[ProQuest: [...] denotes non US-ASCII text; see PDF]
Zizhen Zhang 1 and Yougang Wang 1 and Dianjie Bi 1 and Luca Guerrini 2
Academic Editor:Lu-Xing Yang
1, School of Management Science and Engineering, Anhui University of Finance and Economics, Bengbu 233030, China
2, Department of Management, Marche Polytechnic University, Piazza Martelli 8, 60121 Ancona, Italy
Received 5 January 2017; Accepted 23 February 2017; 20 March 2017
This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
Computer viruses, including conventional viruses and network worms, can propagate among computers with no human awareness and popularization of Internet has been the major propagation channel of viruses [1, 2]. The past few decades have witnessed the great financial losses caused by computer viruses. Therefore, it is of considerable importance to investigate the laws describing propagation of computer viruses in order to provide some help with preventing computer viruses. For that purpose and in view of the fact that propagation of computer viruses among computers resembles that of biological viruses among a population, many dynamical models describing propagation of computer viruses across the Internet have been established by the scholars at home and abroad, such as conventional models [3-8], stochastic models [9-12], and delayed models [13-18]. There are also some other computer virus models [19-21] combined with network theory to investigate the impact of the network topology, the patch forwarding, and the network eigenvalue on the viral prevalence.
As is known, vaccination is regarded as one of the most effective measures of preventing computer viruses and the awareness that there exist many infected computers would enhance the probability that the user of a susceptible computer will make his computer vaccinated [22, 23]. However, the mentioned models above neglect the influence of vaccination strategy on the propagation of computer viruses. Recently, considering the importance of vaccination, Kumar et al. [24] proposed the following SEIQRS-V computer virus propagation model: [figure omitted; refer to PDF] where S(t), E(t), I(t), Q(t), R(t), and V(t) denote the numbers of the uninfected computers, the exposed computers, the infected computers, the quarantined computers, recovered computers, and vaccinated computers at time t, respectively. A is the birth rate of new computers in the network; d is the death rate of the computers due to the reason other than the attack of viruses; α is the death rate of computers due to the attack of viruses; β is the contact rate of the uninfected computers; ρ, θ, χ, γ, δ, η, and [straight epsilon] are the transition rates between the states in system (1).
Obviously, system (1) neglects the delays in the procedure of viruses' propagation and it is investigated under the assumption that the transition between the states is instantaneous. This is not reasonable with reality. For example, it needs a period to clean the viruses in the infected and quarantined computers for antivirus software and there is usually a temporary immunity period for the recovered and the vaccinated computers because of the effect of the antivirus software. In addition, a stability switch occurs even when an ignored delay is small for a dynamical system. Based on this, we introduce two delays into system (1) and get the following delayed system: [figure omitted; refer to PDF] where τ1 is the time delay due to the period that antivirus software uses to clean the viruses in the infected and quarantined computers and τ2 is the time delay due to the temporary immunity period of the recovered and the vaccinated computers.
To the best of our knowledge, until now, there is no good analysis on system (2). Therefore, it is meaningful to analyze the proposed system with two delays.
The rest of this paper is organized as follows. In the next section, we analyze the threshold of Hopf bifurcation of system (2) by regarding different combination of the two delays as the bifurcation parameter. In Section 3, by means of the normal form theory and center manifold theorem, direction and stability of the Hopf bifurcation for τ1 >0 and τ2 >0 are investigated. Simulation results of system (2) are shown in Section 4. Finally, we finish the paper with conclusions in Section 5.
2. Analysis of Hopf Bifurcation
By direct computation, we know that if AR0 (d+χ)>d2 +(ρ+χ)d and β(d+θ)(d+α+[straight epsilon])>R0 θ[straight epsilon]δ+R0 θη(d+α+[straight epsilon]), then system (2) has a unique viral equilibrium P[low *] (S[low *] ,E[low *] ,I[low *] ,Q[low *] ,R[low *] ,V[low *] ), where [figure omitted; refer to PDF] The linearized section of system (2) at P[low *] (S[low *] ,E[low *] ,I[low *] ,Q[low *] ,R[low *] ,V[low *] ) is as follows: [figure omitted; refer to PDF] where [figure omitted; refer to PDF] Then, the characteristic equation for system (4) can be obtained: [figure omitted; refer to PDF] with [figure omitted; refer to PDF]
Case 1 (τ1 =τ2 =0).
