1. Internet security threat report, volume 21, 2016, https://www.microsoft.com/en-us/security/intelligence-report (Accessed 27.04.2018).
2. A genetic epidemiology approach to cyber-security;Gil;Sci. Rep.,2014
3. Web malware spread modelling and optimal control strategies;Liu;Sci. Rep.,2017
4. Novel delay-dependent master-slave synchronization criteria of chaotic Lurie systems with time-varying-delay feedback control;Shi;Appl. Math. Comput.,2016
5. Investigation of the C-SEIRA model for controlling malicious code infection in computer networks;Ahn;Appl. Math. Model.,2015