[1] A. Avizienis, J. C. Laprie, B. Randell, and C. Landwehr, “Basic Concepts and Taxonomy of Dependable and Secure Computing,” IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 1, pp. 11-33, 2004.
[3] F. Zhang, J. Li, and J. Li, “Epidemic characteristics of two classic SIS models with disease-induced death,” Journal of Theoretical Biology, vol. 424, pp. 73-83, 2017.
[4] Y. Yang, S. Zhu, and G. Cao, “Improving sensor network immunity under worm attacks: A software diversity approach,” Ad Hoc Networks, vol. 47, pp. 26-40, 2016.
[5] A. Gherbi, R. Charpentier, and M. Couture, “Software Diversity for Future Systems Security,” Journal of Defense Software Engineering, vol. 25, no. 5, pp. 10-13, 2011.
[6] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.-U. Hwang, “Complex Networks: Structure and Dynamics,” Physics Reports, vol. 424, no. 4, pp. 175-308, 2006.
[7] L. Zhang, M. Small, and K. Judd, “Exactly scale-free scale-free networks,” Physica A: Statistical Mechanics and its Applications, vol. 433, pp. 182-197, 2015.
[8] R. Pastor-Satorras and A. Vespignani, “Evolution and Structures of the Internet: A Statistical Physics Approach,” Cambridge University Press, Cambridge, 2004.
[9] R. Pastor-Satorras and A. Vespignani, “Epidemics and Immunization in Scale-Free Networks,” Handbook of Graphs and Networks: From the Genome to the Internet, pp. 111-130, 2005.
[10] M. R. Hasani Ahangar and R. Jalaei, “A Analytical Survey on Botnet and Detection Methods,” Journal of Electronical & Cyber Defence, vol. 4, no. 4, pp. 25-46, 2017. (In Persian)
[11] S. Parsa and A. Gooran Oorimi, “An Optimal and Transparent Framework for Automatic Analysis of Malware,” Advanced Defence Science and Technology, vol. 6, pp. 71-80, 2016. (In Persian)
[13] D. V. Gruzenkin, A. S. Chernigovskiy, and R. Y. Tsarev, “N-version Software Module Requirements to Grant the Software Execution Fault-Tolerance,” in Proceedings of the Computational Methods in Systems and Software, pp. 293-303, 2017.
[14] T. Jackson, B. Salamat, G. Wagner, C. Wimmer, and M. Franz, “On the Effectiveness of Multi-Variant Program Execution for Vulnerability Detection and Prevention,” In Proc. of the 6th International Workshop on Security Measurements and Metrics, pp. 1-7, 2010.
[15] D. Wanduku, “Complete global analysis of a two-scale network SIRS epidemic dynamic model with distributed delay and random perturbations,” Applied Mathematics and Computation, vol. 294, pp. 49-76, 2017.
[16] F. Zhang, J. Li, and J. Li, “Epidemic characteristics of two classic SIS models with disease-induced death,” Journal of Theoretical Biology, vol. 424, pp. 73-83, 2017.
[17] J. Ren and Y. Xu, “A compartmental model for computer virus propagation with kill signals,” Physica A: Statistical Mechanics and its Applications, 2017.
[18] J. Jiang, S. Wen, S. Yu, Y. Xiang, W. Zhou, and H. Hassan, “The structure of communities in scaleāfree networks,” Concurrency and Computation: Practice and Experience, vol. 29, 2017.
[19] S. Koochaki and M. A. Azgomi, “A Method for Fluid Modeling of the Propagation Behavior of Malware in Scale-Free Networks,” Journal of Electronical & Cyber Defence, vol. 4, no. 4, pp. 1-10, 2017. (In Persian)
[20] M. Sun, H. Zhang, H. Kang, G. Zhu, and X. Fu, “Epidemic spreading on adaptively weighted scale-free networks,” Journal of mathematical biology, vol. 74, pp. 1263-1298, 2017.
[21] X. Chu, Z. Zhang, J. Guan, and S. Zhou, “Epidemic spreading with nonlinear infectivity in weighted scale-free networks,” Physica A: Statistical Mechanics and its Applications, vol. 390, pp. 471-481, 2011.
[22] M. Junfen, H. Sun, J. Pan, and J. Zhou, “Weighted Scale-Free Network with Widely Weighted Dynamics,” In: Proceedings of the 30th Chinese Control Conference, pp. 904-909, 2011.
[23] Q. Wu and F. Zhang, “Dynamical behavior of susceptible–infected–recovered–susceptible epidemic model on weighted networks,” Physica A: Statistical Mechanics and its Applications, vol. 491, pp. 382-390, 2018.
[24] A J. O'Donnell and H. Sethu, “On Achieving Software Diversity for Improved Network Security Using Distributed Coloring Algorithms,” In: Proceedings of the 11th ACM Conference on Computer and Communications Security, pp. 1-11, 2004.
[25] P. Macdonald, E. Almaas, and A. L. Barabási, “Minimum Spanning Trees of Weighted Scale-Free Networks,” EPL (Europhysics Letters), vol. 72, no. 2, pp. 1-5, 2005.
[26] P. Driessche, “Reproduction numbers of infectious disease models,” Infectious Disease Modeling, vol. 2, pp. 288-303, 2017.
[27] Y. Wang and J. Cao, “Global Dynamics of a Network Epidemic Model for Waterborne Diseases Spread,” Applied Mathematics and Computation, vol. 237, pp. 474-488, 2014.
[28] M. Roberts and J. Heesterbeek, “Characterizing the next-generation matrix and basic reproduction number in ecological epidemiology,” Journal of mathematical biology, vol. 66, pp. 1045-1064, 2013.
[29] R. M. Ferreira, R. M. de Almeida, and L. G. Brunnet, “Analytic solutions for links and triangles distributions in finite Barabási–Albert networks,” Physica A: Statistical Mechanics and its Applications, vol. 466, pp. 105-110, 2017.