- Research
- Open access
- Published:
A delayed e-epidemic SLBS model for computer virus
Advances in Difference Equations volume 2019, Article number: 414 (2019)
Abstract
We propose an e-epidemic time-delay Susceptible-Latent-Breaking out-Susceptible (\(SLBS\)) model to study delay dynamics appearing due to antivirus software, which takes time to clean the viruses from latent and breaking-out computers. We perform nonlinear stability analysis, Hopf bifurcation analysis, and its direction and stability. Numerical simulation results (time series analysis and bifurcation diagram) give useful insights for delay dynamics. We investigate the effect of the control parameters like rate of infection of all the classes and cure rates on the model system. Our results suggest that time delay is responsible for destabilizing the system dynamics. For smooth functionality of a computer system, our results suggest the minimum use of removable storage devices like smart phones, optical discs, memory cards, external hard disk, digital cameras, and so on and use of effective antivirus softwares.
1 Introduction
With increasing popularity of the internet, increasing numbers of network-based applications enter into our everyday life, which can bring about as much as potential hazards malware for network users [1]. Understanding the virus spread dynamics is most important for defence strategies and computer security [2]. In last decades the study of widespread infection of the computers connected to internet has attracted the interest of the researchers at home and abroad. To illustrate the computer virus transmission dynamics, Murray [3] has suggested high similarities between computer and biological viruses. Kephart and White [4, 5] investigated SIS models for the spread of computer virus. Wierman [2, 6] proposed the SIR computer virus propagation model. Considering that the computer virus has a latent period, Yuan et al. [7, 8] incorporated the exposed class E (infected but not yet broken-out) to the classical SIR and SEIR computer virus model. However, the SEIR computer virus model assumes that the recovered computers have a permanent immunization period, which is not consistent with real situation. Mishra and Saini [9] proposed the SEIRS computer virus model to reveal common worm propagation. There are also some other computer virus models with vaccination [10,11,12], quarantine [13,14,15,16], effect of antivirus software [17], and so on.
However, most of the mentioned computer virus models assume that the infected computers that are in latency do not infect other computers. This is not consistent with reality. An infected computer that is in latency can affect other computers during file downloading or copying. Apart from this, new viruses and newer versions of old viruses may infect the cured computers, and effect of removable storage devices are also assumed. Based on these assumptions, the following computer virus model with graded infection rate has been proposed by Yang and Yang [18]:
where \(S(t)\), \(L(t)\), and \(B(t)\) denotes the numbers of uninfected, latent, and breaking-out computers at time t, \(\beta _{1}\), \(\beta _{2}\), \(\mu _{1}\), \(\mu _{2}\), \(\gamma _{1}\), \(\gamma _{2}\), δ, α, and θ are the parameters of system (1), and the meanings of all the parameters are the same as those in [18]. Yang and Yang [18] studied the local and global stability of system (1).
Time delay comes from the time sharing of the communication medium and the computation time entailed for communication processing and physical signal coding. The concept of delay comes in the 1970s when analogue controllers were replaced by digital controllers in computer networks [19]. Yang [20] demonstrated that the computational delay can cause system instability in a digital controller. Delay is an important aspect because it directly affects the speed of the digital device on an operating computer. In [18] the effect of time delay is not considered; nevertheless, delay acts crucially on system dynamics. Therefore we have deliberated time delay due to the period that antivirus software uses to clean viruses from latent and breaking-out computers. Recently, computer virus models with time delay have been investigated by some scholars [21,22,23,24,25,26]. In addition to computer virus models with time delay, there are also some other dynamical models with time delay, which have shown that time delay causes problems such as instability and restrict the conceivable performance of the control systems. For example, the predator–prey model [27,28,29,30], the epidemic model [31,32,33,34,35], and the neural network model [36,37,38,39]. All the mentioned works about delayed dynamical models have shown that time delay can produce complicated nonlinear phenomena with the change of time. Therefore it is important to know that at which time the delay destabilizes the system. Thus we have considered the effect of time delay on the system dynamics. Considering the effect of time delay (denoted as τ) due to the period that antivirus software uses to clean viruses, we investigate the following delayed model:
This paper is organized as follows. Section 2 deals with linear stability and Hopf bifurcation analysis. In Sect. 3, we study the nonlinear stability analysis using the Lyapunov direct method. In Sect. 4, we obtain the stability and direction of Hopf bifurcation by using the theory of center manifold and normal form. Numerical simulation results are presented in Sect. 5. Conclusions and discussions are presented in Sect. 6.
