Hopf bifurcation analysis of a delayed viral infection model in computer networks
暂无分享,去创建一个
[1] Xinyu Song,et al. Stability properties and Hopf bifurcation of a delayed viral infection model with lytic immune response , 2011 .
[2] Sajal K. Das,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON MOBILE COMPUTING An Epidemic Theoretic Framework for Vulnerability Analysi , 2022 .
[3] Yuliya N. Kyrychko,et al. Stability and Bifurcations in an Epidemic Model with Varying Immunity Period , 2012, Bulletin of mathematical biology.
[4] W. O. Kermack,et al. A contribution to the mathematical theory of epidemics , 1927 .
[5] Yali Yang,et al. Dynamical behaviors of an HBV infection model with logistic hepatocyte growth , 2011, Math. Comput. Model..
[6] Y. Moreno,et al. Epidemic outbreaks in complex heterogeneous networks , 2001, cond-mat/0107267.
[7] Jeffrey O. Kephart,et al. Measuring and modeling computer virus prevalence , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Yasuhiro Takeuchi,et al. Global Stability for Delay SIR and SEIR Epidemic Models with Nonlinear Incidence Rate , 2010, Bulletin of mathematical biology.
[9] Donald F. Towsley,et al. The monitoring and early detection of Internet worms , 2005, IEEE/ACM Transactions on Networking.
[10] Donald F. Towsley,et al. Modeling malware spreading dynamics , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Jack K. Hale,et al. Introduction to Functional Differential Equations , 1993, Applied Mathematical Sciences.
[12] B. Hassard,et al. Theory and applications of Hopf bifurcation , 1981 .
[13] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[14] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[15] Mini Ghosh,et al. Stability and bifurcation of an SIS epidemic model with treatment , 2009 .
[16] Donald F. Towsley,et al. On the performance of Internet worm scanning strategies , 2006, Perform. Evaluation.
[17] Jianhua Pang,et al. Rich dynamics of epidemic model with sub-optimal immunity and nonlinear recovery rate , 2011, Math. Comput. Model..