Defending against the advanced persistent threat: An optimal control approach
The new cyberattack pattern of advanced persistent threat (APT) has posed a serious threat
to modern society. This paper addresses the APT defense problem, that is, the problem of …
to modern society. This paper addresses the APT defense problem, that is, the problem of …
COLLECTOR: A secure RFID-enabled batch recall protocol
Batch recall is a practically important problem for most industry manufacturers. The batches
of products which contain flawed parts need to be recalled by manufacturers in time to …
of products which contain flawed parts need to be recalled by manufacturers in time to …
Dynamics of a delayed worm propagation model with quarantine
Z Zhang, L Song - Advances in Difference Equations, 2017 - Springer
Abstract A delayed SEIQRS-V model with quarantine describing the dynamics of worm
propagation is considered in the present paper. Local stability of the endemic equilibrium is …
propagation is considered in the present paper. Local stability of the endemic equilibrium is …
Stability and hopf bifurcation for a delayed SLBRS computer virus model
Z Zhang, H Yang - The Scientific World Journal, 2014 - Wiley Online Library
By incorporating the time delay due to the period that computers use antivirus software to
clean the virus into the SLBRS model a delayed SLBRS computer virus model is proposed …
clean the virus into the SLBRS model a delayed SLBRS computer virus model is proposed …
Dynamics of a delayed model for the transmission of malicious objects in computer network
Z Zhang, H Yang - The Scientific World Journal, 2014 - Wiley Online Library
An SEIQRS model for the transmission of malicious objects in computer network with two
delays is investigated in this paper. We show that possible combination of the two delays …
delays is investigated in this paper. We show that possible combination of the two delays …
Modeling and bifurcation research of a worm propagation dynamical system with time delay
Both vaccination and quarantine strategy are adopted to control the Internet worm
propagation. By considering the interaction infection between computers and external …
propagation. By considering the interaction infection between computers and external …