参考文献
[1]孙柏林.网络空间病毒猖獗,工业安全形势严峻[J].自动化技术与应用,2012,31(10):1-8.
[2]朱春妹.浅析计算机网络安全的威胁因素及防范技术[J].知识经济,2012,(16):98.
[3]张锦.计算机网络安全问题与对策探讨[J].科技创新导报,2012,(25):37.
[4]Kephart J O,White S R.Directed Graph Epidemiological Model of Computer Viruses[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,1991:343-359.
[5]Gan Chenquan,Yang Xiaofan,Liu Wanping.Propagation of Computer Virus Under Human Intervention:A Dynamical Model[J].Discrete Dynamics in Nature & Society,2012,6(1):203-222.
[6]冯丽萍,王鸿斌,冯素琴.改进的SIR计算机病毒传播模型[J].计算机应用,2011,31(7):1891-1893.
[7]Mishra B K,Pandey S K.Fuzzy Epidemic Model for the Transmission of Worms in Computer Network[J].Nonlinear Analysis Real World Applications,2010,11(5):4335-4341.
[8]Ren Jianguo,Yang Xiaofan,Zhu Qingyi,et a1.A Novel Computer Virus Model and Its Dynamics[J].Nonlinear Analysis Real World Applications,2012,13(1):376-384.
[9]FengLiping,Liao Xiaofeng,Li Huaqing,et al.Hopf Bifurcation Analysis of a Delay Viral Infection Model in Computer Networks[J]Mathematical and Computer Modeling 2012,56(7/8):167-169.
[10]徐昌进,姚凌云.具有时滞的计算机网络病毒传染模型分支分析[J].河南科技大学学报,2013,34(1):55-59.
[11]Han Xie,Tan Qiulin.Dynamical Behavior of Computer Virus on Internet[J].Applied Mathematics & Com-putation,2010,217(6):2520-2526.
[12]Kuang Y.Delay Differential Equations with Applications in Population Dynamics[M].Boston,USA:Academic Press,1993.
[13]傅朝金,廖晓昕.时滞微分方程的稳定性[J].数学物理学报,2003,23(4):494-498.
[14]韩杨,李俊娥.网络病毒的特点及其防治策略[J].计算机工程,2003,29(1):6-7.
[15]陈顼颢,王志英,任江春.一种新型病毒主动防御技术与检测算法[J].计算机应用研究,2010,27(6):2338-2340.
编辑顾逸斐 |