P. Jia, J. Liu, Y. Fang, L. Liu, and L. Liu, “Modeling and analyzing malware propagation in social networks with heterogeneous infection rates,” Phys. Stat. Mech. Its Appl., vol. 507, pp. 240–254, Oct. 2018.
B. K. Mishra, “Mathematical Model on Attack of Worm and Virus in Computer Network,” Int. J. Future Gener. Commun. Netw., vol. 9, no. 6, pp. 245–254, Jun. 2016.
M. Javidi and N. Nyamorady, “Stability analysis of a novel VEISV propagation model of computer worm attacks,” World Journal of Modelling and Simulation., vol. 10, no. 3, p. 12, 2014.
B. K. Mishra and N. Keshri, “Mathematical model on the transmission of worms in wireless sensor network,” Appl. Math. Model., vol. 37, no. 6, pp. 4103–4111, Mar. 2013.
C. H. Nwokoye and I. I. Umeh, “The SEIQR–V Model: On a More Accurate Analytical Characterization of Malicious Threat Defense,” Int. J. Inf. Technol. Comput. Sci., vol. 9, no. 12, pp. 28–37, Dec. 2017.
J. O. Kephart and S. R. White, “directed-graph epidemiological models of computer viruses,” in IEEE Computer Society Symposium on Research in Security and Privacy , Oakland, CA, USA, 1991, p. 32.
A. M. del Rey, “Mathematical modeling of the propagation of malware: a review: Mathematical modeling of the propagation of malware: a review,” Secur. Commun. Netw., vol. 8, no. 15, pp. 2561–2579, Oct. 2015.
H. Zhou, Y. Wen, and H. Zhao, “Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms,” in Sixth International Conference on Networking (ICN’07), Sainte-Luce, Martinique, France, 2007, pp. 65–65.
G. Li and Z. Jin, “Global stability of a SEIR epidemic model with infectious force in latent, infected and immune period,” Chaos Solitons Fract., vol. 25, no. 5, pp. 1177–1184, Sep. 2005.
Y. Jin, W. Wang, and S. Xiao, “An SIRS model with a nonlinear incidence rate,” Chaos Solitons Fract., vol. 34, no. 5, pp. 1482–1497, Dec. 2007.
Y. Yao, L. Guo, H. Guo, G. Yu, F. Gao, and X. Tong, “Pulse quarantine strategy of internet worm propagation: Modeling and analysis,” Comput. Electr. Eng., vol. 38, no. 5, pp. 1047–1061, Sep. 2012.
O. A. Toutonji, S.-M. Yoo, and M. Park, “Stability analysis of VEISV propagation modeling for network worm attack,” Appl. Math. Model., vol. 36, no. 6, pp. 2751–2761, Jun. 2012.
B. K. Mishra and N. Jha, “SEIQRS model for the transmission of malicious objects in computer network,” Appl. Math. Model., vol. 34, no. 3, pp. 710–715, Mar. 2010.
W. Liu and S. Zhong, “Web malware spread modelling and optimal control strategies,” Sci. Rep.., vol. 7, no. 1, p. 42308, Sep. 2017.
J. Ali, M. Saeed, M. Rafiq, and S. Iqbal, “Numerical treatment of nonlinear model of virus propagation in computer networks: an innovative evolutionary Padé approximation scheme,” Adv. Differ. Equ., vol. 2018, no. 1, p. 214, Dec. 2018.
D. Acarali, M. Rajarajan, N. Komninos, and B. B. Zarpelão, “Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks,” Secur. Commun. Netw., vol. 2019, pp. 1–13, Feb. 2019.