When τ1 =τ2 =0, (6) becomes [figure omitted; refer to PDF] where [figure omitted; refer to PDF]
Clearly, D1 =A15 =βI[low *] +ρ+γ+δ+η+[straight epsilon]+θ+χ+2α+6d>0. Thus, if condition (H1 ) (see (10)) holds, then system (2) without delay is locally asymptotically stable: [figure omitted; refer to PDF]
Case 2 (τ1 >0; τ2 =0).
Equation (6) equals [figure omitted; refer to PDF] where [figure omitted; refer to PDF] Multiplying eλτ1 on left and right of (11), one has [figure omitted; refer to PDF] Assume that λ=iω1 (ω1 >0) is the root of (13): [figure omitted; refer to PDF] with [figure omitted; refer to PDF] Thus, one can obtain the expressions of cos[...]τ1ω1 and sin[...]τ1ω1 as follows: [figure omitted; refer to PDF] Then, we can get [figure omitted; refer to PDF] Suppose that (H21 ) (see (17)) has at least one positive root.
If condition (H21 ) holds, then there exists ω10 >0 such that (13) has a pair of purely imaginary roots ±iω10 . For ω10 , [figure omitted; refer to PDF] Differentiating (13) with respect to τ1 , one has [figure omitted; refer to PDF] where [figure omitted; refer to PDF] Thus, [figure omitted; refer to PDF] with [figure omitted; refer to PDF]
Thus, if condition (H22 ) G2R ×H2R +G2I ×H2I ≠0 holds, then Re[...][dλ/dτ1]λ=iω10 ≠0. Based on the Hopf bifurcation theorem in [25], we have the following results.
Theorem 1.
Suppose that conditions (H1 ), (H21 ), and (H22 ) hold for system (2). The viral equilibrium P[low *] (S[low *] ,E[low *] ,I[low *] ,Q[low *] ,R[low *] ,V[low *] ) is locally asymptotically stable when τ1 ∈[0,τ10 ) and a Hopf bifurcation occurs at the viral equilibrium P[low *] (S[low *] ,E[low *] ,I[low *] ,Q[low *] ,R[low *] ,V[low *] ) when τ1 =τ10 .
Case 3 (τ1 =0; τ2 >0).
Equation (6) becomes [figure omitted; refer to PDF] where [figure omitted; refer to PDF] Multiplying eλτ2 on left and right of (23), one has [figure omitted; refer to PDF] Let λ=iω2 (ω2 >0) be the root of (25): [figure omitted; refer to PDF] with [figure omitted; refer to PDF] Then, [figure omitted; refer to PDF] And the equation following equation regarding τ2 can be obtained: [figure omitted; refer to PDF] Suppose that (H31 ) (see (29)) has at least one positive root.
If condition (H31 ) holds, then there exists ω20 >0 such that (25) has a pair of purely imaginary roots ±iω20 . For ω20 , [figure omitted; refer to PDF] Differentiate both sides of (25) with respect to τ2 . Then, [figure omitted; refer to PDF] where [figure omitted; refer to PDF] Thus, [figure omitted; refer to PDF] with [figure omitted; refer to PDF]
Similar to Case 2, we know that if condition (H32 ) G3R ×H3R +G3I ×H3I ≠0 holds, then Re [dλ/dτ2]λ=iω20 ≠0. In conclusion, we have the following results.
Theorem 2.
Suppose that conditions (H1 ), (H31 ), and (H32 ) hold for system (2). The viral equilibrium P[low *] (S[low *] ,E[low *] ,I[low *] ,Q[low *] ,R[low *] ,V[low *] ) is locally asymptotically stable when τ2 ∈[0,τ20 ) and a Hopf bifurcation occurs at the viral equilibrium P[low *] (S[low *] ,E[low *] ,I[low *] ,Q[low *] ,R[low *] ,V[low *] ) when τ2 =τ20 .
Case 4 (τ1 >0; τ2 ∈(0,τ20 )).