2 Linear stability and Hopf bifurcation analysis
This section reports the stability analysis of only one existing endemic equilibrium point \(E^{*}\) and the critical point \(\tau _{0}\) for the local Hopf bifurcation with the help of transversality condition.
Now by direct computation system (2) has a unique endemic equilibrium \((S^{*}, L^{*}, B^{*})\), where
and \(B^{*}\) is the unique positive root of the equation
with
and
The product of the roots of \(B^{*}\) is \(\frac{m_{0}}{m_{2}}\), which is clearly negative, and the discriminant of Eq. (3) is \(m_{1}^{2}-4 m_{0} m_{2}\), which is also positive since \(m_{0} <0\). Thus Eq. (3) has one positive and one negative root by Vieta’s theorem.
The characteristic equation of system (2) at the endemic equilibrium is
where
and
For \(\tau =0\), Eq. (4) becomes
Lemma 2.1
When \(\tau =0\), all the roots of Eq. (5) have negative real parts, and the endemic point \(E^{*}(S^{*}, L^{*}, B^{*})\) of system (2) is locally asymptotically stable (LAS).
Multiplying both sides of Eq. (4) by \(e^{\lambda \tau }\), we obtain
For \(\tau >0\), let \(\lambda =i\omega \) (\(\omega >0\)) be the root of Eq. (6). Then
Thus
where
Therefore we obtain the equation
with
Now we have \((H_{1})\): Eq. (8) has at least one positive root \(\omega _{0}\). Thus from Eq. (7) we have
Differentiating Eq. (6) with respect to τ, we obtain
Thus we get
where
The transversality condition holds if \((H_{2})\): \(P_{R} Q_{R} +P_{I} Q _{I}\neq 0\). We have the following result [25].
Theorem 2.2
Let an endemic point \(E^{*}\) of system (2) exist, and let conditions \((H_{1})\) and \((H_{2})\) be satisfied. Then it is LAS at \(\tau \in [0,\tau _{0})\) and unstable for \(\tau > \tau _{0}\). Furthermore, system (2) undergoes Hopf bifurcation at \(E^{*}\) when \(\tau =\tau _{0}\), and a family of periodic solutions bifurcate from \(E^{*} (S^{*}, L^{*}, B^{*})\) near \(\tau =\tau _{0}\).
3 Global stability analysis
This section deals with the nonlinear or global stability analysis by constructing suitable Lyapunov function for the endemic equilibrium point of the delayed model system (2).
Theorem 3.1
If \(\min \{l_{1}, l_{2}, l_{3} \} > 0\) with
where \(m_{1}< S(t)< M_{1}\), \(m_{2}< L(t)< M_{2}\), and \(m_{3}< B(t)< M_{3}\) for \(t>0\), then the endemic equilibrium \(E^{*}(S^{*},L^{*},B^{*})\) of system (2) is globally asymptotically stable (GAS).
Proof
First, we construct a proper Lyapunov function to derive a sufficient condition that guarantees that the endemic point \(E^{*}\) of the model system (2) is globally asymptotically stable. Let
Now the endemic equilibrium \(E^{*}\) transforms into trivial equilibrium \(u(t)=v(t)=w(t)=0\) for all \(t>0\). Thus system (2) is reduced as follows:
Let \(V_{1}(t)=|u(t)|\). Now calculate the derivative of \(V_{1}(t)\) with the solution of (2). It follows from Eq. (11) that
Again, due to form of (14), we consider the functional
whose derivative along the solution of system (2) is given by
Now Eq. (12) can be written as
where we used the following relation:
Let \(V_{2}(t)=|v(t)|\). Computing the derivative of \(V_{2}(t)\) along the solution of (2), from Eq. (16) it follows that
We find that there exists \(t_{1}>0\) such that \(L^{*} e^{v(t)} < M_{2}\) for all \(t>t_{1}\), and for \(t>t_{1}+\tau \), we have
Again, due to the form of (17), we consider the functional
whose right derivative along the solution of system (2) is given by
Now Eq. (13) can be rewritten as
where we used the relation
Let \(V_{3}(t)=|w(t)|\). Computing the right derivative of \(V_{3}(t)\) along the solution of (2), from Eq. (19) it follows that
We find that there exists \(t_{1}>0\) such that \(B^{*} e^{w(t)} < M_{3}\) for all \(t>t_{1}\). and for \(t>t_{1}+\tau \), we have
Again, due to the structure of (20), we consider the functional
whose upper right derivative along the solution of system (2) is given by
Let us define the Lyapunov functional
Computing the upper right derivative of \(V(t)\) along the solution of the system (2),] and using (15), (18), and (21), we obtain
where \(l_{1}\), \(l_{2}\), and \(l_{3}\) are defined in (9).
