Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

The Impact of the Network Topology on the Viral Prevalence: A Node-Based Approach

  • Lu-Xing Yang,

    Affiliation College of Computer Science, Chongqing University, Chongqing, China

  • Moez Draief,

    Affiliation Department of Electrical and Electronic Engineering, Imperial College London, South Kensington Campus, London, United Kingdom

  • Xiaofan Yang

    xfyang1964@gmail.com

    Affiliation School of Software Engineering, Chongqing University, Chongqing, China

Correction

3 Sep 2015: The PLOS ONE Staff (2015) Correction: The Impact of the Network Topology on the Viral Prevalence: A Node-Based Approach. PLOS ONE 10(9): e0137849. https://doi.org/10.1371/journal.pone.0137849 View correction

Abstract

This paper addresses the impact of the structure of the viral propagation network on the viral prevalence. For that purpose, a new epidemic model of computer virus, known as the node-based SLBS model, is proposed. Our analysis shows that the maximum eigenvalue of the underlying network is a key factor determining the viral prevalence. Specifically, the value range of the maximum eigenvalue is partitioned into three subintervals: viruses tend to extinction very quickly or approach extinction or persist depending on into which subinterval the maximum eigenvalue of the propagation network falls. Consequently, computer virus can be contained by adjusting the propagation network so that its maximum eigenvalue falls into the desired subinterval.

1 Introduction

The rapidly popularized Internet has brought us lots of benefits. On the flip side of the coin, computer viruses can propagate their replicates through the Internet much more rapidly than ever before, resulting in great disruptions. Although antivirus software is recognized as the major means of defending against electronic viruses, there is a marked lag from the appearance of a new virus to the availability of its vaccine.

As an important supplement to antivirus techniques, the epidemic dynamics of computer viruses aims to understand the laws governing the spread of malware on networks and, thereby, to work out proper strategies to contain the viral prevalence. Since Kephart and White’s seminal work on the compartment modeling of computer viruses in the early 1990s [1, 2], a multitude of compartment-based computer virus propagation models, ranging from the SIR models [3] and the SIRS models [4, 5] to the SEIRS models [6], have been suggested. Most of these models are suited to infectious diseases and computer viruses equally well. In reality, however, some computer viruses have peculiarities most infectious diseases do not have. As we know, for most infectious diseases, there is a non-ignorable interval from the time when an individual gets infected to the time when it can infect other individuals. As opposed to this, for most computer viruses, one computer can infect other computers as soon as it gets infected. To capture this common feature of most computer viruses, a series of epidemic models of computer virus, named as the SLBS models, were proposed [7, 8].

The network through which computers communicate with one another is frequently used to propagate viruses, and it has been recognized that the structure of the network has significant impact on the prevalence of virus [9]. In the early 2000s, it was empirically found that many real-world networks, ranging from the Internet and the World Wide Web to some email networks, are highly structured [1012]. Later, a wave of research on virus epidemic dynamics was initiated, with focus on the propagation of virus on scale-free networks [1319].

One common defect of all compartment-based epidemic models is that only partial knowledge on the network topology (the degree distribution or the degree correlation, say) can be used when establishing such models. In sharp contrast to this, when establishing a node-based epidemic model, one can make the best of the complete knowledge on the network topology [20]. As a result, some interesting properties concerning the viral spread, ranging from the mean propagation time and the expected number of infected nodes to the most probable network state, have been found [2125].

With the aid of a node-based epidemic model, Wang et al. [26] found that whether viruses approach extinction depends heavily on the spectral radius of the underlying network. Next, by studying the N-interwined SIS model, Mieghem et al. [27] found that whether viruses decline toward extinction depends on the maximum eigenvalue of the network. Later, by examining a node-based SIR model, Youssef and Scoglio [28] indicated that the maximum number of infected nodes is closely related to the spectrum of the network. For more information on this topic, see Refs. [2934].

