{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T06:35:04Z","timestamp":1723790104105},"reference-count":30,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004480","name":"Natural Science Foundation of Shanxi Province","doi-asserted-by":"publisher","award":["201901D111311","201801D121117"],"id":[{"id":"10.13039\/501100004480","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,9,22]]},"abstract":"The dissemination of countermeasures is widely recognized as one of the most effective strategies of inhibiting malware propagation, and the study of general countermeasure and infection has an important and practical significance. On this point, a dynamical model incorporating generic nonlinear countermeasure and infection probabilities is proposed. Theoretical analysis shows that the model has a unique equilibrium which is globally asymptotically stable. Accordingly, a real network based on the model assumptions is constructed, and some numerical simulations are conducted on it. Simulations not only illustrate theoretical results but also demonstrate the reasonability of general countermeasure and infection.<\/jats:p>","DOI":"10.1155\/2020\/8859883","type":"journal-article","created":{"date-parts":[[2020,9,23]],"date-time":"2020-09-23T00:22:50Z","timestamp":1600820570000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Stability Analysis of a Dynamical Model for Malware Propagation with Generic Nonlinear Countermeasure and Infection Probabilities"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9252-7146","authenticated-orcid":true,"given":"Xulong","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer and Network Engineering, Shanxi Datong University, Datong 037009, China"}]},{"given":"Xiaoxia","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer and Network Engineering, Shanxi Datong University, Datong 037009, China"}]}],"member":"98","reference":[{"key":"1","year":"1990"},{"key":"2","year":"2005"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/s0167-9473(03)00113-0"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.nonrwa.2007.04.001"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2007.02.004"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-020-05562-1"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2012.715388"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/196214"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-0874-z"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2013.08.024"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2017.08.085"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2018.04.015"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/tsmcb.2003.817098"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/bf00173267"},{"key":"17","year":"2004"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2013.07.055"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.06.044"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/475934"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-013-1216-x"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/369360"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/264874"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.amc.2014.01.125"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2015.02.048"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/2975376"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2969430"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/129598"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4988-3"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.3390\/math7050396"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2975112"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2968916"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8859883.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8859883.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8859883.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,23]],"date-time":"2020-09-23T00:22:52Z","timestamp":1600820572000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8859883\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":30,"alternative-id":["8859883","8859883"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8859883","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,22]]}}}