Since the model system (2) is positive invariant, for all \(t>t_{1}^{*}\), we have
Using the mean value theorem, we have
where \(S^{*}e^{\theta _{1}(t)}\) lies between \(S^{*}\) and \(S(t)\), \(L^{*}e^{\theta _{2}(t)}\) lies between \(L^{*}\) and \(L(t)\), and \(B^{*}e^{\theta _{3}(t)}\) lies between \(B^{*}\) and \(B(t)\). Therefore
Note that \(V(t)>|u(t)|+|v(t)|+|w(t)|\). Hence from theory of global stability and Eq. (22) we conclude that the zero solution of the reduced system (11)–(13) is GAS. Therefore the endemic equilibrium \(E^{*}\) of model system (2) is GAS. □
4 Stability and direction of Hopf bifurcation
In this section, we discuss the stability and direction of Hopf bifurcation using theory of normal form and center manifold [40] of the delayed system (2). Let \(x_{1}=S-S^{*}\), \(x_{2}=I-I^{*}\), \(x _{3}=T-T^{*}\), and \({x_{i}}(t)=x_{i}(\tau t)\) for \(i=1,2,3\). Then the delay system (2) is converted to the following functional differential equation in \(\mathbb{C}=\mathbb{C}([-1,0],\mathbb{R} ^{3})\):
where \(x(t)={(x_{1}(t),x_{2}(t),x_{3}(t))^{T}}\in \mathbb{C}\), \(x_{t}( \theta )=x(t+\theta )\), \(\theta \in [-1,0]\), and \(L_{\mu }:\mathbb{C} \rightarrow \mathbb{R}^{3}\), \(F:\mathbb{R} \times \mathbb{C} \rightarrow \mathbb{R}^{3}\) are given by
with
By the Riesz representation theorem there exists a \(3 \times 3\) matrix-valued function \(\eta (\theta ,\mu )\) with components of bounded variation for \(\theta \in [-1,0]\) such that
By considering Eq. (24) we can choose
where \(\delta (\theta )\) is the Dirac delta function.
For \(\phi \in \mathbb{C}^{1}([-1,0], \mathbb{R}^{3})\), define
and
Now system (23) becomes
where \(x_{t}(\theta )=x(t+\theta )\) for \(\theta \in [-1,0]\).
For \(\psi \in \mathbb{C}^{1}([0,1],(\mathbb{R}^{3})^{*})\), define
and the bilinear inner product
where \(\eta (\theta )=\eta (\theta ,0)\). Thus \(A(0)\) and \(A^{*}(0)\) are adjoint operators, and \(\pm i\omega _{0} \tau _{0}\) are their eigenvalues of \(A(0)\). Let \(v(\theta )=(1,v_{1},v_{2})^{T} e ^{i\omega _{0}\tau _{0}\theta }\) and \(v^{*}(s)=P(1,v_{1}^{*},v_{2}^{*})^{T}e ^{i\omega _{0}\tau _{0} s}\) be the eigenvectors of \(A(0)\) and \(A^{*}(0)\) at \(\theta =0\) corresponding to the eigenvalues \(i\omega _{0}\tau _{0}\) and \(-i\omega _{0}\tau _{0}\) respectively.
Thus we obtain
From Eq. (28) we have
Using the normalization condition \(\langle v^{*}(s),v(\theta )\rangle =1\), we obtain
By the same method we can easily prove that \(\langle v^{*}, \bar{v} \rangle =0\), thus omitting it. Now we obtain v and \(v^{*}\).
