Volume 71 | Issue 10 | Year 2025 | Article Id. IJMTT-V71I10P109 | DOI : https://doi.org/10.14445/22315373/IJMTT-V71I10P109
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 22 Aug 2025 | 29 Sep 2025 | 17 Oct 2025 | 29 Nov 2025 |
Kaveri Kanchan Kumari, Ashish Kumar Jha, "Analysis of ๐๐ฟ๐ผ๐ด1๐ด2๐R Model in Cyber Space," International Journal of Mathematics Trends and Technology (IJMTT), vol. 71, no. 10, pp. 65-69, 2025. Crossref, https://doi.org/10.14445/22315373/IJMTT-V71I10P109
๐๐ฟ๐ผ๐ด1๐ด2๐R ( Susceptible โ Latent - Infected โ Antidotal -Antivirus โ Quarantine โ Antidotal - Recovered) is the suggested model in this article, which is an extension of the SEIR model. In this model, we discussed the basic Reproduction number for the MFE ( Malicious object Free Equilibrium) point. We talked about the reproduction number ๐ 0 in MFE and EE point using the Hurwitz criterion. If ๐ 0 is less than 1, the MFE point is stable; if ๐ 0is greater than 1, the VFE point is unstable. Numerous parameter graphs are discussed in two and three dimensions.
Antivirus, Endemic Equilibrium, Latent, Malicious Object Free Equilibrium, Threshold Number.
[1] Benjamin DoeRr, Mahmoud Fouz, and Tobias Friedrich,
โWhy Rumors Spread So Quickly in Social Networks,โ Communications of the ACM,
vol. 55, no. 6, pp. 70-75, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[2] W.O.
Kermack, and A.G. McKendrick, โA Contribution to the Mathematical Theory of
Epidemics in Classics of Theoretical Biology (Part Two),โ Bulletin of Mathematical Biology, vol. 53, pp. 33-55, 1991.
[CrossRef] [Google Scholar] [Publisher Link]
[3] William
Ogilvy Kermack, and A.G. McKendrick, โContributions to the Mathematical Theory
of Epidemics-II,โ Proceedings of the
Royal Society A, vol. 138, no. 834, pp. 55-83, 1932.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Bimal Kumar Mishra, and Dinesh Kumar Saini, โSEIRS Epidemic
Model with Time Delay for Transmission of Malicious Objects in Computer Network,โ
Applied Mathematics and Computation, vol.
188, pp. 1476-1482, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[5] M.
Karsai et al., โSmall But Slow World: How Network Topology and Burstiness Slow
Down Spreading,โ Physical Review E,
vol. 83, no. 2, 2011.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Romualdo
Pastor-Satorras, and Alessandro Vespignani, โEpidemic Spreading in Scale-Free
Networks,โ Physical Review Letters,
vol. 86, no. 14, pp. 3200-3203, 2001.
[CrossRef] [Google Scholar] [Publisher Link]
[7] William
Ogilvy Kermack, and A.G. McKendrick, โA Contribution to the Mathematical Theory
of Epidemics,โ The Royal Society A,
vol. 115, no. 772, pp. 700-721, 1927.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Vladimir
A. Skormin et al., โBASIS: A Biological Approach to System Information Security,โ
International Workshop on Mathematical
Methods, Models, and Architectures for Network Security, pp. 127-142, 2001.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Kaveri Kanchan Kumari, Aditya Kumar
Singh, and Sahdeo Mahto, โMathematical Models for Stability in Computer
Network,โ Journal of Computer and
Mathematical Sciences, vol.10, no. 1, pp. 92-98, 2019.
[Google Scholar]
[10] Kaveri Kanchan
Kumari, Aditya Kumar Singh, and Sahdeo Mahto, โTime Delay Seirs E-Epidemic
Model for Computer Network,โ International
Journal of Mathematical Archive, vol. 9, no. 2, pp. 265-273, 2018.
[Publisher Link]