iconOpen Access

ARTICLE

crossmark

Computational Analysis for Computer Network Model with Fuzziness

by Wafa F. Alfwzan1, Dumitru Baleanu2,3,4, Fazal Dayan5,*, Sami Ullah5, Nauman Ahmed4,6, Muhammad Rafiq7,8, Ali Raza4,9

1 Department of Mathematical Sciences, College of Science, Princess Nourah bint Abdulrahman University, P. O. Box 84428, Riyadh, 11671, Saudi Arabia
2 Department of Mathematics, Cankaya University, Balgat, Ankara, 06530, Turkey
3 Institute of Space Sciences, Magurele-Bucharest, 077125, Romania
4 Department of Computer Science and Mathematics, Lebanese American University, Beirut, Lebanon
5 Department of Mathematics, School of Science, University of Management and Technology, Lahore, 54000, Pakistan
6 Department of Mathematics and Statistics, University of Lahore, Lahore, 54590, Pakistan
7 Department of Mathematics, Faculty of Science and Technology, University of Central Punjab, Lahore, 54000, Pakistan
8 Near East University, Mathematics Research Center, Department of Mathematics, Near East Boulevard, PC: 99138, Nicosia/Mersin 10, Turkey
9 Department of Mathematics, Govt. Maulana Zafar Ali Khan Graduate College Wazirabad, Punjab Higher Education Department (PHED), Lahore, 54000, Pakistan

* Corresponding Author: Fazal Dayan. Email: email

(This article belongs to the Special Issue: Human Behaviour Analysis using Fuzzy Neural Networks)

Intelligent Automation & Soft Computing 2023, 37(2), 1909-1924. https://doi.org/10.32604/iasc.2023.039249

Abstract

A susceptible, exposed, infectious, quarantined and recovered (SEIQR) model with fuzzy parameters is studied in this work. Fuzziness in the model arises due to the different degrees of susceptibility, exposure, infectivity, quarantine and recovery among the computers under consideration due to the different sizes, models, spare parts, the surrounding environments of these PCs and many other factors like the resistance capacity of the individual PC against the virus, etc. Each individual PC has a different degree of infectivity and resistance against infection. In this scenario, the fuzzy model has richer dynamics than its classical counterpart in epidemiology. The reproduction number of the developed model is studied and the equilibrium analysis is performed. Two different techniques are employed to solve the model numerically. Numerical simulations are performed and the obtained results are compared. Positivity and convergence are maintained by the suggested technique which are the main features of the epidemic models.

Keywords


1  Introduction

A computer virus is a type of malicious software (malware) that is designed to replicate itself and spread to other computers, often with the intent of causing damage to the infected system or stealing sensitive information. Computer viruses can be spread through email attachments, infected software downloads, malicious websites, or by exploiting vulnerabilities in the operating system or other software on a computer. Once a virus infects a computer, it can perform various harmful activities, such as deleting or corrupting files, stealing personal information, or using the computer as part of a botnet to launch attacks on other computers. To protect against computer viruses, it’s important to use anti-virus software and keep it up to date, avoid downloading files or clicking links from untrusted sources, and keep your operating system and other software up to date with the latest security patches. It’s also important to be cautious when opening email attachments or clicking on links, and to always verify the authenticity of messages or requests from unfamiliar sources. Morri’s worm was one of the first computer worms to gain widespread attention. It exploited vulnerabilities in UNIX systems to replicate itself and caused significant disruption to the early internet. Melissa was one of the first email-based viruses to spread rapidly across the internet. It was a macro virus that infected Microsoft Word documents and then spread to other documents and email contacts. I LOVE YOU virus was a computer worm that spread through email and internet messaging systems. It was a simple virus that tricked users into opening an attachment that contained the virus code. Code Red was a worm that targeted Microsoft IIS web servers. It was able to replicate itself and caused significant disruption to internet traffic. Nimda was a worm that spread through email and network shares. It was able to infect a computer by exploiting multiple vulnerabilities in web servers and email systems. Sasser was a worm that spread through network shares and caused significant disruption to computer systems. It was able to infect a computer without any user interaction. Conficker was a worm that spread through network shares and USB drives. It was able to infect millions of computers worldwide and was difficult to detect and remove [1].