Following the same steps as in [40], we obtain the following expressions:
with
where \(E_{1} = (E_{1}^{(1)}, E_{1}^{(2)}, E_{1}^{(3)})^{T}\) and \(E_{2}=(E^{(1)}_{2}, E^{(2)}_{2}, E^{(3)}_{2})^{T} \in \mathbb{R}^{3}\) are further given constant vectors.
Solving this system for \(E_{1}\), we obtain
with
with
Thus we can compute the following values:
which determine the properties of a bifurcating periodic solution at the critical value \(\tau _{0}\). The notations μ, β, and T determine the direction of Hopf bifurcation, stability, and period of the bifurcating periodic solutions, respectively. Now we state the results in the following theorem.
Theorem 4.1
If \(\mu >0\) (\(\mu <0\)), then the Hopf bifurcation is supercritical (subcritical); if \(\beta <0\) (\(\beta >0\)), then the bifurcating periodic solutions are stable (unstable); if \(T>0\) (\(T<0\)), then the periodic solutions increase (decrease).
5 Numerical simulations
Numerical simulation confirms that the delayed system dynamics exhibits a periodic solution for \(\tau >8.40567\). The initial condition throughout the simulation is taken as \([10,5,5]\). The unique endemic equilibrium \(E^{*}(16.0404, 29.3064, 14.6532)\) of system (32) can be obtained by means of Mathematica for the following set of parameter values:
System (2) becomes
From Eq. (5) at \(\tau =0\), we have the characteristic polynomial \(\lambda ^{3} +A_{2} \lambda ^{2} +A_{1} \lambda +A_{0}=0\), where \(A_{0}=0.0395353>0\), \(A_{1}=0.519925\), \(A_{2}=1.34572>0\), and \(A_{1} A_{2} -A_{0}= 0.66014>0\). Hence from the set of parameter values given in Eq. (31) we obtain that the endemic equilibrium point \(E^{*}\) is locally asymptotically stable, which is confirmed by the Routh–Hurwitz criterion.
In Fig. 1, time series and Lyapunov characteristic exponent (LCE) are performed for exploring system dynamics with and without delay. In absence of delay, the system dynamics is stable for the chosen set of parameters shown in Fig. 1(a). A Lyapunov characteristic exponent (LCE) diagram is plotted using Wolf algorithm [41] in absence of delay in Fig. 1(b). The value of LCEs \((-0.10025, -0.61767, -0.62175)\) indicates that the system dynamics is stable for the model system (1).
By computing we obtain \(\omega _{0}=0.262283\) and \(\tau _{0}=8.40567\). The delayed model system shows stable behavior for \(\tau =7.54\) and 8.01, shown in Figs. 1(c) and 1(e), respectively. Oscillatory behavior can be seen for the values of time delay \(\tau =8.34\) and 8.41 in Figs. 1(d) and 1(f), respectively. From Fig. 1(d) we can notice that \(\tau =8.34<\tau _{0}\); however, it shows oscillatory behavior.
Bifurcation diagram illustrated in Fig. 2 also confirms that \(\tau =8.40567\) is the critical value for the proposed delayed system (2). When the value of τ is below \(\tau _{0}=8.40567\), the endemic point \(E^{*}(16.0404, 29.3064,14.6532)\) is asymptotically stable by Theorem 2.2. In this case the computer viruses can be controlled easily. However, once the value of τ passes through \(\tau _{0}=8.40567\), a local Hopf bifurcation occurs, which means that the computer viruses will be out of control and system dynamics will become unstable.