This paper addresses the impact of the network topology on the viral prevalence, provided that a computer can infect other computers as soon as it gets infected. For that purpose, a node-based virus epidemic model, known as the node-based SLBS model, is proposed. After exhaustive research, it is found that the maximum eigenvalue of the underlying network is a key factor determining the viral prevalence. Specifically, the value range of the maximum eigenvalue is partitioned into three subintervals: viruses tend to extinction very quickly or approach extinction or persist depending on into which subinterval the maximum eigenvalue of the network falls. Consequently, computer virus can be contained by adjusting the network topology so that its maximum eigenvalue falls into the desired subinterval. Numerical examples support our results.

The rest of this paper is organized as follows: Preliminary knowledge is presented in Section 2, and the compartment-based SLBS models are briefly reviewed in Section 3. Section 4 describes the node-based SLBS model, Section 5 conducts a comprehensive analysis of this model, Section 6 gives some numerical examples, and Section 7 discusses the potential applications of the proposed model. Finally, Section 8 summarizes this work and presents some topics that are worthy of study.

2 Preliminaries

In this paper, the underlying network through which viruses propagate is denoted by a simple graph G = (V, E) on N non-isolated nodes numbered 1 through N, where nodes stand for terminal devices of the network, and edges stand for network links through which viruses can propagate. Let A = [aij]N × N denote the adjacency matrix of graph G, let {dk,1 ≤ kN} denote the degree sequence of G, and let {λk,1 ≤ kN} denote the spectrum of A. As A is real and symmetric, we may assume λmax = λ1λ2 ≥ ⋯ ≥ λN.

For the purpose of analyzing the new computer virus epidemic model introduced in the next section, we need the following two lemmas.

Lemma 1 [35] Consider a smooth dynamical system defined at least in a compact set C. C is positively invariant if for any smooth point y ofC, f(y) is pointing into C.

Lemma 2 [36] Consider an n-dimensional dynamical system where x(0) ∈ Ω, a positively invariant compact convex set containing the origin, G(x) ∈ C1(Ω), . Suppose matrix BT has a real eigenvector z such that

  1. (C1) ,
  2. (C2) supx ∈ ΩG(x), z⟩ ≤ 0, and
  3. (C3) the origin forms the largest positively invariant set included in the set {x ∈ Ω∣⟨G(x), z⟩ = 0}.
Let s(B) denote the maximum real part of all eigenvalues of B. Then, we have
  1. (a) s(B) < 0 implies the global stability of the origin, and
  2. (b) s(B) > 0 implies that x(0) ≠ 0 ⇒ liminft → ∞x(t)‖ > 0.

Lemma 3 [37] For a graph G with {dk,1 ≤ kN} as the degree sequence, its largest eigenvalue λmax has the following bounds.

3 A brief review of the compartment-based SLBS models

This section gives a brief review of the previously proposed SLBS models.

Under an SLBS model, every node in a network is assumed to be in one of three possible states: susecptible, i.e. uninfected, latent, i.e., infected and with all virues in the node being in their latent phase, and exploding, i.e., infected and with at least one virus in the node being in its exploding phase. For a compartment-based SLBS model, all nodes in a network are grouped into three classes (i.e., compartments) according to their states, and the change in the fraction of each compartment is the focus of study.

The original compartment-based SLBS models were established based on the homogeneously mixed assumption of the propagation network [7, 8]. However, most real-world networks, including the world-wide-web and the Internet, have been impirically found to be highly structured rather than simply homogeneously [11]. Therefore, a new compartment-based SLBS model was later suggested based on the assumption that the propagation network admits a prescribed degree distribution [18].

All of the above mentioned SLBS models suffer from a common defect that it is not possible to make full use of the knowledge concerning the structure of the propagation network. As a result, it is extremely difficult to deeply understand the impact of the network topology on the viral prevalence by solely studying such compartment-based models.