Regarding τ1 as the bifurcation parameter when τ2 ∈(0,τ20 ), multiplying by eλτ1 , (6) becomes [figure omitted; refer to PDF]
Let λ=iω1[low *] (ω1[low *] >0) be the root of (35), and for the convenience we still denote ω1[low *] as ω1 ; then, [figure omitted; refer to PDF] where [figure omitted; refer to PDF] Thus, [figure omitted; refer to PDF] Then, we get [figure omitted; refer to PDF] Suppose that (H41 ) (see (39)) has at least one positive root.
If (H41 ) holds, then there exists ω10 >0 such that (35) has a pair of purely imaginary roots ±iω10[low *] . For ω10[low *] , [figure omitted; refer to PDF] Differentiating both sides of (25) with respect to τ2 , [figure omitted; refer to PDF] where [figure omitted; refer to PDF]
Define [figure omitted; refer to PDF]
Similar to Case 2, we know that if condition (H42 ) G4R ×H4R +G4I ×H4I ≠0 holds, then Re[...][dλ/dτ1]λ=iω10[low *] ≠0. Thus, we have the following results.
Theorem 3.
Let τ2 ∈(0,τ20 ) and suppose that conditions (H1 ), (H41 ), and (H42 ) hold for system (2). The viral equilibrium P[low *] (S[low *] ,E[low *] ,I[low *] ,Q[low *] ,R[low *] ,V[low *] ) is locally asymptotically stable when τ1 ∈[0,τ10[low *] ) and a Hopf bifurcation occurs at the viral equilibrium P[low *] (S[low *] ,E[low *] ,I[low *] ,Q[low *] ,R[low *] ,V[low *] ) when τ1 =τ10[low *] .
Case 5 (τ1 ∈(0,τ10 ); τ2 >0).
Regarding τ2 as the bifurcation parameter when τ1 ∈(0,τ10 ), multiplying by eλτ2 , (6) becomes [figure omitted; refer to PDF]
Let λ=iω2[low *] (ω2[low *] >0) be the root of (44), and for the convenience we still denote ω2[low *] as ω2 ; then, [figure omitted; refer to PDF] where [figure omitted; refer to PDF] Thus, [figure omitted; refer to PDF] Then, we get [figure omitted; refer to PDF]
If (H51 ) holds, then there exists ω20[low *] >0 such that (35) has a pair of purely imaginary roots ±iω20[low *] . For ω20[low *] , [figure omitted; refer to PDF] Differentiating (25) with respect to τ2 , one can get [figure omitted; refer to PDF] where [figure omitted; refer to PDF] Thus, [figure omitted; refer to PDF]
Therefore, we know that if condition (H52 ) G5R ×H5R +G5I ×H5I ≠0 holds, then Re[...][dλ/dτ2]λ=iω20[low *] ≠0. Then, we have the following results.
Theorem 4.
Let τ1 ∈(0,τ10 ) and suppose that conditions (H1 ), (H51 ), and (H52 ) hold for system (2). The viral equilibrium P[low *] (S[low *] ,E[low *] ,I[low *] ,Q[low *] ,R[low *] ,V[low *] ) is locally asymptotically stable when τ2 ∈[0,τ20[low *] ) and a Hopf bifurcation occurs at the viral equilibrium P[low *] (S[low *] ,E[low *] ,I[low *] ,Q[low *] ,R[low *] ,V[low *] ) when τ2 =τ20[low *] .
3. Properties of the Hopf Bifurcation
In this section, we shall investigate direction and stability of the Hopf bifurcation under the case where τ1 ∈(0,τ10 ) and τ2 >0. Set u1 (t)=S(t)-S[low *] , u2 (t)=E(t)-E[low *] , u3 (t)=I(t)-I[low *] , u4 (t)=Q(t)-Q[low *] , u5 (t)=R(t)-R[low *] , u6 (t)=V(t)-V[low *] , and t[arrow right](t/τ2 ). For convenience, we assume that τ1[low *] ∈(0,τ10 )<τ20[low *] throughout this section. Then, system (2) becomes functional differential equations in C=C([-1,0],R6 ): [figure omitted; refer to PDF] with [figure omitted; refer to PDF] where [figure omitted; refer to PDF] Based on the Riesz representation theorem, there exists a 6×6 function η(θ,μ):[-1,0][arrow right]R6×6 such that [figure omitted; refer to PDF] In fact, we choose [figure omitted; refer to PDF] For [varphi]∈C([-1,0],R6 ), we define [figure omitted; refer to PDF] Then, system (53) becomes [figure omitted; refer to PDF] where ut (θ)=u(t+θ) for θ∈[-1,0].