Effect of infected and cure rates on the delayed model system (32) are noticed to investigate the computer network performance in Fig. 3. The infected rates \(\beta _{1} = (0.01,0.03, 0.05,0.7)\) and \(\beta _{2} = (0.2,0.4,0.6,0.8)\) vary, and we observe that as the infected rate increases, the susceptible class decreases, and the number of latent and breaking-out nodes increases, as shown in Figs. 3(a)–3(f). The cure rate \(\gamma _{1} = (0.2, 0.1, 0.02, 0.01)\), at which latent node cured, is varied, and we observe that as the cure rate of latent computer decreases, susceptible and breaking-out computer also decreases; however, the latent computer increases, as shown in Figs. 4(a)–4(c). The cure rate \(\gamma _{2} = (0.2, 0.1, 0.02, 0.01)\) at which breaking-out computer cured is varied, and we observe that as the cure rate decreases, the number of susceptible and latent computers decreases, and that of breaking-out computers increases, as shown in Figs. 4(d)–4(f). The effect of infected rate at which uninfected computers are infected due to the influence of infected removable storage media (θ) is performed in Fig. 5. As the infected rate \(\theta = (0.02, 0.09, 0.16, 0.23)\) of susceptible computers increases, the number of uninfected computers decreases, but the number of latent and breaking-out computers increases.
In Figs. 6 and 7 a sensitive to initial condition (SIC) test is performed for all three classes without and with delay, respectively. When we consider the initial condition coinciding with the equilibrium point, the system dynamics indicates a chaotic scenario; however, the system behavior is stable. Two different initial conditions \([16.04, 29.3087, 14.6513]\) and \([16.00,29.2587,14.5513]\) are considered for execution of SIC test for the nondelay system in Figs. 6(a)–6(c) and the delay system in Figs. 7(a)–7(c). A slight change in the initial condition leads to a new trajectory and confirms that the system dynamics is chaotic in absence and presence of delay for the proposed system (32).
6 Conclusions and discussions
In this paper, we have mainly focused on an e-epidemic delayed \(SLBS\) model for computer viruses using bilinear incidence rates. Linear and nonlinear stabilities are performed by means of the Lyapunov method. The stability and direction of Hopf bifurcation is performed using center manifold and normal form theory. Numerical experiments are executed to investigate the dynamics of system (2) and verify the analytical findings for a set of parameter values. Our main results are summarized as follows:
-
(i)
An e-epidemic delayed \(SLBS\) model for computer virus has been extended to explore the system dynamics. Mainly, the effect of time delay due to the period that the antivirus software uses to clean the viruses in the latent and breaking-out computers has been examined.
-
(ii)
For a given set of parameter values, we obtain \(A_{0}=0.0395353>0\), \(A_{1}=0.519925\), \(A_{2}=1.34572>0\), and \(A_{2} A_{1} -A_{0} = 0.66014 >0\). Hence we concluded that the endemic equilibrium point \(E^{*}\) (16.0404, 29.3064, 14.6532) is locally asymptotically stable by the Routh–Hurwitz criterion in absence of delay. The value of Lyapunov exponent confirms the stable system dynamics of the model system (1).
-
(iii)
The bifurcation diagram confirms that \(\tau _{0}=8.40567\) is the critical value for system (32). When \(\tau <\tau _{0}\), the endemic point \(E^{*}\) is asymptotically stable, and the system is unstable for \(\tau > \tau _{0}\).
-
(iv)
We obtain \(c_{1}(0)= 0.00080926 - 0.00164203 i\), \(\mu = -0.143792<0\), \(\beta = 0.00161852 >0\), and \(T = -0.00082122 <0\) by some complicated computations. Thus, according to Theorem 4.1, we conclude that the Hopf bifurcation is subcritical and the bifurcating periodic solutions are unstable with decreasing period.
-
(v)
From Fig. 5 we observe that as the infected rate at which uninfected computers are infected due to the influence of infected removable storage media (θ) increases, the number of latent and breaking-out computers increases, which is not consistent for smooth functionality of a computer system. Thus we should minimize the use of removable storage media and if necessary, to use it as minimum time as possible because a delay increases the infection probability.
Numerical investigations confirm that the virus transmission or infected and cure rates at which latent and breaking-out computers get cured have important contributions in reducing or eradicating the viruses from the computer network. Since susceptible node decreases and latent and breaking-out increases as infected rate increases, the number of susceptible and latent computers decreases, and that of breaking-out computers increases as cure rate decreases, and we can see that the model we propose will be useful to analyze the efficiency of antivirus software. The antivirus software will be efficient if the infected rate is small and the cure rate is high. Thus this model will be helpful in developing antivirus software with good quality. In our future work, we will focus on optimal control of such a removable storage device.