4 The new computer virus epidemic model

As with the traditional compartment-based SLBS models [8, 18], at any time, each and every node in the network is in one of three possible states: susceptible, latent, and exploding. Let Xi(t) = 0 (respectively, 1, 2) stands for that node i is susceptible (respectively, latent, exploding) at time t. Then the state of the whole network at time t can be represented by the vector Let si(t) (respectively, li(t), bi(t)) denote the probability of the event that node i is susceptible (respectively, latent, exploding) at time t,

Now, let us impose a set of statistical assumptions on the state transitions of a node.

  1. (H1) A susceptible node is infected by a latent (respectively, exploding) neighbor with probability per unit time β1 (respectively, β2). As a result, when the number of infected nodes is small, a susceptible node i gets infected approximately with average probability per unit time β1j aij lj(t)+β2j aij bj(t). As the mission of all the viruses staying in a latent node is to infect other nodes, whereas the mission of all the exploding viruses staying in an exploding node is to destruct the system, we assume β1 > β2.
  2. (H2) Some virus in a latent node breaks out with probability per unit time α.
  3. (H3) A latent (respectively, exploding) node gets cured with probability per unit time γ1 (respectively γ2). As an exploding node has more chance to be cured than a latent node, we assume γ2 > γ1.

Fig 1 shows these assumptions schematically.

Let Δt be a very small time interval. By the total probability formula, we have the following relations: Assumptions (H1)-(H3) imply the following equations: Substituting these equations into the above relations and letting Δt → 0, we get the following 3N-dimensional differential dynamical system: (1) As si(t)+li(t)+bi(t) ≡ 1, this system is equal to the following 2N-dimensional system: (2)

We shall refer to system (1) (equivalently, system (2)) as the node-based SLBS model.

Remark 1 When β2 = γ2 = α = 0, the node-based SLBS model degrades into the N-interwined SIS model [27]. When β1 = β2 and γ1 = γ2, our model again degenerates into the N-interwined SIS model.

The major task in the subsequent sections is to study the dynamical properties of system (2) (equivalently, system (1)).

5 Model analysis

Obviously, system (2) always has the origin as an equilibrium. This trivial equilibrium stands for that all viruses in the network die out almost surely. This section is focused on the stability properties of the trivial equilibrium.

First, consider the asymptotic stability of the trivial equilibrium of system (2). For that purpose, let Let x(t) = (l1(t), …, lN(t), b1(t), …, bN(t))T, and rewrite system (2) in matrix notation as (3) with initial condition x(0) ∈ Ω, where Finally, let (4)

We are ready to present a criterion for the asymptotic stability of the trivial equilibrium.

Theorem 1 Consider system (2).

  1. (a) The trivial equilibrium is asymptotically stable if λmax < R0.
  2. (b) The trivial equilibrium is unstable if λmax > R0.

Proof The characteristic equation for the Jacobian of system (3) evaluated at the trivial equilibrium is (5) We distinguish between two possibilities.

Case 1: β1(γ2γ1) = α(β1β2). Then, , and Eq (5) degrades into This equation has −(α+γ1) as a root with multiplicity N, and has β1 λkγ2,1 ≤ kN as the remaining N roots. If λmax < R0, then β1 λkγ2β1 λmaxγ2 < 0 for all k. So, the roots of Eq (5) are all negative. Hence, the trivial equilibrium of system (2) is asymptotically stable [38]. Otherwise, if λmax > R0, then β1 λmaxγ2 > 0. So, Eq (5) has a positive equilibrium. Thus, the trivial equilibrium is unstable [38].

Case 2: β1(γ2γ1) ≠ α(β1β2). Then, is not a root of Eq (5). Thus, This implies that η is a root of Eq (5) if and only if for some k (1 ≤ kN), η is a root of equation (6) where If λmax < R0, we have ak > 0 and bk > 0. So, it follows from the Hurwitz criterion [38] that the two roots of Eq (6) have negative real parts. As a result, all roots of Eq (5) have negative real parts. Hence, the trivial equilibrium is asymptotically stable [38]. Otherwise, if λmax > R0, the equation has a root with positive real part. As a result, Eq (5) has a root with positive real part. Hence, the trivial equilibrium is unstable [38]. The proof is complete.