Mathematical modeling of computer viruses involves creating mathematical models that can simulate the behavior and spread of a virus within a computer network or system. Such models can help researchers understand the dynamics of virus spread and predict the potential impact of different virus control strategies. There are several mathematical models used to study the spread of computer viruses. Yang et al. developed the SLBS computer model for studying virus propagation [2], while Ahmed et al. proposed a Spatio-temporal computer virus model [3]. Ali et al. investigated virus propagation using padé approximation [4], and Ebenezer et al. developed a fractional model that accounted for the interaction between computers and removable devices [5]. Lanz et al. presented a virus model that included a quarantine strategy [6], and Xu et al. proposed a new model with a limited antivirus capacity [7]. Parsaei et al. developed a novel mathematical model of computer viruses [8], while Deng et al. presented a Susceptible-Infected-Recovered-Dead (SIRD) model and examined the virus transmission mechanisms [9]. Finally, Tuwairqi et al. suggested two computer virus-propagation isolation strategies [10]. Mathematical models were developed by numerous writers in the past to study the transmission of computer viruses [1119].

The concepts of susceptible, infectious, and recovered are uncertain in the sense that different individuals in the population have varying degrees of susceptibility, infectivity, and recovery. Such differences can occur when different population groups have different habits and customs, and different age groups have varying degrees of resistance, etc. More realistic models that take into account the individuals’ varying degrees of susceptibility, infectivity, and recovery are required. Such uncertainty can be handled by fuzzy theory. Fuzzy theory is effective at solving complex problems characterized by environmental uncertainty and information fuzziness. It enables the handling of uncertain and imprecise knowledge and provides a powerful reasoning framework. Zadeh first proposed the fuzzy theory in 1965 [20]. Many researchers have applied fuzzy theory to epidemiology. The fuzzy theory has been applied in various ways to develop and enhance epidemic models. Epidemic models with fuzzy transmission coefficients were studied by Mondal et al. [21]. Mishra et al. proposed a Susceptible Infectious–Recovered–Susceptible (SIRS) model for the fuzzy transmission of worms in a computer network. The three cases of epidemic control strategies of worms in the computer network–low, medium, and, high–are analyzed. Numerical methods are employed to solve and simulate the system of equations developed [22]. Padmapriya et al. investigated a model for COVID-19 prediction using a Caputo fractional derivative in a fuzzy sense. The model's numerical results for COVID-19 in the United States, India, and Italy are presented. Future outbreaks, the effectiveness of preventive measures, and potential infection control strategies are also estimated [23]. Korenevskiy et al. studied kidney injuries on the basis of fuzzy models [24]. Adak et al. proposed a mathematical model with arbitrary disease transmission and treatment control functions. The disease transmission and treatment functions are considered as fuzzy numbers [25]. Sambas et al. examined the chaotic behavior and designed a type-2 fuzzy controller for the Permanent Magnet Synchronous Generator (PMSG) in a wind turbine system [26]. Sambas et al. developed a fractional-order model financial risk dynamical system and studied its periodic and chaotic behaviors [27]. Fuzzy control is proposed and numerical simulations are performed.

The mathematical and numerical modeling of diseases makes substantial use of the NSFD theory, which Mickens proposed [28]. Allehiany et al. studied a Covid-19 model with fuzziness using the NSFD scheme for its numerical solution [29]. Alhebshi et al. investigated a computer virus model with fuzzy criteria [30]. Equilibrium and reproduction analysis is performed for the studied model. Forward Euler and NSFD schemes were used for the numerical solution of the model. The NSFD scheme was found to be preserving stability, convergence and positivity while the forward Euler method failed to preserve these important features of the epidemic models. Many other researchers also used the NSFD method and fuzzy theory in their studies [3133], just to mention a few. The current work extends the computer virus propagation model by including fuzzy parameters, which enables a more thorough explanation of how infections spread within computers. The first-order explicit scheme's creation, implementation, and mathematical analysis in fuzzy environments with NSFD settings, specifically with fuzzy parameters, are novel aspects of the created technique.