References
Yang, L.X., Yang, X., Wen, L., Liu, J.: A novel computer virus propagation model and its dynamics. Int. J. Comput. Math. 89, 2307–2314 (2012)
Wierman, J.C., Marchette, D.J.: Modeling computer virus prevalence with a susceptible-infected-susceptible model with reintroduction. Comput. Stat. Data Anal. 45, 3–23 (2004)
Murray, W.: The application of epidemiology to computer viruses. Comput. Secur. 7(2), 139–150 (1988)
Kephart, J.O., White, S.R.: Directed-graph epidemiological models of computer viruses. In: 1991 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, pp. 343–359 (1991)
Kephart, J.O., White, S.R.: Measuring and modeling computer virus prevalence. In: 1993 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, pp. 2–15 (1993)
Piqueira, J.R.C., Araujo, V.O.: A modified epidemiological model for computer viruses. Appl. Math. Comput. 213, 355–360 (2009)
Yuan, H., Chen, G.Q.: Network virus-epidemic model with the point-to-group information propagation. Appl. Math. Comput. 206, 357–367 (2008)
Peng, M., He, X., Huang, J.J., Dong, T.: Modeling computer virus and its dynamics. Math. Probl. Eng. 2015, Article ID 842614 (2015)
Mishra, B.K., Saini, D.K.: SEIRS epidemic model with delay for transmission of malicious objects in computer network. Appl. Math. Comput. 188, 1476–1482 (2007)
Wang, F.W., Gao, H., Yang, Y., Wang, C.: An SVEIR defending model with partial immunization for worms. Int. J. Netw. Secur. 19, 20–26 (2017)
Upadhyay, R.K., Kumari, S., Misra, A.K.: Modeling the virus dynamics in computer network with SVEIR model and nonlinear incidence rate. J. Appl. Math. Comput. 54, 485–509 (2017)
Upadhyay, R.K., Kumari, S.: Global stability of worm propagation model with nonlinear incidence rate in computer network. Int. J. Netw. Secur. 20, 515–526 (2018)
Nwokoye, C.H., Ozoegwu, G.C., Ejiofor, V.E.: Pre-quarantine approach for defense against propagation of malicious objects in networks. Int. J. Comput. Netw. Inf. Secur. 9, 43–52 (2017)
Khanh, N.H.: Dynamics of a worm propagation model with quarantine in wireless sensor networks. Appl. Math. Inf. Sci. 10, 1739–1746 (2016)
Zhao, T., Bi, D.J.: Hopf bifurcation analysis for an epidemic model over the Internet with two delays. Adv. Differ. Equ. 2018, 97 (2018)
Liu, J.: Hopf bifurcation in a delayed SEIQRS model for the transmission of malicious objects in computer network. J. Appl. Math. 2014, Article ID 492198 (2014)
Mishra, B.K., Pandey, S.K.: Effect of antivirus software on infectious nodes in computer network: a mathematical model. Phys. Lett. A 376, 2389–2393 (2012)
Yang, L.X., Yang, X.F.: A new epidemic model of computer viruses. Commun. Nonlinear Sci. Numer. Simul. 19, 1935–1944 (2014)
Mahmoud, M.S.: Control and Estimation Methods over Communication Networks. Springer, Berlin (2014)
Yang, T.C.: On computational delay in digital and adaptive controllers. In: Control, 1994. Control’94. International Conference on IET, vol. 2, pp. 906–910 (1994)
Feng, L.P., Liao, X.F., Li, H.Q., Han, Q.: Hopf bifurcation analysis of a delayed viral infection model in computer networks. Math. Comput. Model. 56, 167–179 (2012)
Muroya, Y., Enatsu, Y., Li, H.X.: Global stability of a delayed SIRS computer virus propagation model. Int. J. Comput. Math. 91, 347–367 (2014)
Upadhyay, R.K., Kumari, S.: Discrete and data packet delays as determinants of switching stability in wireless sensor networks. Appl. Math. Model. 72, 513–536 (2019)
Ren, J.G., Yang, X.F., Yang, L.X., Xu, Y.H., Yang, F.Z.: A delayed computer virus propagation model with its dynamics. Chaos Solitons Fractals 45, 74–79 (2012)