Remark 2 This theorem can also be formulated as (a) λmax < R0s(B) < 0, and (b) λmax > R0s(B) > 0.

Second, consider the global stability of the trivial equilibrium of system (2). For that purpose, the following lemma is indispensable.

Lemma 4 The set Ω is positively invariant for system (2). That is, x(0) ∈ Ω implies x(t) ∈ Ω for all t > 0.

Proof ∂Ω consists of the following 3N hyperplanes: For 1 ≤ iN, Si, Ti, and Ui have and as their respective outer normal vectors. Let x be a smooth point of ∂Ω. We distinguish among three possibilities.

Case 1: xi = 0 for some 1 ≤ iN. Then, xN+i < 1, and xj > 0 for all ji. As graph G has no isolated node, we have

Case 2: xN+i = 0 for some 1 ≤ iN. Then, xi > 0. Thus,

Case 3: xi + xN + i = 1 for some 1 ≤ iN. Then, Combining the above discussions, we get that Bx + G(x) is pointing into ∂Ω. The claimed result then follows from Lemma 1. The proof is complete.

We are ready to present a criterion for the global stability of the trivial equilibrium.

Theorem 2 The trivial equilibrium of system (2) is globally asymptotically stable if λmax < R0.

Proof Look at system (3). As matrix BT is irreducible and its off-diagonal entries are all non-negative, it follows from [36] that BT has a positive eigenvector z = (z1, z2, ⋯, z2N) belonging to its eigenvalue s(BT). Let r = mini zi (> 0). Then, for all x ∈ Ω, we have Moreover, ⟨G(x), z⟩ = 0 implies that x = 0. In view of Theorem 1 and Lemma 3, the claimed result follows from Lemma 2. The proof is complete.

Remark 3 The global stability of the trivial equilibrium of system (2) implies that, almost surely, the viruses in the network decline toward extinction.

Next, consider the global exponential stability of the trivial equilibrium of system. For that purpose, let (7)

Now, let us give a criterion for the global exponential stability of the trivial equilibrium.

Theorem 3 The trivial equilibrium of system (2) is globally exponentially stable if λmax < R1.

Proof We have Consider the comparison system with initial condition pi(0) = li(0)+bi(0), i = 1, ⋯, N. Let p(t) = [p1(t), ⋯, pN(t)]T and rewrite the comparison system in matrix notation as The solution to this comparison system is Let U denote the N × N matrix having an eigenvector belonging to the eigenvalue λi of matrix A as the i-th column. Then, we have the following spectral decomposition of matrix A: As a result, we have Hence, Therefore, p(t) → 0 at an exponential speed if λmax < R1. It follows from the comparison theorem [38] that if λmax < R1, then for each i, li(t) + bi(t) → 0 at an exponential speed. The proof is complete.

Finally, let us consider what happens if λmax > R0. By applying Lemma 2 to system (2) and in view of Theorem 1, we get the following result.

Theorem 4 Consider system (2). If λmax > R0, then

Remark 4 This theorem shows that if λmax > R0, then, almost surely, viruses in the network persist.

Remark 5 As the largest eigenvalue of a network is an indicator of the structure of the network, Theorems 1–4 clearly reveal the impact of the network topology on the viral prevalence; a network with smaller largest eigenvalue is inclined to contain viruses.

It follows from Theorems 1–4 that it is proper to partition the value range (0, ∞) of λmax into three subintervals: I1 = (0, R1), I2 = (R1, R0), and I3 = (R0, ∞). When λmaxI1, viruses in the network tends to extinction almost surely, at an exponential speed. When λmaxI2, viruses in the network declines toward annihilation almost surely. When λmaxI3, viruses in the network persist.

6 Numerical examples

In this section, we shall verify the results obtained in the previous section using numerical examples. For that purpose, let p(t) denote the percentage of infected nodes in all nodes at time t, .

