[1] 文伟平, 卿斯汉, 蒋建春, 王业君. 网络蠕虫研究与进展 [J]. 软件学报 2004. [2] 方义, 夏承遗, 刘子超, 孙世温, 王莉, FANG Yi, XIA Cheng-yi, LIU Zi-chao, SUN Shi-wen, WANG Li. 闪烁小世界网络上疾病传播的动态行为研究 [J]. 复杂系统与复杂性科学 2011.doi:10.3969/j.issn.1672-3813.2011.03.005 [3] 赵敬, 方义, 夏承遗, ZHAO Jing, FANG Yi, XIA Chengyi. 考虑个体移动和局域控制的SIR传染模型 [J]. 智能系统学报 2011.doi:10.3969/j.issn.1673-4785.2011.06.006 [4] FUHRMAN KM, LAUKO I G, PINTER G A. Asymptotic behavior of an SI epidemic model with pulse removal [J]. {H}Mathematical and Computer Modelling 2004, 40(3). [5] Zhang X, Liu XN. Backward bifurcation and global dynamics of an SIS epidemic model with general incidence rate and treatment [J]. Nonlinear analysis. Real world applications 2009, 2(2). [6] Shi, HJ, Duan, ZS, Chen, GR. An SIS model with infective medium on complex networks [J]. Physica, A. Statistical mechanics and its applications 2008, 8/9(8/9). [7] Roy M, Holt RD. Effects of predation on host-pathogen dynamics in SIR models. [J]. Theoretical Population Biology 2008, 3(3). [8] Jon Kleinberg. The wireless epidemic [J]. Nature 2007, 7160(7160). [9] Kephart J.O., White S.R.. Computers and epidemiology [J]. IEEE Spectrum 1993, 5(5). [10] STANIFORD S, PAXSON V, WEAVER N. How to own the Internet in your spare time [A]. {H}New York:ACM Press 2002. [11] ZOU C C, GONG W B, TOWSLEY D. Code red worm propagation modeling and analysis [A]. {H}New York:ACM Press 2002. [12] SERAZZI G, ZANERO S. Computer virus propagation models [J]. {H}Lecture Notes in Computer Science 2004, 2965. [13] ZOU C C, TOWSLEY D, GONG W B. Email worm modeling and defense [A]. Chicago:IEEE Computer Society Press 2004. [14] CHEN Zesheng, JI Chuanyi. Spatial-temporal modeling of malware propagation in networks [J]. {H}IEEE Transactions on Neural Networks 2005, 16(5). |