The mobile networks have increasingly facilitated our daily life but are also breeding grounds for malicious worms, which are considered as the main threat to cyber security. The purpose of this paper is to analyze the dynamics of worm propagation and to control the worm epidemic based on mobile-phone networks. Accordingly, we establish an SEIQR-type model to explore the worm epidemic with saturated incidence rate. This paper shows that if the basic reproduction number is less than 1, the worm-free equilibrium is asymptotically stable, and the epidemic of worm will eventually disappear and remain under control; in addition, if the basic reproduction number is greater than 1, the asymptotical stability of worm-existence equilibrium is derive...
Fast spreading network worms continue to pose a threat to the Internet due to their virulence, speed...
Smartphone applications are getting more and more popular and pervasive in our daily life, and are a...
With the rapid development of M2M (Machine-to-Machine) networks, the damages caused by malicious wor...
Mathematical epidemiology has been developing for over a hundred years. Mathematical models develope...
Worms spreading directly between cell-phones over short-range radio (Bluetooth, WiFi, etc.) are incr...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
In recent years, wide attention has been drawn to the problem of containing worm propagation in smar...
AbstractWorms spreading via both Web-based scanning and removable devices account for a major part o...
Millions of users world-wide are sharing content using the Peer-to-Peer (P2P) client network. While ...
With the rapid development of M2M wireless network, damages caused by malicious worms are getting mo...
Abstract. There has a constant barrage of worms over the internet in recent years. In order to effec...
Copyright © 2014 Wei Yang et al.This is an open access article distributed under the Creative Common...
The major way of attack in cyber world is cyber war. Cyber war is a form of war which takes places o...
An attempt has been made to show the impact of non-linearity of the worms through SIRS (susceptible ...
Fast spreading network worms continue to pose a threat to the Internet due to their virulence, speed...
Smartphone applications are getting more and more popular and pervasive in our daily life, and are a...
With the rapid development of M2M (Machine-to-Machine) networks, the damages caused by malicious wor...
Mathematical epidemiology has been developing for over a hundred years. Mathematical models develope...
Worms spreading directly between cell-phones over short-range radio (Bluetooth, WiFi, etc.) are incr...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the att...
In recent years, wide attention has been drawn to the problem of containing worm propagation in smar...
AbstractWorms spreading via both Web-based scanning and removable devices account for a major part o...
Millions of users world-wide are sharing content using the Peer-to-Peer (P2P) client network. While ...
With the rapid development of M2M wireless network, damages caused by malicious worms are getting mo...
Abstract. There has a constant barrage of worms over the internet in recent years. In order to effec...
Copyright © 2014 Wei Yang et al.This is an open access article distributed under the Creative Common...
The major way of attack in cyber world is cyber war. Cyber war is a form of war which takes places o...
An attempt has been made to show the impact of non-linearity of the worms through SIRS (susceptible ...
Fast spreading network worms continue to pose a threat to the Internet due to their virulence, speed...
Smartphone applications are getting more and more popular and pervasive in our daily life, and are a...
With the rapid development of M2M (Machine-to-Machine) networks, the damages caused by malicious wor...