Example 1 Consider the node-based SLBS model, and take a complete graph on 100 nodes as the viral propagation network. Then, λmax = 99.

  1. Suppose β1 = 0.002, β2 = 0.001, γ1 = 0.2, γ2 = 0.3, and α = 0.1. As λmaxI1, Theorem 3 predicts that p(t) → 0 at an exponential speed. Fig 2(1) shows the trend of p(t) provided (a) there are initially 90 susceptible nodes and 10 latent nodes, or (b) there are initially 90 susceptible nodes and 10 exploding nodes. It can be seen that viruses tend to extinction very quickly, in consistency with the prediction.
  2. Suppose β1 = 0.0025, β2 = 0.001, γ1 = 0.2, γ2 = 0.3, and α = 0.1. As λmaxI2, Theorem 2 predicts that p(t) → 0. Fig 2(2) shows the trend of p(t) provided (a) there are initially 90 susceptible nodes and 10 latent nodes, or (b) there are initially 90 susceptible nodes and 10 exploding nodes. It can be seen that viruses tend toward annihilation, in agreement with the prediction.
  3. Suppose β1 = 0.01, β2 = 0.005, γ1 = 0.2, γ2 = 0.3, and α = 0.1. As λmaxI3, Theorem 4 predicts that p(t) ↛ 0. Fig 2(3) shows the trend of p(t) provided (a) there are initially 90 susceptible nodes and 10 latent nodes, or (b) there are initially 90 susceptible nodes and 10 exploding nodes. It can be seen that viruses persist, agreeing with the prediction.

thumbnail
Fig 2. (1) p(t) in the case λmaxI1; (2) p(t) in the case λmaxI2; (3) p(t) in the case λmaxI3.

https://doi.org/10.1371/journal.pone.0134507.g002

Example 2 Consider the node-based SLBS model, and take a star-shaped graph on 100 nodes as the viral propagation network. Then, .

  1. Suppose β1 = 0.01, β2 = 0.006, γ1 = 0.2, γ2 = 0.3, and α = 0.1. As λmaxI1, Theorem 3 predicts that p(t) → 0 at an exponential speed. Fig 3(1) shows the trend of p(t) provided (a) the hub is initially latent, and the remaining 99 nodes are initially susceptible, or (b) one leaf node is initially latent, and the remaining 99 nodes are initially susceptible. It can be seen that viruses tend to extinction very quickly, coinciding with the prediction.
  2. Suppose β1 = 0.035, β2 = 0.01, γ1 = 0.2, γ2 = 0.4, and α = 0.2. As λmaxI2, Theorem 2 predicts that p(t) → 0. Fig 3(2) shows the trend of p(t) provided (a) the hub is initially latent, and the remaining 99 nodes are initially susceptible, or (b) one leaf node is initially latent, and the remaining 99 nodes are initially susceptible. It can be seen that viruses tend to extinction, in agreement with the prediction.
  3. Suppose β1 = 0.05, β2 = 0.02, γ1 = 0.2, γ2 = 0.3, and α = 0.1. As λmaxI3, Theorem 4 predicts that p(t) ↛ 0. Fig 3(3) shows the trend of p(t) provided (a) the hub is initially latent, and the remaining 99 nodes are initially susceptible, or (b) one leaf node is initially latent, and the remaining 99 nodes are initially susceptible. It can be seen that viruses persist, consistent with the prediction.

thumbnail
Fig 3. (1) p(t) in the case λmaxI1; (2) p(t) in the case λmaxI2; (3) p(t) in the case λmaxI3.

https://doi.org/10.1371/journal.pone.0134507.g003

Example 3 Consider the node-based SLBS model, and take an Erdos-Renyi graph on 50 nodes, which is produced randomly with connection probability 0.2, as the viral propagation network. Numerical calculation gives λmax = 10.19.

