Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Singh, Aditya Kumar
- A Quarantine Model for Malicious Objects in Computer Network
Abstract Views :160 |
PDF Views:1
Authors
Affiliations
1 Department of Applied Mathematics, Nilai Educational Trust's Group of Institutions, Thakurgaon, Ranchi-835 205, IN
2 Department of Applied Mathematics, Birla Institute of Technology, Mesra, Ranchi-835 215, IN
1 Department of Applied Mathematics, Nilai Educational Trust's Group of Institutions, Thakurgaon, Ranchi-835 205, IN
2 Department of Applied Mathematics, Birla Institute of Technology, Mesra, Ranchi-835 215, IN
Source
Networking and Communication Engineering, Vol 3, No 6 (2011), Pagination: 436-440Abstract
With a view to protect computer network from malicious object, SEIQS (Susceptible, Exposed, Infectious,Quarantined and Susceptible) models for the transmission of malicious objects with simple mass action incidence and standard incidence rate in computer network are formulated. Threshold,equilibrium and their stability are discussed for both the incidence rate. Global stability and asymptotic stability of endemic equilibrium has been shown. Numerical methods have been used to solveand simulate the system of differential equations which will help us to understand the attacking behavior of malicious object in computer network.