[1] 刘剑, 苏璞睿, 杨珉, 等.软件与网络安全研究综述[J].软件学报, 2018, 29(1):42-68. LIU J, SU P R, YANG M, et al.Software and cyber security-a survey[J].Journal of Software, 2018, 29(1):42-68.(in Chinese) [2] ADEWOLE K S, ANUAR N B, KAMSIN A, et al.Malicious accounts:dark of the social networks[J].Journal of Network and Computer Applications, 2017, 79:41-67. [3] 皮勇.论我国刑法中的计算机病毒相关犯罪[J].法学评论, 2004, 22(2):49-53. PI Y.On computer virus related crimes in Chinese criminal law[J].Law Review, 2004, 22(2):49-53.(in Chinese) [4] KEPHART J O, WHITE S R.Directed-graph epidemiological models of computer viruses[C]//Proceedings of 1991 IEEE Computer Society Symposium on Research in Security and Privacy.Washington D.C., USA:IEEE Press, 1992:71-102. [5] KEPHART J O, WHITE S R.Measuring and modeling computer virus prevalence[C]//Proceedings of 1993 IEEE Computer Society Symposium on Research in Security and Privacy.Washington D.C., USA:IEEE Press, 1993:1-15. [6] KEPHART J O, WHITE S R, CHESS D M.Computers and epidemiology[J].IEEE Spectrum, 1993, 30(5):20-26. [7] RATHORE H, SAMAVEDHI A, SAHAY S K, et al.Robust malware detection models:learning from adversarial attacks and defenses[J].Forensic Science International:Digital Investigation, 2021, 37:301183. [8] EGELE M, SCHOLTE T, KIRDA E, et al.A survey on automated dynamic malware-analysis techniques and tools[J].ACM Computing Surveys, 2012, 44(2):1-42. [9] DHALARIA M, GANDOTRA E.A hybrid approach for android malware detection and family classification[J].International Journal of Interactive Multimedia and Artificial Intelligence, 2021, 6(6):174. [10] 王刚, 冯云, 马润年.操作系统病毒时滞传播模型及抑制策略设计[J].西安交通大学学报, 2021, 55(3):11-19. WANG G, FENG Y, MA R N.Time-delay propagation model and suppression strategy design of operating system virus[J].Journal of Xi'an Jiaotong University, 2021, 55(3):11-19.(in Chinese) [11] DEL REY A M.Mathematical modeling of the propagation of malware:a review[J].Security and Communication Networks, 2015, 8(15):2561-2579. [12] AMADOR J.The stochastic SIRA model for computer viruses[J].Applied Mathematics and Computation, 2014, 232:1112-1124. [13] REN J G, YANG X F, ZHU Q Y, et al.A novel computer virus model and its dynamics[J].Nonlinear Analysis:Real World Applications, 2012, 13(1):376-384. [14] CHALUB F A C C, SOUZA M O.The SIR epidemic model from a PDE point of view[J].Mathematical and Computer Modelling, 2011, 53(7/8):1568-1574. [15] XIA C Y, WANG L, SUN S W, et al.An SIR model with infection delay and propagation vector in complex networks[J].Nonlinear Dynamics, 2012, 69(3):927-934. [16] YUAN H, CHEN G Q.Network virus-epidemic model with the point-to-group information propagation[J].Applied Mathematics and Computation, 2008, 206(1):357-367. [17] YUAN H, CHEN G Q, WU J J, et al.Towards controlling virus propagation in information systems with point-to-group information sharing[J].Decision Support Systems, 2009, 48(1):57-68. [18] DONG T, WANG A J, LIAO X F.Impact of discontinuous antivirus strategy in a computer virus model with the point to group[J].Applied Mathematical Modelling, 2016, 40(4):3400-3409. [19] FENG L P, HAN R F, WANG H B, et al.A virus propagation model and optimal control strategy in the point-to-group network to information security investment[EB/OL].[2022-02-15].https://www.researchgate.net/publication/352112653_A_Virus_Propagation_Model_and_Optimal_Control_Strategy_in_the_Point-to-Group_Network_to_Information_Security_Investment. [20] 赖际颖, 高淑京.具有非线性免疫的P2G网络蠕虫传播模型[J].赣南师范大学学报, 2019, 40(6):20-24. LAI J Y, GAO S J.Worm propagation model in P2G network with nonlinear vaccination strategy[J].Journal of Gannan Normal University, 2019, 40(6):20-24.(in Chinese) [21] 张化川, 王晗, 胡文婕, 等.带可移动存储设备的P2G网络病毒传播模型[J].计算机应用研究, 2017, 34(3):875-878, 896. ZHANG H C, WANG H, HU W J, et al.Computer virus model with influence of removable storage devices in P2G network[J].Application Research of Computers, 2017, 34(3):875-878, 896.(in Chinese) [22] SHUKLA J B, SINGH G, SHUKLA P, et al.Modeling and analysis of the effects of antivirus software on an infected computer network[J].Applied Mathematics and Computation, 2014, 227:11-18. [23] LIU W, ZHONG S.Web malware spread modelling and optimal control strategies[J].Scientific Reports, 2017, 7(1):1-19. [24] ISLAM R, TIAN R, BATTEN L M, et al.Classification of malware based on integrated static and dynamic features[J].Journal of Network and Computer Applications, 2013, 36(2):646-656. [25] LA SALLE J P.The stability of dynamical systems[M].[S.l.]:Society for Industrial and Applied Mathematics, 1976. [26] CLARK R N.The Routh-Hurwitz stability criterion, revisited[J].IEEE Control Systems Magazine, 1992, 12(3):119-120. [27] SIGDEL R P, MCCLUSKEY C C.Global stability for an SEI model of infectious disease with immigration[J].Applied Mathematics and Computation, 2014, 243:684-689. [28] WANG F W, ZHANG Y K, WANG C G, et al.Stability analysis of an e-SEIAR model with point-to-group worm propagation[J].Communications in Nonlinear Science and Numerical Simulation, 2015, 20(3):897-904. |