  1. Suppose β1 = 0.015, β2 = 0.01, γ1 = 0.2, γ2 = 0.4, and α = 0.2. As λmaxI1, Theorem 3 predicts that p(t) → 0 at an exponential speed. Fig 4(1) shows the trend of p(t) provided there are initially 10 latent nodes and 40 susceptible nodes. It can be seen that viruses go to extinction very quickly, in consistency with the prediction.
  2. Suppose β1 = 0.03, β2 = 0.01, γ1 = 0.2, γ2 = 0.4, and α = 0.2. As λmaxI2, Theorem 2 predicts that p(t) → 0. Fig 4(2) shows the trend of p(t) provided there are 10 latent nodes and 40 susceptible nodes. It can be seen that viruses tend toward annihilation, in coherence with the prediction.
  3. Suppose β1 = 0.05, β2 = 0.03, γ1 = 0.2, γ2 = 0.4, and α = 0.2. As λmaxI3, Theorem 4 predicts that p(t) ↛ 0. Fig 4(3) shows the trend of p(t) provided there are initially 10 latent nodes and 40 susceptible nodes. It can be seen that viruses persist, in agreement with the prediction.

thumbnail
Fig 4. (1) p(t) in the case λmaxI1; (2) p(t) in the case λmaxI2; (3) p(t) in the case λmaxI3.

https://doi.org/10.1371/journal.pone.0134507.g004

In a word, the above given numerical examples are all in perfect agreement with the theoretical results.

7 Further discussions

It can be seen from the main results in Section 5 that an effective approach to the containment of electronic virus is to adjust the system parameters so that R0 or R1 is large enough. Simple calculations yield As a result, the following practical measures are strongly recommended.

  • Install and timely update antivirus software on computers, so as to reduce the two cure rates of infected computers.
  • Filter and block suspicious messages with firewall located at the gateway of a domain, so as to lower the two infecting rates of susceptible computers.

On the other hand, it benefits the inhibition of virus to adjust the structure of the propagation network so that its maximum eigenvalue is small enough. As there is no closed-form formula for the maximum eigenvalue of a general adjacency matrix, it is difficult to verify this condition. To circumvent this difficulty, let us present an easily verified condition for the final extinction of virus as follows.

Theorem 5 All viruses in a network would tend to extinction if

Proof The claim follows by combining Lemma 3 and Theorems 2–3.

This theorem suggests that simultaneously reducing the number of links and the maximum node degree in a network should contribute to the annihilation of virus.

8 Conclusions and remarks

To understand the way that the spread of virus on a network is affected by the structure of the network, a new epidemic model of computer virus has been proposed. The model analysis reveals that the maximum eigenvalue of the network is a key factor determining the viral prevalence; viruses tend to extinction very quickly or approach extinction or persist depending on where the maximum eigenvalue of the network lies. As a result, viruses can be contained by properly adjusting the structure of the propagation network.

Towards this direction, lots of work has yet to be done. For instance, our model assumes that all computers have the same infection rate, the same bursting rate, and the same curing rate. In reality, however, these rates vary from computer to computer. Hence, our model should be generalized so that different nodes have different infection rates, different bursting rates, and different curing rates. Additionally, that computers are likely to be infected by removable storage media [39] may lead to the emergence of a non-trivial steady state. In this situation, it makes sense to suppress the fraction of the infected nodes. Third, the immunization strategy we adopt also has significant impact on the viral prevalence. To a certain extent, the static immunization problem reduces to that of assigning different curing rates to different nodes so that the best virus containment effect is achieved, given that the sum of curing rates of all nodes is fixed [33, 40], while the dynamic immunization problem can be solved by use of the optimal control theory [41]. Last, but not least, the methodology developed in this work can be applied to the situation of infectious diseases [4245].

Acknowledgments

The authors are grateful to the two anonymous reviewers and the editor for their valuable comments and suggestions. This work is supported by China Scholarship Council (Grant No. 201406050107).

Author Contributions

Conceived and designed the experiments: LY. Performed the experiments: LY. Wrote the paper: LY XY MD.