Define A[low *] as follows: [figure omitted; refer to PDF] and a bilinear form [figure omitted; refer to PDF] where η(θ)=η(θ,0).
Let q(θ)=(1,q2 ,q3 ,q4 ,q5 ,q6)Teiω20[low *]τ20[low *] θ be the eigenvector of A(0) with +iω20[low *]τ20[low *] and let q[low *] (s)=D(1,q2[low *] ,q3[low *] ,q4[low *] ,q5[low *] )eiω20[low *]τ20[low *] s be the eigenvector of A[low *] (0) with -iω20[low *]τ20[low *] . Then, according to the definition of A(0) and A[low *] (0), we obtain [figure omitted; refer to PDF] In addition, from (61), we have [figure omitted; refer to PDF] Thus, we can choose [figure omitted; refer to PDF] such that [...]q[low *] ,q[...]=1, [...]q[low *] ,q-[...]=0.
Then, using the algorithms from Hassard et al. [25] and the similar computation process in [26-29], we obtain [figure omitted; refer to PDF] with [figure omitted; refer to PDF] where [figure omitted; refer to PDF]
Then, we can get the following coefficients: [figure omitted; refer to PDF] Thus, we have the following results.
Theorem 5.
The sign of μ2 determines direction of the Hopf bifurcation: if μ2 >0 (μ2 <0), then the Hopf bifurcation is supercritical (subcritical); the sign of ρ2 determines stability of the bifurcating periodic solutions: if ρ2 <0 (ρ2 >0), then the bifurcating periodic solutions are stable (unstable); the sign of T2 determines period of the bifurcating solutions: if T2 >0 (T2 <0), then the period of the bifurcating periodic solutions increases (decreases).
4. Numerical Simulation
In this section, we present some numerical results of system (2) in order to validate the analytical predictions obtained in Sections 2 and 3. We choose a set of parameters as follows: A=100, β=0.009, d=0.05, ρ=0.65, θ=0.05, χ=0.55, γ=0.45, α=0.035, δ=0.1, η=0.35, and [straight epsilon]=0.07, and consider the following special case of (2): [figure omitted; refer to PDF] from which we can get the unique viral equilibrium P[low *] (66.0494,277.7978,233.6617,150.7495, 923.3406, 71.7439). It can be easily verified that condition (H1 ) is satisfied when τ1 =τ2 =0.
By computation, we have ω10 =0.8554 and τ10 =4.1056. Then, we get λ[variant prime] (τ10 )=2.3686+i1.0212. Thus, we know that conditions (H21 ) and (H22 ) hold. We can conclude that all roots that cross the imaginary axis at iω10 cross from left to right as τ1 increases by the theory in [22]. According to Theorem 1, P[low *] (66.0494,277.7978,233.6617,150.7495,923.3406, 71.7439) is asymptotically stable when τ1 ∈(0,τ10 ). This property can be illustrated by Figures 1 and 2. In this case, spreading law of the computer viruses can be predicted and the viruses can be controlled and eliminated. However, once the value of τ1 passes through the critical value τ10 , P[low *] (66.0494,277.7978,233.6617,150.7495,923.3406, 71.7439) loses its stability and a Hopf bifurcation occurs, which can be shown in Figures 3 and 4. The occurrence of a Hopf bifurcation means that the state of computer viruses propagation changes from the viral equilibrium point to a limit cycle. This makes spreading of the computer viruses be out of control.
Figure 1: The projection of the phase portrait of system (69) in (S,E,V)-space with τ1 =3.605.
[figure omitted; refer to PDF]
Figure 2: The projection of the phase portrait of system (69) in (I,Q,R)-space with τ1 =3.605.
[figure omitted; refer to PDF]
Figure 3: The projection of the phase portrait of system (69) in (S,E,V)-space with τ1 =4.60.