2  Formulation of the Model and Mathematical Analysis

Consider the following system of 5th first order ordinary differential equations representing the SEIQRS model.

dSdt=AβSIbS+ηR.(1)

dEdt=βSI(b+μ)E.(2)

dIdt=μE(b+α+γ+δ)I.(3)

dQdt=δI(b+α+ϵ)Q.(4)

dRdt=γI+ϵQ(b+η)R.(5)

The corresponding model with fuzzy parameters can be written as

dSdt=Aβ(ρ)SIbS+ηR.(6)

dEdt=β(ρ)SI(b+μ)E.(7)

dIdt=μE(b+α(ρ)+γ(ρ)+δ)I.(8)

dQdt=δI(b+α(ρ)+ϵ)Q.(9)

dRdt=γI+ϵQ(b+η)R.(10)

The average effective interactions with other nodes per unit of time, crashing of nodes due to the attack of malicious objects and recovery from infection are considered fuzzy numbers due to their uncertain natures. These parameters are denoted by β(ρ), α(ρ) and γ(ρ), respectively, and are defined below. Fig. 1 shows the flowchart of the model. Detail of the other variables and parameters are given in Tables 1 and 2 respectively.

images

Figure 1: Flowchart of the model

images

images

β(ρ)={0,ρρminρρminρMρmin,ρmin<ρρM1,ρM<ρ,(11)

γ(ρ)=γ01ρMρ+1,0ρρmin,(12)

and

α(ρ)={(1ρ)ϵ0ρminρ+ϵ0,0ρρmin1ρ,ρmin<ρ..(13)

2.1 The Fuzzy Basic Reproductive Number (BRN) R0f

The BRN R0 is given by

R0=β(ρ)(Ab)μ+α(ρ)+δ+γ(ρ)+b.(14)

Since R0 is a direct function of a computer virus ρ can be analyzed as follows:

Case 1: If ρ<ρmin, then we have β(ρ)=0 and we obtain,

Rh(ρ)=0.

Case 2: If ρmin<ρρM, then we have β(ρ)=ρρminρMρmin and we obtain,

R0=β(ρ)(Ab)μ+α+δ+γ+b.

Case 3: If ρM<ρ<ρmax, then we have β(ρ)=1 and we obtain,

R0=(Ab)μ+α+δ+γ+b.

R0(ρ) can be expressed as

R0(ρ)=(0,β(ρ)(Ab)μ+α(ρ)+δ+γ(ρ)+b,Abμ+α(ρ)+δ+γ(ρ)+b).

The fuzzy reproduction number can be found as follows:

R0f=E[Rh(ρ)],=Ab(2β(ρ)+1)μ+α(ρ)+δ+γ(ρ)+b.

2.2 Equilibrium Analysis

Case 1: If ρ<ρmin, we obtain:

E0(S0,E0,I0,Q0,R0)=(Ab,0,0,0,0).

Case 2: If ρmin<ρρM, then we have β(ρ)=ρρminρMρmin and we obtain E(S,E,I,Q,R), where

S=AbR0,E=b(R01)β(ρ),I=R01β(ρ)(μbb+α(ρ)),Q=R01β(ρ)(δbϵ+b+α(ρ)),R=R01β(ρ)(γ+ϵδηη+ϵ+b+α(ρ)).

Case 3: If ρM<ρ<ρmax, then we have β(ρ)=1 and we obtain E(S,E,I,Q,R), where

S=AbR0,E=b(R01)β(ρ),I=R01β(ρ)(μbb+α(ρ)),Q=R01β(ρ)(δbϵ+b+α(ρ)),R=R01β(ρ)(γ+ϵδηη+ϵ+b+α(ρ)).

2.3 Sensitivity Analysis

For β we have

ξ(β)=β(ρ)R0.dR0dβ(ρ)=β(ρ)β(ρ)(Ab)μ+α(ρ)+δ+γ(ρ)+b..d(β(ρ)(Ab)μ+α(ρ)+δ+γ(ρ)+b)dβ(ρ)=1.

Similarly,

ξ(d)=bR0.dR0db=(μ+α(ρ)+δ+γ(ρ)+2d)d2β(ρ)A(μ+α(ρ)+δ+γ(ρ)+b),

ξ(η)=ηR0.dR0dη=0,

ξ(μ)=μR0.dR0dμ=μ(μ+α+δ+γ+b),

ξ(α)=αR0.dR0dα=α(ρ)(μ+α(ρ)+δ+γ(ρ)+b),

ξ(γ)=γR0.dR0dγ=γ(μ+α(ρ)+δ+γ(ρ)+b),

ξ(δ)=δR0.dR0dδ=δ(μ+α(ρ)+δ+γ(ρ)+b),

ξ(ϵ)=ϵR0.dR0dϵ=ϵ(μ+α(ρ)+δ(ρ)+γ+b),

ξ(A)=AR0.dR0dA=βb(μ+α(ρ)+δ+γ(ρ)+b).

