Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Quarantine Model for Malicious Objects in Computer Network


Affiliations
1 Department of Applied Mathematics, Nilai Educational Trust's Group of Institutions, Thakurgaon, Ranchi-835 205, India
2 Department of Applied Mathematics, Birla Institute of Technology, Mesra, Ranchi-835 215, India
     

   Subscribe/Renew Journal


With a view to protect computer network from malicious object, SEIQS (Susceptible, Exposed, Infectious,Quarantined and Susceptible) models for the transmission of malicious objects with simple mass action incidence and standard incidence rate in computer network are formulated. Threshold,equilibrium and their stability are discussed for both the incidence rate. Global stability and asymptotic stability of endemic equilibrium has been shown. Numerical methods have been used to solveand simulate the system of differential equations which will help us   to understand the attacking behavior of malicious object in computer network.


Keywords

Computer Network, Malicious Objects, Simple Mass Action Incidence, Standard Incidence Rate.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 228

PDF Views: 1




  • A Quarantine Model for Malicious Objects in Computer Network

Abstract Views: 228  |  PDF Views: 1

Authors

Aditya Kumar Singh
Department of Applied Mathematics, Nilai Educational Trust's Group of Institutions, Thakurgaon, Ranchi-835 205, India
Bimal Kumar Mishra
Department of Applied Mathematics, Birla Institute of Technology, Mesra, Ranchi-835 215, India

Abstract


With a view to protect computer network from malicious object, SEIQS (Susceptible, Exposed, Infectious,Quarantined and Susceptible) models for the transmission of malicious objects with simple mass action incidence and standard incidence rate in computer network are formulated. Threshold,equilibrium and their stability are discussed for both the incidence rate. Global stability and asymptotic stability of endemic equilibrium has been shown. Numerical methods have been used to solveand simulate the system of differential equations which will help us   to understand the attacking behavior of malicious object in computer network.


Keywords


Computer Network, Malicious Objects, Simple Mass Action Incidence, Standard Incidence Rate.