[figure omitted; refer to PDF]
Figure 4: The projection of the phase portrait of system (69) in (I,Q,R)-space with τ1 =4.60.
[figure omitted; refer to PDF]
Similarly, we have the following: ω20 =1.8255 and τ20 =3.7424 when τ1 =0 and τ2 >0; ω10[low *] =0.9665 and τ10[low *] =3.1862 when τ1 >0 and τ2 =2.25∈(0,τ20 ); ω20[low *] =2.4217 and τ20[low *] =3.0254 when τ2 >0 and τ1 =2.45∈(0,τ10 ). The corresponding phase plots are shown in Figures 5-8, Figures 9-12, and Figures 13-16, respectively. In addition, for τ2 >0 and τ1 =2.45∈(0,τ10 ), we have C1 (0)=-17.2982+i13.5056 and λ[variant prime] (τ20[low *] )=0.3796+i2.0581 by some complex computation. Based on (68), we get μ2 =45.5692>0, ρ2 =-34.5964<0, and T2 =-14.6441<0. Therefore, the Hopf bifurcation is supercritical, the bifurcating periodic solutions are stable, and the period of the bifurcating periodic solutions decreases.
Figure 5: The projection of the phase portrait of system (69) in (S,E,V)-space with τ2 =3.65.
[figure omitted; refer to PDF]
Figure 6: The projection of the phase portrait of system (69) in (I,Q,R)-space with τ2 =3.65.
[figure omitted; refer to PDF]
Figure 7: The projection of the phase portrait of system (69) in (S,E,V)-space with τ2 =3.805.
[figure omitted; refer to PDF]
Figure 8: The projection of the phase portrait of system (69) in (I,Q,R)-space with τ2 =3.805.
[figure omitted; refer to PDF]
Figure 9: The projection of the phase portrait of system (69) in (S,E,V)-space with τ1 =2.86 and τ2 =2.25∈(0,τ20 ).
[figure omitted; refer to PDF]
Figure 10: The projection of the phase portrait of system (69) in (I,Q,R)-space with τ1 =2.86 and τ2 =2.25∈(0,τ20 ).
[figure omitted; refer to PDF]
Figure 11: The projection of the phase portrait of system (69) in (S,E,V)-space with τ1 =3.574 and τ2 =2.25∈(0,τ20 ).
[figure omitted; refer to PDF]
Figure 12: The projection of the phase portrait of system (69) in (I,Q,R)-space with τ1 =3.574 and τ2 =2.25∈(0,τ20 ).
[figure omitted; refer to PDF]
Figure 13: The projection of the phase portrait of system (69) in (S,E,V)-space with τ2 =2.862 and τ1 =2.45∈(0,τ10 ).
[figure omitted; refer to PDF]
Figure 14: The projection of the phase portrait of system (69) in (I,Q,R)-space with τ2 =2.862 and τ1 =2.45∈(0,τ10 ).
[figure omitted; refer to PDF]
Figure 15: The projection of the phase portrait of system (69) in (S,E,V)-space with τ2 =3.225 and τ1 =2.45∈(0,τ10 ).
[figure omitted; refer to PDF]
Figure 16: The projection of the phase portrait of system (69) in (I,Q,R)-space with τ2 =3.225 and τ1 =2.45∈(0,τ10 ).
[figure omitted; refer to PDF]
According to the numerical simulation results, we know that the time delay should remain less than the corresponding threshold in order to control and predict the viruses' propagation by decreasing the period that antivirus software uses to clean the computer viruses and the temporary immunity period of the recovered and the vaccinated computers. To this end, we can adjust the parameters of our proposed model in real-world networks, such as timely updating the antivirus software on computers, properly controlling the number of computers attached to the network, and timely disconnecting computers from the network when the connections are unnecessary. Of course, in the next step, we also need to collect large amount of relevant data and estimate the parameters involved in our proposed model through statistical analysis in real-world networks. Namely, we have to adjust the parameters in the model so as to control viruses' propagation effectively if it is necessary.