3  Numerical Modelling

3.1 Forward Euler Method

Sn+1=Sn+h(Aβ(ρ)SnInbSn+ηRn),(15)

En+1=En+h(β(ρ)SnIn(b+μ)En),(16)

In+1=In+h(μEn(b+α(ρ)+γ(ρ)+δ)In),(17)

Qn+1=Qn+h(δIn(b+α(ρ)+ϵ)Qn),(18)

Rn+1=Rn+h(γ(ρ)In+ϵQn(b+η)Rn).(19)

3.2 NSFD Scheme

Sn+1=Sn+h(A+ηRn)1+h(β(ρ)in+hb)(20)

En+1=Sn+hβ(ρ)snIn1+h(b+μ),(21)

In+1=In+hμEn1+h(b+α(ρ)+γ(ρ)+δ),(22)

Qn+1=Qn+hδIn1+h(b+α(ρ)+ϵ),(23)

Rn+1=Rn+(γ(ρ)In+ϵQn)h1+h(b+μ).(24)

3.2.1 Convergence Analysis

In this section convergence analysis of the NSFD scheme of the SEIQR model will be done at disease free equilibrium (DFE) point.

A1=S+h(A+ηR)1+h(β(ρ)I+hb),

A2=S+hβ(ρ)SI1+h(b+μ),

A3=I+hμE1+h(b+α(ρ)+γ(ρ)+δ),

A4=Q+hδI1+h(b+α(ρ)+ϵ),

A5=R+(γ(ρ)I+ϵQ)h1+h(b+μ).

J=[dA1dsdA1dedA1didA1drdA1dvdA2dsdA2dedA2didA2drdA2dvdA3dsdA4dsdA5dsdA3dedA4dedA4dedA3didA4didA4didA3drdA4drdA4drdA3dvdA4dvdA4dv],

J=[11+h(β(ρ)I+b)0hβ(ρ)(S+h(A+ηR)(1+h(β(ρ)I+b))2β(ρ)I1+h(b+μ)11+h(b+μ)β(ρ)S1+h(b+μ)0hμ1+h(b+α(ρ)+γ(ρ)+δ)11+h(b+α(ρ)+γ(ρ)+δ)00hδ1+h(b+α(ρ)+ϵ)00hγ(ρ)1+h(b+μ)×0hη1+h(β(ρ)I+b)000011+h(b+α(ρ)+ϵ)0hϵ1+h(b+μ)11+h(b+μ)]

Jacobian at the DFE is

J(p0)=[11+hb00011+h(b+μ)00hμ1+h(b+α(ρ)+γ(ρ)+δ)11+h(b+α(ρ)+γ(ρ)+δ)00hδ1+h(b+α(ρ)+ϵ)00hγ(ρ)1+h(b+μ)×011+hb000011+h(b+α(ρ)+ϵ)0hϵ1+h(b+μ)11+h(b+μ)]

Here

λ1=λ5=11+hb,λ2=11+h(b+µ),λ3=11+h(b+α(ρ)+γ(ρ)+δ),λ4=11+h(b+α(ρ)+ϵ).

3.2.2 Consistency Analysis

In this section, the consistency analysis of the NSFD integration scheme is performed by using Taylor’s series expansion.

From Eq. (20), we have

Sn+1(1+h(β(ρ)in+hb))=Sn+h(A+ηRn).(25)

Taylor’s series expansions of Sn+1 is given below:

Sn+1=Sn+hdsdt+h22!d2sdt2+h33!d3sdt3+,

Apply Taylor’s series expansions of Sn+1 to the Eq. (25), we have

Sn+Snh(βin+hb)+hdsdt+hdsdt(h(βin+hb))+h22!d2sdt2+h22!d2sdt2(h(βin+hb))+h33!d3sdt3(1+h(βin+hb))+=Sn+h(A+ηRn).

By applying h0, we obtain as follows:

Snβin+dsdt=(A+ηRn),

dsdt=(A+ηRn)Snβin,

Or

dSdt=(A+ηR)Sβ(ρ)I.