Yao, Y., Xie, X.W., Guo, H., Yu, G., Gao, F.X., Tong, X.J.: Hopf bifurcation in an Internet worm propagation model with time delay in quarantine. Math. Comput. Model. 57, 2635–2646 (2013)
Zhang, Z.Z., Song, L.M.: Dynamics of a delayed worm propagation model with quarantine. Adv. Differ. Equ. 2017, 155 (2017)
Bai, Y.Z., Li, Y.Y.: Stability and Hopf bifurcation for a stage-structured predator–prey model incorporating refuge for prey and additional food for predator. Adv. Differ. Equ. 2019, 42 (2019)
Dubey, B., Kumar, A.: Dynamics of prey–predator model with stage structure in prey including maturation and gestation delays. Nonlinear Dyn. 96, 2653–2679 (2019)
Kundu, S., Maitra, S.: Dynamical behaviour of a delayed three species predator–prey model with cooperation among the prey species. Nonlinear Dyn. 92, 627–643 (2018)
Kundu, S., Maitra, S.: Dynamics of a delayed predator–prey system with stage structure and cooperation for preys. Chaos Solitons Fractals 114, 453–460 (2018)
Sirijampa, A., Chinviriyasit, S., Chinviriyasit, W.: Hopf bifurcation analysis of a delayed SEIR epidemic model with infectious force in latent and infected period. Adv. Differ. Equ. 2018, 348 (2018)
Krishnapriya, P., Pitchaimani, M., Witten, T.M.: Mathematical analysis of an influenza A epidemic model with discrete delay. J. Comput. Appl. Math. 324, 155–172 (2017)
Xia, W.J., Kundu, S., Maitra, S.: Dynamics of a delayed SEIQ epidemic model. Adv. Differ. Equ. 2018, 336 (2018)
Liu, Q.M., Sun, M.C., Li, T.: Analysis of an SIRS epidemic model with time delay on heterogeneous network. Adv. Differ. Equ. 2017, 309 (2017)
Akimenko, V.: An age-structured SIR epidemic model with fixed incubation period of infection. Comput. Math. Appl. 73, 1485–1504 (2017)
Xu, C.J., Liao, M.L., Li, P.L., Guo, Y., Xiao, Q.M., Yuan, S.: Influence of multiple time delays on bifurcation of fractional-order neural networks. Appl. Math. Comput. 361, 565–582 (2019)
Li, L., Wang, Z., Li, Y.X., Shen, H., Lu, J.W.: Hopf bifurcation analysis of a complex-valued neural network model with discrete and distributed delays. Appl. Math. Comput. 330, 152–169 (2018)
Xu, C.J., Chen, L., Guo, T., Li, P.L.: Dynamics of FCNNs with proportional delays and leakage delays. Adv. Differ. Equ. 2018, 72 (2018)
Huang, C.D., Nie, X.B., Zhao, X., Song, Q.K., Tu, Z.W., Xiao, M., Cao, J.D.: Novel bifurcation results for a delayed fractional-order quaternion-valued neural network. Neural Netw. 117, 67–93 (2019)
Hassard, B.D., Kazarinoff, N.D., Wan, Y.H.: Theory and Applications of Hopf Bifurcation. Cambridge University Press, Cambridge (1981)
Wolf, A., Swift, J.B., Swinney, H.L., Vastano, J.A.: Determining Lyapunov exponents from a time series. Physica D 16, 285–317 (1985)
Acknowledgements
The authors are grateful to the editor and anonymous referees for their valuable comments and suggestions on the paper.
Availability of data and materials
All the authors declare that all the data can be accessed in our manuscript in the numerical simulation section.
Funding
This research was supported by Project of Support Program for Excellent Youth Talent in Colleges and Universities of Anhui Province (No. gxyqZD2018044) and the Natural Science Foundation of the Higher Education Institutions of Anhui Province (Nos. KJ2019A0655, KJ2019A0656, KJ2019A0662).
Author information
Authors and Affiliations
Contributions
All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Competing interests
The authors declare that there is no conflict of interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Zhang, Z., Kumari, S. & Upadhyay, R.K. A delayed e-epidemic SLBS model for computer virus. Adv Differ Equ 2019, 414 (2019). https://doi.org/10.1186/s13662-019-2341-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13662-019-2341-8