References

  1. 1. Kephart JO, White SR. Directed-graph epidemiological models of computer viruses. in: Proc. 1991 IEEE Comput. Soc. Symp. Res. Secur. Privacy 1991; 343–359.
  2. 2. Kephart JO, White SR. Measuring and modeling computer virus prevalence. in: Proc. 1993 IEEE Comput. Soc. Symp. Res. Secur. Privacy 1993; 2–15.
  3. 3. Ren J, Yang X, Zhu Q, Yang LX, Zhang C. A novel computer virus model and its dynamics. Nonliear Anal. RWA 2012;13: 376–384.
  4. 4. Gan C, Yang X, Liu W, Zhu Q. A propagation model of computer virus with nonlinear vaccination probability. Commun. Nonlinear Sci. Numer. Simulat. 2014;19: 92–100.
  5. 5. Muroya Y, Enatsu Y, Li H. Global stability of a delayed SIRS computer virus propagation model. Int. J. Comput. Math. 2014;91: 347–367.
  6. 6. Mishra BK, Pandey SK. Dynamic model of worms with vertical transmission in computer network. Appl. Math. Comput. 2011;217: 8438–8446.
  7. 7. Yang X, Yang LX. Towards the epidemiological modeling of computer viruses. Discrete Dyn. Nat. Soc. 2012;2012: Article ID 259671.
  8. 8. Yang LX, Yang X, Zhu Q, Wen L. A computer virus model with graded cure rates. Nonlinear Anal. RWA 2013;14: 414–422.
  9. 9. Balthrop J, Forrest S, Newman MEJ, Williamson MW. Technological networks and the spread of computer viruses. Science 2004;304: 527–529. pmid:15105484
  10. 10. Barabasi AL, Albert R. Emergence of scaling in random networks. Science 1999;286: 509–512. pmid:10521342
  11. 11. Albert R, Barabasi AL. Statistical mechanics of complex networks. Rev. Modern Phys. 2002;74: 47–97.
  12. 12. Ebel H, Mielsch LI, Bornholdt S. Scale-free topology of email networks. Phys. Rev. E 2002;66: Article ID 035103.
  13. 13. Pastor-Satorras R, Vespignani A. Epidemic spreading in scale-free networks. Phys. Rev. Lett. 2001;86: 3200–3203. pmid:11290142
  14. 14. Pastor-Satorras R, Vespignani A. Epidemic dynamics and endemic states in complex networks. Phys. Rev. E 2001;63: Article ID 066117.
  15. 15. Castellano C, Pastor-Satorras R. Thresholds for epidemic spreading in networks. Phys. Rev. Lett. 2010;105: Article ID 218701.
  16. 16. Huang CY, Sun CT. Effects of resource limitations and cost influences on computer virus epidemic dynamics and tipping points. Discrete Dyn. Nat. Soc. 2012;2012: Article ID 473136.
  17. 17. Huang CY, Lee CL, Wen TH, Sun CT. A computer virus spreading model based on resource limitations and interaction costs. J. System Software 2013;86: 801–808.
  18. 18. Yang LX, Yang X, Liu J, Zhu Q, Gan C. Epidemics of computer viruses: A complex-network approach. Appl. Math. Comput. 2013;219: 8705–8717.
  19. 19. Yang LX, Yang X. The spread of computer viruses over a reduced scale-free network. Physcica A 2014;396: 173–184.
  20. 20. Anderson RM, May RM. Infectious Diseases of Humans. Oxford University Press; 1992.
  21. 21. Allen EJ. Stochastic differential equations and persistence time for two interacting populations. Dyn. Continuous Discrete Implusive System. 1999;5: 271–281.
  22. 22. Allen LJ, Allen EJ. Comparison of three different stochastic population models with regard to persistence time. Theor. Pop. Biol. 2003;64: 439–449.