Similarly, from Eq. (21), we have

En+1(1+h(b+μ))=En+hβ(ρ)snIn.(26)

Taylor’s series expansions of En+1 is given below:

En+1=En+hdEdt+h22!d2Edt2+h33!d3Edt3+.

From Eq. (26), we have

(En+hdEdt+h22!d2Edt2+h33!d3Edt3+)(1+h(b+μ))=En+hβ(ρ)snIn,

By applying h0, we obtain as follows:

En(b+μ)+dEdt=β(ρ)snIn,

dEdt=β(ρ)snInEn(b+μ),

dEdt=β(ρ)SIE(b+μ).

From Eq. (22), we have

In+1(1+h(b+α+γ+δ))=In+hμEn,(27)

Applying Taylor’s series expansions of In+1 is given by

In+1=In+hdIdt+h22!d2Idt2+h33!d3Idt3+,

Eq. (27) becomes

(In+hdIdt+h22!d2Idt2+h33!d3Idt3+)(1+h(b+α+γ+δ))=In+hμEn,

By applying h0, we obtain as follows:

dIdt=μEI(b+α+γ+δ).

Similarly, taking the last two equations and applying Taylor’s series expansions of Qn+1 and Rn+1, we obtain as follows

dQdt=δIQ(b+α+ϵ),

dRdt=(γI+ϵQ)R(b+μ).

Hence, our discretized implicit numerical integration scheme is consistent with the ODES above system.

4  Numerical Simulations

The graphical results of the two schemes developed above are shown and their behavior is discussed in this section.

Dynamics of the subpopulations are shown in Fig. 2 for DFE and EE points at different step sizes using Euler’s method. All compartments of the studied model are clearly converging to their steady states in all three cases at small step sizes. The method starts nonphysical oscillations and produces non positive values when the step size is increased slightly in all cases. Positivity is one of the very important features of the epidemic models as negative values in these models are meaningless. Euler’s method does not keep the positivity with an increase in the value of the step size. It can be concluded that the increase in the value of the time step sizes affects the convergence of the scheme. This shows that the method is not a good tool to study the long-term behavior of the model. From this behavior, we also concluded that the method is not suitable to study disease dynamics epidemic models. Fig. 3 shows the graphical behavior of the NSFD scheme for DFE and EE points at different step sizes. This time, the method remains positive and convergent for all values of the step sizes. The graphs are positively converging to their steady states in all cases. The behavior of the method is not affected with an increase in the values of the step size. It can be concluded that the NSFD theory can be used to study the long-term behavior of the model. This is an interesting feature of the developed method which many other classical methods such as Euler and many other do not keep at increasing step sizes. This behavior shows the superiority of the NSFD scheme over Euler’s method in fuzzy conditions. We can conclude from this behavior that the NSFD method is capable of reflecting the dynamics of the studied model in fuzzy conditions. The typical standard schemes that exist in the literature can cause chaos and misleading variations for some passions of the discretization constraints [34,35].

images

Figure 2: Dynamics of subpopulations using Euler’s method

images

Figure 3: Dynamics of subpopulations using NSFD method

Effects of quarantine on infected class are shown in Fig. 4 which displays an inverse relation. The infection decreases as we increase the quarantine and vice versa. In computer networks, quarantine can be an effective method of preventing the spread of viruses and other types of malwares. It is a critical component of network security because it allows network administrators to quickly identify and isolate potentially infected devices before they cause widespread damage. Quarantine can help limit the impact of a virus attack by containing it and preventing it from spreading to other parts of the network. By isolating infected or potentially compromised devices, network administrators can prevent them from infecting other devices or spreading the infection to other parts of the network. In a computer network, quarantine can be implemented in a variety of ways. One approach is to use endpoint security software that can detect and isolate infected devices. For example, antivirus software can be configured to automatically quarantine devices that have been infected with a known virus or malware. NAC solutions can also be used to enforce security policies and restrict network resource access based on predefined criteria. In addition to isolating infected devices, quarantine can be used to limit access to devices that violate security policies. A device that does not have up-to-date antivirus software or has not been patched with the most recent security updates, for example, may be quarantined until the problem is resolved. This can help keep the device from posing a threat to the rest of the network. It is important to note, however, that quarantine is only one component of a comprehensive network security strategy. Other measures to protect against computer viruses include regular patching, employee training, and robust backup and recovery procedures.

