مقایسه عدد مولد پایه فازی و غیرفازی در یک مدل اپیدمی برای انتشار ویروس در شبکه‌های کامپیوتری

نوع مقاله : دعوت شده

نویسندگان

دانشگاه زابل، دانشکده علوم پایه، گروه ریاضی

20.1001.1.27174409.1398.2.2.5.5=DOR

چکیده

در این مقاله یک مدل ریاضی اپیدمی فازی برای انتشار ویروسها در یک شبکه کامپیوتری ‏بررسی شده است. مدل اپیدمیک کلاسیک و نوع فازی آن توصیف شده و مقایسه‌ای بین عدد مولد کلاسیک و نوع فازی آن انجام گرفته است. همچنین استراتژی کنترل اپیدمی ویروسها در یک شبکه کامپیوتری تجزیه و تحلیل شده است.

کلیدواژه‌ها


[1] Barros, L.C., Bassanezi, R.C., Leite (2003) The SI epidemiological models with a fuzzy transmission. Computers and Mathematics with Applications, 45, 1619-1628.
 
[2] Chen, T., Jamil, N., (2006) Effectiveness of quarantine in worm epidemic. in: IEEE International Conference on Communications 2006, IEEE, 2006, 2142-2147.
 
[3] Datta, S., Wang, H., (2005) The effectiveness of vaccinations on the spread of email-borne computer virus. in: IEEE CCECE/CCGEL, IEEE, 2005, 219-223.
 
[4] Draief, M., Ganesh, A., Massouili, L., (2008) Thresholds for virus spread on network. The Annals of Applied Probability, 359-369.
 
[5] Forest, S., Hofmeyr, S., Somayaji, A. , Longstaff, T. , (1994) Self-nonself discrimination in a computer. in: Proceeding of IEEE Symposium on Computer Security and Privacy, 202-212.
 
[6] Gelenbe, E., (2007) Dealing with software viruses: a biological paradigm. Inform. Secur. Tech. Rep., 12 242-250.
 
[7] Gelenbe, E., (2005) Keeping viruses under control. in: Computer and Information SciencesISCIS 2005, 20th International Symposium, in: Lecturer Notes in Computer Science, vol. 3733, Springer.
 
[8] Gelenbe, E., Kaptan, V., Wang, Y., (2004) Biological metaphors for agent behavior. in: Computer and Information SciencesISCIS 2004, 19th International Symposium, in: Lecturer Notes in Computer Science, vol. 3280, Springer-Verlag, 2004, 667-675.
 
[9] Keeling, M.J., Eames, K.T.D., (2005) Network and epidemic models. Journal of the Royal Society Interface, 2, 295-307.
 
[10] Kephart, J.O., White, S.R., Chess, D.M., (1993) Computers and epidemiology. IEEE Spectr., 20-26.
 
[11] Kephart, J.O., (1995) A biologically inspired immune system for computers, in: Proceeding of International Joint Conference on Artificial Intelligence.
 
[12] Klir, G.J., Yuan, B., (1995) Fuzzy Sets and Fuzzy Logic, Prentice Hall, Upper Saddle River,.
[13] Kumar, M.S., Veeramani, C., (2014) Fuzzy VEISV Epidemic Propagation Modeling for Network Worm Attack. Computational Intelligence, Cyber Security and Computational Models, 293-303.
 
[14] Madar, N., et. al., (2004) Immunization and epidemic dynamics in complex networks. The European Physical Journal E, 38, 269-276.
 
[15] Massad, E., Burattini, M.N., Ortega, N.R.S., (1999) Fuzzy logic and measles vaccination: designing a control strategy. International Journal of Epidemiology, 28, 550-557.
 
[16] Massad, E., et al., (2008) Fuzzy Logic in Action: Applications and Epidemiology and Beyond. in: STUDFUZZ, vol. 232, Springer-Verlag, Berlin, Heidelberg.
 
[17] Mishra, B.K., Saini, D.K., SEIRS epidemic model with delay for transmission of malicious objects in computer network. Applied Mathematics and Computaion, 188, 1476-1482.
 
[18] Mishra, B.K., Saini, D.K., Mathematical models on computer viruses. Applied Mathematics and Computaion, 187, 929-936.
 
[19] Mishra, B.K., Saini, D.K., Fixed period of temporary immunity after run of antimalicious software on computer nodes. Applied Mathematics and Computaion, 190, 1207-1212.
 
[20] Mishra, B.K., Samir, K.P., (2010) Fuzzy Epidemic model for the Transmission of Worms in Computer Network. Nonlinear Analysis: Real Word Applications, 11, 4335-4331.
 
[21] Moore, D., et al., (2003) Internet quarantine: requirements for containing self-propagating code. in: Proceeding of IEEE INFOCOM.
 
[22] May, R.M., Lioyd, A.L., (2001) Infection dynamics on scale-free networks. Physical review. E, Statistical, nonlinear, and soft matter physics, 64, 1-3.
 
[23] Newman, M.E.J., Forrest, S., Balthrop, J., (2002) Email networks and the spread of computer virus. Physical review. E, Statistical, nonlinear, and soft matter physics, 66, 1-4.
 
[24] Ossama, A., et al., (2012) Stability analysis of VEISV Propagation Modeling for Network Worm Attack. Applied Mathematical Modelling, 36, 2751-2761.
 
[25] Piqueira, J.R.C., Cesar, F.B., (2008) Dynamic models for computer virus propagation. Mathematical Problems in Engineering.