[1] 方滨兴. 定义网络空间安全[J]. 网络与信息安全学报,2018,4(1):1-5. (FANG B X. Define cyberspace security[J]. Chinese Journal of Network and Information Security,2018,4(1):1-5.) [2] 邬江兴, 王清贤, 邹宏. 网络空间安全学科发展[M]. 北京:电子工业出版社,2018:4-16. (WU J X,WANG Q X,ZOU H. Development of Cyberspace Security Discipline[M]. Beijing:Publishing House of Electronics Industry,2018:4-16.) [3] KEPHART J O,WHITE S R. Directed-graph epidemiological models of computer viruses[C]//Proceedings of the 1991 IEEE Symposium on Security and Privacy. Piscataway:IEEE,1991:343-359. [4] KEPHART J O,WHITE S R. Measuring and modeling computer virus prevalence[C]//Proceedings of the 1993 IEEE Computer Security Symposium on Research in Security and Privacy. Piscataway:IEEE,1993:2-15. [5] ZOU C C,GONG W,TOWSLEY D. Code red worm propagation modeling and analysis[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. New York:ACM, 2002:138-147. [6] FENG L,SONG L,ZHAO Q,et al. Modelling and stability analysis of worm propagation in wireless sensor network[J]. Mathematical Problems in Engineering,2015, 2015:No. 129598. [7] 冯丽萍, 宋礼鹏, 王鸿斌, 等. P2P僵尸网络的传播建模与分析[J]. 计算机应用,2015,35(1):68-71. (FENG L P,SONG L P,WANG H B,et al. Propagation modelling and analyzing of peerto-peer botnet[J]. Journal of Computer Applications,2015,35(1):68-71.) [8] HAN X,TAN Q. Dynamical behavior of computer virus on Internet[J]. Applied Mathematics and Computation,2010,217(6):2520-2526. [9] FENG L,LIAO X,HAN Q,et al. Dynamical analysis and control strategies on malware propagation[J]. Applied Mathematical Modeling,2013,37(16/17):8225-8236. [10] SINGH A,AWASTHI A K,SINGH K,et al. Modeling and analysis of worm propagation in wireless sensor networks[J]. Wireless Personal Communications,2018,98(3):2535-2551. [11] LIU W,ZHONG S. Web malware spread modelling and optimal control strategies[J]. Scientific Reports,2017(7):No. 42308. [12] ZHU Q,YANG X,YANG L,et al. Optimal control of computer virus under a delayed model[J]. Applied Mathematics and Computation,2012,218(23):11613-11619. [13] CHEN L,SUN J. Optimal vaccination and treatment of an epidemic network model[J]. Physics Letters A,2014,378(41):3028-3036. [14] ZHONG X,ZHAO J,YANG L,et al. A dynamic discount pricing strategy for viral marketing[J]. PloS One,2018,13(12):No. e0208738. [15] 冯丽萍, 韩燮, 韩琦, 等. 考虑社交网络用户行为的网络病毒传播建模[J]. 计算机应用,2018,38(10):2899-2902,2922. (FENG L P,HAN X,HAN Q,et al. Network virus propagation modeling considering social network user behaviors[J]. Journal of Computer Applications,2018,38(10):2899-2902,2922.) [16] 刘丹, 殷亚文, 宋明. 基于SIR模型的微博信息扩散规律仿真分析[J]. 北京邮电大学学报(社会科学版),2014,16(3):28-33. (LIU D,YIN Y W,SONG M. Microblog information diffusion:simulation based on SIR model[J]. Journal of Beijing University of Posts and Telecommunications (Social Sciences Edition),2014,16(3):28-33.) [17] 马知恩, 周义仓, 王稳地, 等. 传染病动力学的数学建模与研究[M]. 北京:科学出版社,2004:3-10.(MA Z E,ZHOU Y C, WANG W D,et al. Mathematical Modelling and Study on Infectious Disease Dynamics[M]. Beijing:Science Press, 2004:3-10.) [18] ROXIN E. Reviews:differential equations:classical to controlled[J]. The American Mathematical Monthly, 1985, 92(3):223-225. |