images

Figure 4: Effect of quarantine on infected class

5  Conclusion

Epidemic modeling is a useful tool to understand the spread and control of infectious diseases. However, in real world situations, the parameters used to model the disease may not be precisely known. In such situations, fuzzy theory can be used to incorporate uncertainty into the models. A SEIQR mathematical model for computer virus propagation with fuzzy parameters by introducing forward Euler and NSFD techniques is investigated in this work. It is assumed that the virus transmission and the recovery of the infected computers are not the same for all PC’s under consideration. These are treated as fuzzy numbers depending on the amount of the virus on the single individual PC. In classical models, each parameter is assigned a fixed value independent of the virus load. In this context, the model with fuzziness is more valuable and reliable. The model is analyzed mathematically. Equilibrium analysis, reproduction analysis and stability analysis are performed for the studied model. From a mathematical perspective, the model has produced three equilibrium points that can be used to represent disease-free and endemic conditions, respectively. Two different numerical techniques are used to solve the model numerically and the simulation results are compared. The NSFD approach preserved the essential features of the disease dynamical models like convergence and positivity etc. for all values of the step sizes. The forward Euler method approach is contrasted with the suggested method. According to the simulation, the Euler method was unable to produce an accurate result, even at very small step sizes. Fuzzy theory can be a useful tool in network security to detect and prevent virus spread. It can handle uncertainty and imprecision in disease data. Traditional epidemiological models frequently assume that everyone in a population is either susceptible, infected, or recovered, with no gray area in between. Individuals may have varying degrees of susceptibility or immunity to a disease, which can affect disease spread in a population. Individuals in a population's susceptibility or immunity can be modeled using fuzzy theory. Each individual can be assigned a degree of membership based on their age, health status, vaccination status, and other relevant factors. The model can then calculate each individual's overall risk, which can help predict their likelihood of becoming infected or spreading the disease. Fuzzy theory can be used to model and analyze the spread of infectious diseases in mathematical epidemiology. The major objective of the current work is to incorporate triangular fuzzy numbers as membership functions. The membership functions of the trapezoidal, pentagonal, and other fuzzy numbers can likewise serve as potential future directions for us. Stochastic, delayed, and fractional dynamics with the fuzziness of the studied model can also be considered as a future direction. This study will open some new windows for researchers in this field. Delayed, stochastic and fractional models respectively with fuzziness and many more directions can also be considered as future directions.

Acknowledgement: Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2023R 371), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Funding Statement: The authors received no specific funding for this study.

Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study.

References

1. M. S. Arif, A. Raza, M. Rafiq, M. Bibi, J. N. Abbasi et al., “Numerical simulations for stochastic computer virus propagation model,” Computers, Materials & Continua, vol. 62, no. 1, pp. 61–77, 2020. [Google Scholar]

2. L. X. Yang, X. Yang, L. Wen and J. Liu, “A novel computer virus propagation model and its dynamics,” International Journal of Computer Mathematics, vol. 89, no. 17, pp. 2307–2314, 2012. [Google Scholar]

3. N. Ahmed, U. Fatima, S. Iqbal, A. Raza, M. Rafiq et al., “Spatio-temporal dynamics and structure preserving algorithm for computer virus model,” Computers, Materials & Continua, vol. 68, no. 1, pp. 201– 212, 2021. [Google Scholar]

4. J. Ali, M. Saeed, M. Rafiq and S. Iqbal, “Numerical treatment of nonlinear model of virus propagation in computer networks: An innovative evolutionary padé approximation scheme,” Advances in Difference Equations, vol. 18, no. 1, pp. 214–228, 2018. [Google Scholar]

5. B. Ebenezer, N. Farai and A. S. Kwesi, “Fractional dynamics of computer virus propagation,” Science Journal of Applied Mathematics and Statistics, vol. 3, no. 3, pp. 63–69, 2015. [Google Scholar]

6. D. Rogers Lanz and T. L. Alford, “An epidemic model of malware virus with quarantine,” Journal of Advances in Mathematics and Computer Science, vol. 33, no. 4, pp. 1–10, 2019. [Google Scholar]