  23. 23. Ganesh A, Massoulie L, Towsley D. The effect of network topology on the spread of epidemics. INFOCOM 2005. 24th Annual Joint Conf. IEEE Computer Communications Societies. 2005;2: 1455–1466.
  24. 24. Banerjee S, Chatterjee A, Shakkottai S. Epidemic thresholds with external agents; Available: arXiv:1312.0938v1. Accessed 3 Dec 2013.
  25. 25. Draief M, Ganesh A, Massoulie L. Thresholds for virus spread on networks. Ann. Appl. Probab. 2008;18: 359–378.
  26. 26. Wang Y, Chakrabarti D, Wang C, Faloutsos C. Epidemic spreading in real networks: an eigenvalue point. in 22nd Int. Symp. Reliable Distrib. System 2003; 25–34.
  27. 27. Mieghem PV, Omic J, Kooij R. Virus spread in networks. IEEE/ACM Trans. Networking 2009;17: 1–14.
  28. 28. Youssef M, Scoglio C. An indibidual-based approach to SIR epidemics in contact networks. J. Theo. Biol. 2011;283: 136–144.
  29. 29. Sahneh FD, Scoglio C. Epidemic spread in human networks. 50th IEEE Conf. Decision Control and European Control Conf. 2011.
  30. 30. Sahneh FD, Scoglio C. Optimal information dissemination in epidemic networks. 50th IEEE Conf. Decision Control, 2012.
  31. 31. Khanafer A, Basar T, Gharesifard B. Stability properties of infected networks with low curing rates. American Control Conf. 2014.
  32. 32. Lin Y, Lui JC. Modelling multi-state diffusion process in complex networks: theory and applications. J. Comp. Netw. 2014;2: 431–459.
  33. 33. Preciado VM, Zargham M, Enyioha C, Jadbabaie A, Pappas GJ. Optimal resource allocation for network protection against spreading processes. IEEE Trans. Control Netw. System 2014;1: 99–108.
  34. 34. Pastor-Satorras R, Castellano C, Mieghem PV, Vespignan A. Epidemic processes in complex networks; Available: arXiv:1408.2701v1. Accessed 12 Aug 2014.
  35. 35. Yorke JA. Invariance for ordinary differential equations. Theory Comput. Syst. 1967;1: 353–372.
  36. 36. Lajmanovich A, Yorke JA. A deterministic model for gonorrhea in anonhomogenous population. Math. Biosci. 1976;28: 221–236.
  37. 37. Mieghem PV. Graph Spectra for Complex Networks. Cambridge University Press; 2012.
  38. 38. Robinson RC. An Introduction to Dynamical Systems: Continuous and Discrete. Prentice Hall; 2004.
  39. 39. Yang LX, Yang X. The spread of computer viruses under the influence of removable devices. Appl. Math. Comput. 2012;219: 3914–3922.
  40. 40. Shakeri H, Sahneh FD, Scoglio C. Optimal information dissemination strategy to promote preventive behaviours in multilayer epidemic networks. Math. Biosc. Eng. 2015;12: 609–623.
  41. 41. Eshghi S, Khouzani M, Sarkar S, Venkatesh S. Optimal patching in clustered malware epidemics, IEEE/ACM Trans. Networking
  42. 42. Sun GQ, Liu QX, Jin Z, Chakraborty A, Li BL. Influence of infection rate and migration on extinction of disease in spatial epidemics. J. Theo. Biol. 2010;264: 95–103.
  43. 43. Wang Y, Jin Z, Yang Z, Zhang ZK, Zhou T, Sun GQ. Global analysis of an SIS model with an infective vector on complex networks. Nonlinear Anal. RWA 2012;13: 543–557.
  44. 44. Zhang X, Sun GQ, Zhu YX, Ma J, Jin Z. Epidemic dynamics on semi-directed complex networks. Math. Biosci. 2013;246: 242–251. pmid:24140877
  45. 45. Jin Z, Sun GQ, Zhu HP. Epidemic models for complex networks with demographics. Math. Biosc. Eng. 2014;11: 1295–1317.