. Chess and S. White, 1997. Fighting computer viruses. Comput. Security, 16: 676-677.
Mishra, B.K. and D.K. Saini, 2007. Mathematical models on computer viruses. Applied Math. Comput., 187: 929-936.
Mishra, B.K. and D.K. Saini, 2007. SIERS epidemic model with delay for transmission of malicious objects in computer network. Math. Comput., 188: 1476-1482.
Mishra, B.K. and N. Jha 2009. SEIQRS model for the transmission of malicious objects in computer network. Applied Math. Modell., 34: 710-715.
CrossRef | Mishra, B.K. and N. Jha, 2007. Fixed period of temporary immunity after run of anti-malicious software on computer nodes. Applied Math. Comput., 190: 1207-1212.
CrossRef | Mukherjee, D., 2003. Stability analysis of a stochastic model for prey-predator system with disease in the prey. Nonlinear Anal. Model. Control, 8: 83-92.
Direct Link |