7. Y. H. Xu, J. G. Ren and G. Q. Sun, “Propagation effect of a virus outbreak on a network with limited antivirus ability,” PloS One, vol. 11, no. 10, pp. 1–18, 2016. [Google Scholar]

8. M. R. Parsaei, R. Javidan, N. S. Kargar and H. S. Nik, “On the global stability of an epidemic model of computer viruses,” Theory in Biosciences, vol. 136, no. 3, pp. 169–178, 2017. [Google Scholar] [PubMed]

9. Y. Deng, Y. Pei and C. Li, “Parameter estimation of a susceptible-infected–recovered-dead computer worm model,” Simulation, vol. 98, no. 3, pp. 209–220, 2022. [Google Scholar]

10. S. M. A. Tuwairqi and W. S. Bahashwan, “The impact of quarantine strategies on malware dynamics in a network with heterogeneous immunity,” Mathematical Modelling and Analysis, vol. 27, no. 2, pp. 282–302, 2022. [Google Scholar]

11. K. Mishra and N. Jaha, “SEIQRS model for the transmission of malicious objects in computer network,” Applied Mathematical Modeling, vol. 34, no. 3, pp. 710–715, 2010. [Google Scholar]

12. J. R. C. Piqueira, A. A. D. Vasconcelos, C. E. C. J. Gabriel and V. O. Araujo, “Dynamic models for computer viruses,” Computers and Security, vol. 27, no. 7, pp. 355–359, 2008. [Google Scholar]

13. J. R. C. Piqueira and V. O. Araujo, “A modified epidemiological model for computer viruses,” Applied Mathematics and Computation, vol. 2, no. 13, pp. 355–360, 2009. [Google Scholar]

14. X. Han and Q. Tan, “Dynamical behavior of computer virus on internet,” Applied Mathematics and Computation, vol. 2, no. 17, pp. 2520–2526, 2010. [Google Scholar]

15. Q. Zhu, X. Yang and J. Ren, “Modeling and analysis of the spread of computer virus,” Communication in Nonlinear Science and Numerical Simulation, vol. 17, no. 12, pp. 5117–5124, 2012. [Google Scholar]

16. T. Dong, X. Liao and H. Li, “Stability and Hopf bifurcation in a computer virus model with multistate antivirus,” Abstract and Applied Analysis, vol. 1, no. 4, pp. 1–16, 2012. [Google Scholar]

17. L. Feng, X. Liao, H. Li and Q. Han, “Hopf bifurcation analysis of a delayed viral infection model in computer networks,” Mathematical and Computer Modelling, vol. 56, no. 8, pp. 167–179, 2012. [Google Scholar]

18. C. Gan, X. Yang and Q. Zhu, “Propagation of computer virus under the influences of infected external computers and removable storage media: Modeling and analysis,” Nonlinear Dynamics, vol. 78, no. 2, pp. 1349–1356, 2014. [Google Scholar]

19. A. Raza, M. Shoaib Arif, M. Rafiq, M. Bibi, M. Naveed et al., “Numerical treatment for stochastic computer virus,” Computer Modeling in Engineering & Sciences, vol. 120, no. 2, pp. 445–465, 2019. [Google Scholar]

20. L. A. Zadeh, “Fuzzy sets,” Information Control, vol. 8, no. 3, pp. 338–353, 1965. [Google Scholar]

21. P. K. Mondal, S. Jana, P. Haldar and T. K. Kar, “Dynamical behavior of an epidemic model in a fuzzy transmission,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 23, no. 5, pp. 651–665, 2015. [Google Scholar]

22. B. K. Mishra and S. K. Pandey, “Fuzzy epidemic model for the transmission of worms in computer network,” Nonlinear Analysis: Real World Applications, vol. 11, no. 5, pp. 4335–4341, 2010. [Google Scholar]

23. V. Padmapriya and M. Kaliyappan, “Fuzzy fractional mathematical model of COVID-19 epidemic,” Journal of Intelligent & Fuzzy Systems, vol. 42, no. 4, pp. 3299–3321, 2022. [Google Scholar]

24. N. Korenevskiy, S. S. Petrovich, R. T. Al-Kasasbeh, A. A. Alqaralleh, G. V. Siplivyj et al., “Managing infectious and inflammatory complications in closed kidney injuries on the basis of fuzzy models,” International Journal of Medical Engineering and Informatics, vol. 15, no. 1, pp. 33–44, 2023. [Google Scholar]

25. S. Adak and S. Jana, “Dynamical behavior of an epidemic model with fuzzy transmission and fuzzy treatment control,” Journal of Applied Mathematics and Computing, vol. 68, no. 3, pp. 1929–1948, 2022. [Google Scholar]

26. A. Sambas, A. Mohammadzadeh, S. Vaidyanathan, A. F. Mohamad Ayob, A. Aziz et al., “Investigation of chaotic behavior and adaptive type-2 fuzzy controller approach for permanent magnet synchronous generator (PMSG) wind turbine system,” AIMS Mathematics, vol. 8, no. 3, pp. 5670–5686, 2023. [Google Scholar]

27. A. Sambas, S. He, H. Liu, S. Vaidyanathan, Y. Hidayat et al., “Dynamical analysis and adaptive fuzzy control for the fractional-order financial risk chaotic system,” Advances in Difference Equations, vol. 20, no. 1, pp. 1–12, 2020. [Google Scholar]

28. R. E. Mickens, “A fundamental principle for constructing non-standard finite difference schemes for differential equations,” Journal of Difference Equations and Applications, vol. 11, no. 2, pp. 645–653, 2005. [Google Scholar]

29. F. M. Allehiany, F. Dayan, F. F. Al-Harbi, N. Althobaiti, N. Ahmed et al., “Bio-inspired numerical analysis of COVID-19 with fuzzy parameters,” Computers, Materials & Continua, vol. 72, no. 2, pp. 3213–3229, 2022. [Google Scholar]

30. R. M. Alhebshi, N. Ahmed, D. Baleanu, U. Fatima, F. Dayan et al., “Modeling of computer virus propagation with fuzzy parameters,” Computers, Materials & Continua, vol. 74, no. 3, pp. 1–18, 2023. [Google Scholar]

31. F. Dayan, N. Ahmed, M. Rafiq, A. Akgül, A. Raza et al., “Construction and numerical analysis of a fuzzy non-standard computational method for the solution of an SEIQR model of COVID-19 dynamics,” AIMS Mathematics, vol. 7, no. 5, pp. 8449–8470, 2022. [Google Scholar]

32. S. Baleanu, S. Zibaei, M. Namjoo and A. Jajarmi, “A nonstandard finite difference scheme for the modeling and nonidentical synchronization of a novel fractional chaotic system,” Advances in Difference Equations, vol. 21, no. 1, pp. 1–19, 2021. [Google Scholar]

33. Q. Peng, A. Asif, M. Y. Noor and A. Inam, “A simple tuning algorithm of augmented fuzzy membership functions,” IEEE Access, vol. 8, no. 1, pp. 35805–35814, 2020. [Google Scholar]

34. M. Rafiq, A. Ahmadian, A. Raza, D. Baleanu, M. S. Ahsan et al., “Numerical control measures of stochastic malaria epidemic model,” Computers, Materials & Continua, vol. 65, no. 1, pp. 33–51, 2020. [Google Scholar]

35. M. Naveed, M. Rafiq, A. Raza, N. Ahmed, I. Khan et al., “Mathematical analysis of novel coronavirus (2019-nCov) delay pandemic model,” Computers, Materials & Continua, vol. 64, no. 3, pp. 1401–1414, 2020. [Google Scholar]


Cite This Article

APA Style
Alfwzan, W.F., Baleanu, D., Dayan, F., Ullah, S., Ahmed, N. et al. (2023). Computational analysis for computer network model with fuzziness. Intelligent Automation & Soft Computing, 37(2), 1909-1924. https://doi.org/10.32604/iasc.2023.039249
Vancouver Style
Alfwzan WF, Baleanu D, Dayan F, Ullah S, Ahmed N, Rafiq M, et al. Computational analysis for computer network model with fuzziness. Intell Automat Soft Comput . 2023;37(2):1909-1924 https://doi.org/10.32604/iasc.2023.039249
IEEE Style
W. F. Alfwzan et al., “Computational Analysis for Computer Network Model with Fuzziness,” Intell. Automat. Soft Comput. , vol. 37, no. 2, pp. 1909-1924, 2023. https://doi.org/10.32604/iasc.2023.039249


cc Copyright © 2023 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1039

    View

  • 581

    Download

  • 0

    Like

Share Link