The application of epidemiology to computer viruses
Computers and Security
A mathematical theory for the spread of computer viruses
Computers and Security
IEEE Spectrum
The influence of individual differences on skill in end-user computing
Journal of Management Information Systems
The Mathematics of Infectious Diseases
SIAM Review
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
Directions for Web and E-Commerce Applications Security
WETICE '01 Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Measuring and Modeling Computer Virus Prevalence
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Worm propagation modeling and analysis under dynamic quarantine defense
Proceedings of the 2003 ACM workshop on Rapid malcode
The monitoring and early detection of internet worms
IEEE/ACM Transactions on Networking (TON)
A strategic analysis of inter organizational information sharing
Decision Support Systems
Knowledge flow network planning and simulation
Decision Support Systems
Short Term and Total Life Impact analysis of email worms in computer systems
Decision Support Systems
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
IEEE Transactions on Dependable and Secure Computing
The impact of countermeasure propagation on the prevalence of computer viruses
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Secure knowledge management: confidentiality, trust, and privacy
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
A social community based approach for reducing the propagation of infectious diseases in healthcare
ACM SIGMOBILE Mobile Computing and Communications Review
The dark side of the Internet: Attacks, costs and responses
Information Systems
A computer virus spreading model based on resource limitations and interaction costs
Journal of Systems and Software
Effective immunization of online networks: a self-similar selection approach
Information Technology and Management
Hi-index | 0.01 |
Nowadays, for information systems at organizational and interorganizational levels, information sharing is essential for business operations and strategic decision-making. As a mixed blessing, however, the information sharing process also exposes information systems to more severe virus attacks. In light of this, research efforts on virus propagation and virus control have drawn increasing interests in both the academic and industrial domains. This paper thus presents a virus propagation model, namely E-SEIR, to gain insights of virus propagation in networks with Point-to-Group (P2G) information sharing patterns. Unlike most existing virus propagation models, E-SEIR has three important characteristics. First, an additional exposed state is integrated into the model to describe the latent period of computer viruses. Second, a P2G infection function is introduced to the model to characterize the real-world networks, which consist of many information-sharing sub-networks. Third, E-SEIR takes various antivirus countermeasures into consideration, which provides unique opportunities for studying the behaviors of virus propagation with the presence of antivirus activities. Based on this E-SEIR model, we have studied the possibility of short-term virus outbreaks and long-term network survivability, and the results revealed some key managerial insights that are helpful for the practice of virus propagation control in information sharing networks.