5. Conclusions
It is definitely an interesting work to consider the effect of delays on dynamical systems, because a stability switch occurs even when an ignored delay is small for a dynamical system. Based on this fact, we introduce the time delay due to the period that antivirus software uses to clean the computer viruses in the infectious and quarantined computers (τ1 ) and the time delay due to the temporary immunity period of the recovered and the vaccinated computers (τ2 ) into the SEIQRS-V computer virus propagation model considered in [21]. We obtain some conditions for local stability and Hopf bifurcation occurring by analyzing distribution of roots of the associated characteristic equation.
By computation, there exists a corresponding critical value of the time delay below which system (2) is stable and above which system (2) is unstable. When the system is stable, the characteristics of the propagation of computer viruses can be easily predicted and then the computer viruses can get eliminated. Otherwise, the propagation of the computer viruses is out of control. Therefore, stability of the computer virus propagation system must be guaranteed in practice. In addition, we find that the effect of τ2 on system (2) is marked compared with τ1 , because the critical value of τ2 is much smaller when we only consider it. At last, we have also derived the explicit formula which can determine direction and stability of the Hopf bifurcation under the case where τ1 ∈(0,τ10 ) and τ2 >0.
Acknowledgments
This work was supported by Natural Science Foundation of Anhui Province (nos. 1608085QF151, 1608085QF145, and 1708085MA17) and Natural Science Foundation of the Higher Education Institutions of Anhui Province (nos. KJ2014A006 and KJ2015A144).
[1] L.-X. Yang, X. Yang, "The effect of infected external computers on the spread of viruses: A Compartment Modeling Study,", Physica A. Statistical Mechanics and its Applications , vol. 392, no. 24, pp. 6523-6535, 2013.
[2] P. Szor, The Art of Computer Virus Research and Defense , Addison-Wesley Education Publishers Inc. Boston, Mass, USA, 2005.
[3] H. Yuan, G. Chen, "Network virus-epidemic model with the point-to-group information propagation,", Applied Mathematics and Computation , vol. 206, no. 1, pp. 357-367, 2008.
[4] B. K. Mishra, S. K. Pandey, "Dynamic model of worms with vertical transmission in computer network,", Applied Mathematics and Computation , vol. 217, no. 21, pp. 8438-8446, 2011.
[5] L.-X. Yang, X. Yang, L. Wen, J. Liu, "A novel computer virus propagation model and its dynamics,", International Journal of Computer Mathematics , vol. 89, no. 17, pp. 2307-2314, 2012.
[6] J. Ren, X. Yang, Q. Zhu, L.-X. Yang, C. Zhang, "A novel computer virus model and its dynamics,", Nonlinear Analysis. Real World Applications , vol. 13, no. 1, pp. 376-384, 2012.
[7] C. Gan, X. Yang, W. Liu, Q. Zhu, X. Zhang, "Propagation of computer virus under human intervention: a dynamical model,", Discrete Dynamics in Nature and Society , vol. 2012, 2012.
[8] L. X. Yang, M. Draief, X. F. Yang, "Heterogeneous virus propagation in networks: a theoretical study,", Mathematical Methods in the Applied Sciences , vol. 40, no. 5, pp. 1396-1413, 2017.
[9] C. Zhang, Y. Zhao, Y. Wu, S. Deng, "A stochastic dynamic model of computer viruses,", Discrete Dynamics in Nature and Society , vol. 2012, 2012.
[10] A. Jafarabadi, M. A. Azgomi, "A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology,", Peer-to-Peer Networking and Applications , vol. 8, no. 6, pp. 1008-1022, 2015.
[11] J. Amador, "The stochastic SIRA model for computer viruses,", Applied Mathematics and Computation , vol. 232, pp. 1112-1124, 2014.
[12] J. Amador, J. R. Artalejo, "Stochastic modeling of computer virus spreading with warning signals,", Journal of the Franklin Institute. Engineering and Applied Mathematics , vol. 350, no. 5, pp. 1112-1138, 2013.
[13] Y. Yao, X.-W. Xie, H. Guo, G. Yu, F.-X. Gao, X.-J. Tong, "Hopf bifurcation in an Internet worm propagation model with time delay in quarantine,", Mathematical and Computer Modelling , vol. 57, no. 11-12, pp. 2635-2646, 2013.
