References
- G. Birkoff and G. C. Rota, Ordinary Differential Equations, Ginn, Waltham, MA, 1982
- F. Castaneda, E. C. Sezer and J. Xu, Worm vs. worm: Preliminary study of an active counter-attack mechanism, Proceedings of the 2004 ACM Work-Shop on Rapid Malcode, Washington, DC, 2004, pp. 83–93
- Z. Chen, L. Gao and K. Kwiat, Modeling the spread of active worms, Proceedings of INFOCOM 2003, San Francisco, CA, April, 2003
- H. I. Freedman and P. Waltman, Persistence in model of three interacting predator-prey populationMath. Biosci. 68 (1984), pp. 213–231 doi: 10.1016/0025-5564(84)90032-4
- T. K. Kar and A. Batabyal, Persistence and stability of a two prey one predator systemIJEST 2(2) (2010), pp. 174–190
- T. K. Kar and K. S. Chaudhury, Harvesting in a two-prey one-predator fisheryANZIAM J. 45 (2004), pp. 443–456 doi: 10.1017/S144618110001347X
- B. K. Mishra and G. M. Ansari, Predator–prey models for the attack of malicious objects in computer networkJ. Eng. Appl. Sci. 4(3) (2009), pp. 215–220
- B. K. Mishra and N. Keshri, Mathematical model on the transmission of worms in wireless sensor networkAppl. Math. Model. 37(11) (2013), pp. 4103–4111 doi: 10.1016/j.apm.2012.09.025
- D. Nicol and M. Liljenstam, Models and analysis of active worm defense, Proceeding of Mathematical Methods, Models and Architecture for Computer Networks Security Workshop, St. PetersburgRussia, 2005, pp. 38–53
- R. Rathna and A. Sivasubramanian, Improving energy efficiency in wireless sensor networks through scheduling and routingIJASSN 2(1) (2012), pp. 21–27 doi: 10.5121/ijassn.2012.2103
- H. Toyoizumi and A. Kara, Predators: Good will mobile codes combat against computer viruses, Proceedings of the 2002, Workshop on New security Paradigms (NSPW’02), Virginia Beach, VA, 2002, pp. 11–17