[14] J. Ren, Y. Xu, "Stability and bifurcation of a computer virus propagation model with delay and incomplete antivirus ability,", Mathematical Problems in Engineering , vol. 2014, 2014.
[15] J. Liu, "Hopf bifurcation in a delayed SEIQRS model for the transmission of malicious objects in computer network,", Journal of Applied Mathematics , vol. 2014, 2014.
[16] L. Feng, X. Liao, H. Li, Q. Han, "Hopf bifurcation analysis of a delayed viral infection model in computer networks,", Mathematical and Computer Modelling , vol. 56, no. 7-8, pp. 167-179, 2012.
[17] Y. Muroya, Y. Enatsu, H. Li, "Global stability of a delayed SIRS computer virus propagation model,", International Journal of Computer Mathematics , vol. 91, no. 3, pp. 347-367, 2014.
[18] J. G. Ren, X. F. Yang, L.-X. Yang, Y. H. Xu, F. Z. Yang, "A delayed computer virus propagation model and its dynamics,", Chaos, Solitons and Fractals , vol. 45, no. 1, pp. 74-79, 2012.
[19] L. Yang, X. Yang, "The effect of network topology on the spread of computer viruses: A Modelling Study,", International Journal of Computer Mathematics , pp. 1-18, 2016.
[20] L.-X. Yang, X. Yang, Y. Wu, "The impact of patch forwarding on the prevalence of computer virus: a theoretical assessment approach,", Applied Mathematical Modelling , vol. 43, pp. 110-125, 2017.
[21] C. Gan, "Modeling and analysis of the effect of network eigenvalue on viral spread,", Nonlinear Dynamics , vol. 84, no. 3, pp. 1727-1733, 2016.
[22] C. Gan, X. Yang, W. Liu, Q. Zhu, "A propagation model of computer virus with nonlinear vaccination probability,", Communications in Nonlinear Science and Numerical Simulation , vol. 19, no. 1, pp. 92-100, 2014.
[23] C. Gan, X. Yang, Q. Zhu, "Global stability of a computer virus propagation model with two kinds of generic nonlinear probabilities,", Abstract and Applied Analysis , vol. 2014, 2014.
[24] M. Kumar, B. K. Mishra, T. C. Panda, "Effect of quarantine & vaccination on infectious nodes in computer network,", International Journal of Computer Networks and Applications , vol. 2, pp. 92-97, 2015.
[25] B. D. Hassard, N. D. Kazarinoff, Y. H. Wan, Theory and Applications of Hopf Bifurcation , vol. 41, of London Mathematical Society Lecture Note Series, Cambridge University Press, Cambridge, UK, 1981.
[26] X.-Y. Meng, H.-F. Huo, X.-B. Zhang, H. Xiang, "Stability and Hopf bifurcation in a three-species system with feedback delays,", Nonlinear Dynamics , vol. 64, no. 4, pp. 349-364, 2011.
[27] C. Xu, X. Tang, M. Liao, "Stability and bifurcation analysis of a six-neuron BAM neural network model with discrete delays,", Neurocomputing , vol. 74, no. 5, pp. 689-707, 2011.
[28] C. Bianca, L. Guerrini, "Existence of limit cycles in the Solow model with delayed-logistic population growth,", The Scientific World Journal , vol. 2014, 2014.
[29] C. Xu, X. Tang, M. Liao, "Stability and bifurcation analysis on a ring of five neurons with discrete delays,", Journal of Dynamical and Control Systems , vol. 19, no. 2, pp. 237-275, 2013.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2017 Zizhen Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract
A further generalization of an SEIQRS-V (susceptible-exposed-infectious-quarantined-recovered-susceptible with vaccination) computer virus propagation model is the main topic of the present paper. This paper specifically analyzes effects on the asymptotic dynamics of the computer virus propagation model when two time delays are introduced. Sufficient conditions for the asymptotic stability and existence of the Hopf bifurcation are established by regarding different combination of the two delays as the bifurcation parameter. Moreover, explicit formulas that determine the stability, direction, and period of the bifurcating periodic solutions are obtained with the help of the normal form theory and center manifold theorem. Finally, numerical simulations are employed for supporting the obtained analytical results.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer