Next Article in Journal
A Multi-Feature Stock Index Forecasting Approach Based on LASSO Feature Selection and Non-Stationary Autoformer
Previous Article in Journal
Utilisation of Artificial Intelligence and Cybersecurity Capabilities: A Symbiotic Relationship for Enhanced Security and Applicability
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Modeling and Analysis in the Industrial Internet with Dual Delay and Nonlinear Infection Rate

by
Jun Wang
1,2,
Jun Tang
1,2,
Changxin Li
1,2,
Zhiqiang Ma
1,2,
Jie Yang
1,2 and
Qiang Fu
1,2,*
1
College of Computer Science and Technology, Shenyang University of Chemical Technology, Shenyang 110142, China
2
Key Laboratory of Intelligent Technology of Chemical Process Industry in Liaoning Province, Shenyang 110142, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(10), 2058; https://doi.org/10.3390/electronics14102058
Submission received: 18 April 2025 / Revised: 13 May 2025 / Accepted: 15 May 2025 / Published: 19 May 2025

Abstract

:
This study proposes a novel virus propagation model designed explicitly for SCADA(supervisory Control and Data Acquisition) industrial networks. It addresses a critical limitation in existing models applied to the Internet and Industrial Internet of Things (IIoT)—their failure to account for inter-node information exchange processes. The model is inspired by the phenomenon that “immune” nodes in real-world and biological systems inhibit the spread of viruses by exchanging information. This model incorporates isolation strategies to curb virus transmission, considering the uncertainty of vulnerable device behavior. Central to this research are the assumptions of a nonlinear infection rate and dual delays, which better mirror the real-world conditions of industrial control networks. This approach diverges significantly from prior studies that relied on bilinear infection rate assumptions. This study constructed an SMIQR model through theoretical derivation and experimental validation. The model enables nodes to autonomously enhance their defenses after receiving risk information while accounting for the impact of inter-node information exchange. Experiments based on real-world data demonstrated the model’s effectiveness in simulating virus propagation and evaluating defense strategies, overcoming the limitations of traditional bilinear infection rate assumptions. Comparative experiments show that the SMIQR model significantly reduces the number of infected nodes in SCADA industrial networks, demonstrating its superior effectiveness in curbing virus spread. Furthermore, the research proposed dynamic isolation tactics that balance industrial operational continuity, providing SCADA industrial networks with a theoretical framework (incorporating nonlinear infection rates and dual delay characteristics) and practical defense solutions to curb malware spread without disrupting production.

1. Introduction

Supervisory Control and Data Acquisition (SCADA) systems are widely used to monitor and control critical infrastructures such as power, chemicals, water treatment, oil, and gas, ensuring their operational efficiency and safety [1]. However, with the rise in networking and the advent of the 5G era, industrial control systems are no longer isolated and physically secure, making them more vulnerable to cyber threats [2,3].
The basic architecture of a SCADA system consists of multiple levels and components, including field devices, communication networks, data acquisition and control layers, SCADA control centers, data storage and analysis, alarm and event management, and operation and control. Field devices, such as sensors, actuators, programmable logic controllers (PLCs) [4], and remote terminal units (RTUs), act as interfaces between field devices and SCADA systems. PLCs are typically used for automation control, while RTUs are primarily employed for remote monitoring and data transmission. These components work together to monitor, manage, and optimize industrial processes. However, the increasing interconnectivity and complexity of SCADA systems, driven by the industrial Internet, have exposed them to more significant risks of cyberattacks. Malicious viruses often infiltrate the physical layer of RTU nodes through network interfaces, leading to system failures, data breaches, or complete system crashes.
The development of computer virus propagation models has evolved through several stages, with researchers continuously proposing new theories and models to explain and predict virus propagation behavior. Recent advances by Zhang et al. [5] further integrate qualitative differential equations with evolutionary game theory to achieve dynamic threat assessment in modern network environments. In the 1980s, the concept of computer viruses emerged, and scholars introduced simple propagation models such as the SIS model [6,7,8], which assumed that a system could be either infected or uninfected. In the 1990s, inspired by epidemiological models, researchers developed the SIR model [9], which divided computer systems into three states [10] and described the lifecycle of virus propagation. Over time, researchers extended these models to incorporate additional factors such as network topology, propagation routes, and virus variants. For example, the SIRS model [11] introduced a susceptible–infected–recovery–susceptible cycle, allowing systems to become susceptible again after virus removal. Early models often simulated information transmission as direct virus transmission, overlooking the inherent differences between the two, such as information transmission’s memory and delay characteristics. Dodds and Watts [12] studied the effect of limited memory on infection, while Zhao et al. [13] proposed an SVEIR model with time delay and nonlinear incidence, deriving explicit formulas for determining the direction of Hopf bifurcation and the stability of periodic solutions. Safar proposed the SEIQP model [14] to study worm insider threats. Sulaiman et al. enhanced this model to SEIQV [15], incorporating worm internal threats and validating its effectiveness through neural networks and optimization algorithms. Tang et al. [16] introduced the SLBRS model, which used security entropy to study virus transmission security. At the same time, Zhang and Gan [17] proposed an improved SLBR model to analyze the combined effects of infected external computers and removable storage media on virus transmission. Subsequent research on multi-objective optimization algorithms also contributed to the optimization strategies for virus propagation models [18]. Foundational studies by Shen et al. [19] established differential game-theoretic frameworks for malware containment in wireless sensor networks. Matta et al. [20] innovatively adapted birth–death–immigration processes for modeling cyber threats.
Within SCADA industrial network environments, propagation modeling research primarily aims to simulate malware dissemination patterns, enabling systematic analysis of potential security vulnerabilities through computational epidemiological approaches. Carcano et al. [21] analyzed the transition of SCADA systems from safe to dangerous states by examining data flows generated by network attacks, improving intrusion detection systems (IDS) accuracy. Sheng et al. [22] proposed a mathematical model to study industrial virus transmission in SCADA systems, combining defense measures with intelligent honeynets to offer comprehensive protection strategies. Wang et al. studied the Stuxnet malware [23], which caused significant damage to nuclear power plant SCADA systems, and provided patch codes through static analysis [24]. In addition to these traditional research directions, notable advancements have been made in exploring novel theoretical frameworks and leveraging emerging technologies. Specifically, Srivastava et al. [25] developed cyber-immunity mechanisms inspired by infectious disease ecology. He et al. [26] proposed an immune knowledge-driven propagation model specifically optimized for SCADA virus dynamics. Meanwhile, breakthroughs in machine learning, particularly the cognitive-driven label transition methods by Zhang et al. [27] and their part-aware correlation networks [28], have enabled more precise estimation of system state transitions in data-scarce SCADA environments. Attacks on components such as PLCs, RTUs, servers, and databases have severely harmed industrial control systems. RTUs, critical for remote data acquisition and equipment monitoring, are particularly vulnerable. For instance, the 2015 cyberattack on Ukraine’s power infrastructure involved infected RTUs manipulating switchgear, leading to widespread power outages [29]. Such attacks can disrupt industrial processes, causing substantial economic losses and posing threats to security, privacy, and public safety [30]. Zhu et al. [31] proposed the SLBR model, highlighting that highly contagious viruses in SCADA systems immediately affect RTU nodes without latency, making them difficult to suppress. Additionally, studies have proposed protective measures [32,33] in technology, personnel, management, and facilities to mitigate virus propagation in SCADA systems [34] and proposed several containment strategies for malware [35,36]
In summary, most studies on virus propagation in the Internet and Industrial IoT have focused on external factors such as propagation paths and situational influences, often neglecting the role of information exchange between nodes. Inspired by real-world and biological systems, such as rumor propagation dynamics in social networks, risk contagion mitigation in financial markets, traffic flow optimization in urban transportation, and adaptive immune response mechanisms in living organisms, the model can enhance the overall system’s antiviral capability through inter-node information exchange. Taking biological immunology as an example; in this context, during the humoral immune response of cells, T cells, upon recognizing antigens, proliferate and differentiate into effector T cells and memory T cells. Effector T cells release lymphokines, which enhance the immune responses of other cells, thereby amplifying the body’s overall immune reaction. This mechanism can be analogously applied to industrial networks. In such networks, RTU (Remote Terminal Unit) nodes may probabilistically transmit danger signals to uninfected RTU nodes via wired cables, radio transmission, Ethernet, or other communication channels. Thus, infected RTU nodes mimic the release of lymphokines by infected T cells to propagate danger signals, ultimately enhancing the collective antiviral capacity of the RTU network. This delivery mechanism fundamentally differs from the classical SIR/SIRS epidemiology model. The classical model in which nodes enter the infected state immediately after a successful attack ignores some of the defense capabilities that nodes may have in real industrial environments. The existence of M alters this scenario. Instead of passively succumbing to infection when facing threats, nodes in the network can obtain early-warning information through M and actively adjust their defense strategies. By transmitting danger signals via S, other nodes can activate their defense mechanisms in advance, enhancing their resilience against viruses or malicious attacks. Different nodes can activate the defense mechanism through the danger signal transmitted by S in advance to improve their resistance to viruses or malicious attacks. This early defense mechanism significantly reduces the probability of nodes being infected, which substantially enhances the collective antivirus capability of the entire RTU network, effectively guaranteeing the safe and stable operation of the industrial network, as if injecting a strong immunity for the model, making it more robust in the face of complex and changing network threats.
Based on this, this paper introduces a new SCADA industrial virus propagation model, SMIQR, with dual delay and nonlinear infection rate to address the above shortcomings and analyze the system’s impact of these factors.
The proposed model innovatively incorporates three key features. It considers dual delays (infection isolation and immunity loss) to mirror real-world SCADA system behaviors, such as patching and quarantine delays. Unlike traditional models with linear infection rates, it adopts a nonlinear rate to better capture the complex dynamics of malware spread under heavy loads. Additionally, it integrates risk information dissemination, using the “M” state to simulate nodes gaining partial immunity through information exchange. These elements enable a more accurate and comprehensive representation of malware propagation and defense in industrial networks.
The main contributions of this paper are as follows:
(1)
A novel SMIQR virus propagation model is proposed for SCADA industrial systems. This model incorporates node information transfer mechanisms to simulate how nodes strengthen defenses upon receiving danger signals.
(2)
The model introduces a nonlinear infection rate to capture the non-proportional growth of infections under high loads, accounting for network congestion and defense resource constraints.
(3)
The model combines dual delays, namely the infection isolation and immunization loss delays. Through a rigorous mathematical proof analysis, these two delays are analyzed to have an inseparable impact on system stability, showing that their combined effect cannot be ignored and must be considered together in real industrial environments.
(4)
An empirical comparison with the SLBR/SEIQR model validates the effectiveness of the SMIQR model for malware propagation in industrial networks.
(5)
A security defense strategy is developed to balance malware containment with uninterrupted industrial production, leveraging the model’s unique features.
These contributions advance the realism and applicability of cybersecurity modeling in industrial control systems.
The structure of this article is as follows: Section 2 describes the SMIQR model and analyzes its parameters. Section 3 introduces the theoretical derivation of the model. Section 4 conducts numerical simulations to demonstrate the system’s stability under different conditions and examines the impact of dual time delays on the system. Section 5 verifies the model’s effectiveness using a real dataset and analyzes its sensitivity to infection suppression factors. Section 5 is a model comparison experiment to confirm the validity of the SMIQR model. Finally, this article summarizes and proposes security defense strategies to prevent the spread of malicious software without affecting industrial production.

2. Model Formulation

2.1. Model Node Configuration

With the gradual realization of interconnection, integration, and remote monitoring of industrial equipment, the traditional closed network architecture has been gradually broken. SCADA systems have become more complex and highly dependent on network connections. In this new network environment, one of the main risks faced by SCADA systems is the security of their physical layer RTU (Remote Terminal Unit) nodes, which are the core components of SCADA systems and are responsible for collecting data from field devices and transmitting it to the upper control system. They are typically installed at the edge of an industrial facility and connect directly to physical devices, sensors, and actuators for data acquisition, signal forwarding, and field control. As industrial equipment opens up to remote access, RTU nodes are exposed to the public Internet or internal corporate networks, which can be accessed remotely by hackers through the network interface, who can implant malware and execute malicious code, thus leading to significant problems such as data tampering, system damage, and information leakage. To improve the overall immunity of the SCADA system and better characterize the virus propagation of the SCADA industrial network driven by immune information and inspired by the application scenarios in life, we propose an M-node that exchanges information between nodes and thus has a specific immunity. In the propagation model, when a susceptible node is infected, some susceptible nodes, after receiving information from other infected nodes, develop immunity and thus become enhanced immune nodes with antiviral capability. Based on this, we establish the following seven components:
Susceptible state (S): RTUs susceptible to SCADA systems.
Enhanced state (M): RTUs strengthened through danger signal propagation possess inherent defensive capabilities. If such a node successfully resists viral intrusion after receiving danger signals, it transitions directly into an immune RTU state (R). Conversely, if the defensive measures prove ineffective, the node becomes infected (I).
Infected state (I): RTUs in the system that are infected and can propagate viruses
Delayed state 1 (D1): isolation of RTUs that require a certain amount of time, resulting in a time-delayed state from the I state to the Q state.
Quarantine state (Q): RTUs that centrally manage the state of infection to control the spread of viruses.
Immunity state(R): RTUs that have entered the immunity state by restoring normalcy through antivirus software or patching.
Delayed state 2 (D2): The recovery state becomes susceptible again due to a virus update or patch failure in the system. This failure process is not instantaneous, but an inevitable delay leads to the RTU of the delayed state.

2.2. Model Dynamical Equations

In our virus propagation model, the industrial control network is assumed to be homogeneous to ensure approximately uniform node connectivity. This assumption aligns with the operational reality of RTU device layers in industrial scenarios.
The transition diagram between each state of the model is shown in Figure 1 below, and S, M, I, Q, and R represent the number of RTUs in each state at time t, respectively. Our model is based on the following theoretical definition:
(1)
The RTU accesses the SCADA system at a constant rate b, and each state node can leave the system at a constant rate of μ .
(2)
Assuming that each susceptible node is infected at moment t with a nonlinear infection rate β 1 + a I . Since both S and M nodes are essentially susceptible states, both can be infected by the infected node. Also, since the M state is not easily infected through the message passing of the infected node, there are   β 1 + a I (S + M)I infected S nodes at moment t.
(3)
λ denotes the rate at which infected nodes infect messages at time t. The number of infected nodes at time t is β 1 + a I ( S + M ) I . Then, there are λ β 1 + a I ( S + M ) I nodes with states from S to M.
(4)
θ indicates the magnitude of its defense capability in M state; some M state nodes can be directly converted to R immune state, and there are also (1 − θ ) M nodes that are converted to I state nodes after receiving the danger information.
(5)
With antivirus or anti-malware tools, there is a ε probability that a virus will be detected and quarantine measures will be taken such that nodes in the infected state of the system will be changed to quarantined nodes.
(6)
σ indicates the probability that a node in the quarantine state of the system transitions to the immune state, in which the quarantined computers may be scanned and repaired, the antivirus software is updated, and the system is protected from viruses by eliminating vulnerabilities and enhancing protection mechanisms.
(7)
Viruses may be updated in the process. If security patches are not installed in a timely manner, there is a σ probability that an immune node in the system will become susceptible again.
(8)
Due to the system’s time windowing mechanism and the resulting isolation delay, τ 1 describes the time from the infected state to the isolated state.
(9)
In the case of virus variants or patch failure within the SCADA system, this process lasts for a specific period, resulting in an immunization delay described by τ 1 from the immune state to the susceptible state.

2.3. Modeling Theory

d S d t = b ( λ + 1 ) β 1 1 + aI ( t ) ( S ( t ) + M ( t ) ) I ( t ) + σ R ( t τ 2 ) μ S ( t ) d M d t = ( λ + θ 1 ) β 1 1 + aI ( t ) ( S ( t ) + M ( t ) ) I ( t ) θ M ( t ) μ M ( t ) d I d t = ( 2 θ ) β 1 1 + aI ( t ) ( S ( t ) + M ( t ) ) I ( t ) ε I ( t ) μ I ( t ) d D 1 d t = ε I ( t ) ε I ( t τ 1 ) μ D 1 ( t ) d Q d t = ε I ( t τ 1 ) η Q ( t ) μ Q ( t ) d R d t = η Q ( t ) + θ M ( t ) σ R ( t ) μ R ( t ) d D 2 d t = σ R ( t ) σ R ( t τ 2 ) μ D 2 ( t )
The initial conditions are S 0 0 , M 0 0 , I 0 0 , D 1 0 0 , Q ( 0 ) 0 , R ( 0 ) 0 , D 2 ( 0 ) 0 , all parameters are positive, and Z(t) = (S, M, I, D1, Q, R, D2). Therefore, let the following be established:
N t = S t + M t + I t + D 1 t + Q + R t + D 2 t ,
In turn, the following can be obtained:
Ω = ( S , M , I , D 1 , Q , R , D 2 ) R + | 0 < N t < b / μ ,
Theorem 1. 
The set   Ω  is positively invariant for system (1), which implies that if Z(0) ϵ Ω , then Z(t) ϵ Ω  for all t ≥ 0.
Proof. 
Summing up the differential equations in system (1) above, we obtain the following:
dN dt = dS st + dM dt + dI dt + dD 1 dt + dQ dt + dR dt + dD 2 dt = b μ N ,
Let S t ( 0 ) 0 M t ( 0 ) 0 I t ( 0 ) 0 D 1 t ( 0 ) 0 Q t ( 0 ) 0 R t ( 0 ) 0 D 2 t ( 0 ) 0
dN dt = b μ ,
t , N t   b μ ,
The above proves that the total node value N t is positively bounded when the values of all nodes are positive.
To prove the non-negativity of the solution of system (1):
Assuming that   S t , M t , I t , D 1 t , Q t , R t , D 2 t   are not always positive, we have the following:
k ( t ) = min S t , M t , I t , D 1 t , Q t , R t , D 2 t ,
Then, there must be a time as follows:
k ( t 1 ) < 0
Since the kinetic equations are all continuous functions, when the above situation occurs, the system must have t = t2, such that the following is established:
k ( t 2 ) = 0 ,
The assumptions are as follows:
k ( t 2 ) = S t ( t 2 ) = 0 ,
These exist when 0 t t 2 , S t ( 0 ) 0 , M t ( 0 ) 0 , I t ( 0 ) 0 , D 1 t , ( 0 ) 0 , Q t ( 0 ) 0 , R t ( 0 ) 0 , D 2 t ( 0 ) 0 . Therefore, in system (1), the nonlinear infection rate is set to f(I) for ease of observation, and we obtain the following equation:
dS d t ( λ + 1 ) β f ( I ) S + M I μ S ,
Then, the following can be obtained:
dS S ( λ + 1 ) β f ( I ) 1 + M S I + μ dt ,
0 t 2 dS S 0 t 2 ( λ + 1 ) β f ( I ) 1 + M S I + μ dt ,
In this equation, the change in the number of S nodes depends only on the current number of other nodes. Hence, the following inequality can be obtained:
S ( t ) S t ( 0 ) exp [ ( ( λ + 1 ) β f ( I ) ( 1 + M S ) I + μ ) t ] ,
It is clear that the right-hand side of the above equation is greater than 0; therefore, the equation   k ( t 2 ) = 0 does not hold.
Thus, the solution of system (1) is positive and bounded, satisfying the following equation:
Ω = { ( S , M , I , D 1 , Q , R , D 2 ) ϵ R + | 0 < N t < b μ } ,
Therefore, Theorem 1 can be proven. □

3. Derivation

The main work in this chapter is to perform a mathematical theoretical analysis of the system (1). The dynamic behavior of the model is determined by the basic regeneration number [37] R 0 . The value of R 0 is directly related to the evolutionary trend of the model. Therefore, in this chapter, the basic regeneration number R 0 is solved first, and then the local and global attraction of the virus-free equilibrium and the epidemic equilibrium are solved separately.

3.1. Basic Regeneration Number R0

In viral transmission modeling, the basic regeneration number, usually denoted by the symbol R 0 , is a parameter that describes the average number of susceptible individuals to which an individual can spread during its period of infection. It is a significant indicator in epidemiology, reflecting the potential for transmission and the difficulty of controlling an infectious disease.
The basic regeneration number is a key threshold for determining the presence of a virus in a system. In the following, we use a next-generation matrix [38] to calculate the basic regeneration number R 0 , representing the average number of SCADA nodes infected at some time t during the infection period. Since there are only I infected nodes, both w and v are first-order matrices, as follows:
F = ( 2 θ ) β 1 1 + aI ( S + M ) I , V = [ ε I + μ I ] ,
Again, since S and M are essentially susceptible nodes and M can only be converted from S, we do not care about the number of M and S, respectively, but more about their sum. Thus, we compose S and M as follows:
S ˜ = S + M ,
When E0 = ( S 0 ~ , 0,0 , 0,0 , 0,0 ) and   S 0 ~ = b/ μ , the F and V matrices can be expressed as follows:
F = ( 2 θ ) β 1 ( 1 + aI ) 2 S 0 ˜ , V = ε + μ ,
The basic regeneration number R0 of the model is the following:
R 0 = ( 2 θ ) β S 0 ˜ ε + μ ,

3.2. Equilibrium Point Stability Analysis

In order to solve the equilibrium point of the viral propagation model SMIQR for node information exchange, we assume the following equations in [39,40], if the dynamic model satisfies one of the local asymptotic stability or global asymptotic stability, it will converge to the corresponding equilibrium point starting from a certain point in the space. This section discusses the equilibrium points of virus propagation under the SMIQR model. The steady state of the SMIQR model satisfies the following equations:
b ( λ + 1 ) β 1 1 + a I 0 * S 0 * + M 0 * I 0 * + σ R 0 * μ S 0 * = 0 ( λ + θ 1 ) β 1 1 + a I 0 * S 0 * + M 0 * I 0 * θ M 0 * μ M 0 * = 0 ( 2 θ ) β 1 1 + a I 0 * S 0 * + M 0 * I 0 * ε I 0 * μ I 0 * = 0 ε I 0 * ε I 0 * e τ 1 μ D 1 0 * = 0 ε I 0 * e τ 1 η Q 0 * μ Q 0 * = 0 η Q 0 * + θ M 0 * σ R 0 * μ R 0 * = 0 σ R 0 * σ R 0 * e τ 2 μ D 2 0 * = 0 ,
When the system (1) reaches equilibrium, there is no more variation in the number of individual nodes, and   I 0 * = 0, then we can obtain the following virus-free equilibrium point:
E vf * = ( S 0 * , 0 , 0 , 0 , 0 , 0 , 0 ) ,
The epidemic equilibrium can also be obtained as follows:
E v e * = ( S 0 * , M 0 * , I 0 * , D 1 0 * , Q 0 * , R 0 * , D 2 0 * ) ,
In the following, we will specifically analyze the stability of the equilibrium points.

3.3. Stability Analysis of Virus-Free Equilibrium Points

Theorem 2. 
If  R 0  < 1, then the virus-free equilibrium point  E v f * = ( S 0 * , 0,0 , 0,0 , 0,0 )  is locally asymptotically stable.
Proof of Theorem 2. 
The Jacobi matrix of system (1) at the disease-free equilibrium point is shown below:
J ( E vf * ) = μ 0 S 0 * β ( 1 + λ ) 0 0 σ e τ 2 0 0 μ θ S 0 * β ( λ + θ 1 ) 0 0 0 0 0 0 ε μ S 0 * β ( θ 2 ) 0 0 0 0 0 0 ε ε e τ 1 μ 0 0 0 0 0 ε e τ 1 0 η μ 0 0 0 θ 0 0 η μ σ 0 0 0 0 0 0 σ σ e τ 2 μ ,
The corresponding characteristic equations are as follows:
( μ + x ) 3 * ( η + μ + x ) * ( μ + σ + x ) * ( μ + θ + x ) * ( x 2 S 0 * β + S 0 * β θ + ε + μ ) = 0 ,
The corresponding eigenvalues are as follows:
X 1 = μ θ X 2 = X 3 = X 4 = μ X 5 = η μ X 6 = μ σ X 7 = 2 S 0 * β μ ε S 0 * β θ ,
For the first six eigenvalues, it can be deduced that they are less than 0. Since the seventh eigenvalue must be proven to be the case for values in the range R 0 < 1, it can be rigorously shown that it is less than 0. Therefore, when all eigenvalues are less than 0, the virus-free equilibrium of system (1) is locally stable according to the Routh–Hurwitz criterion. Thus, Theorem 2 is proven. □

3.4. Stability Analysis of Viral Equilibrium Points

In this section, we study the stability of the epidemic equilibrium point in system (1), focusing on the case of τ 1 > 0 , τ 2 > 0 and giving an expression for the threshold.
If R 0 = ( 2 θ ) β S 0 * ε + μ > 1 , then system (1) has a unique positive equilibrium E v e = ( S 0 * , M 0 * , I 0 * , D 1 0 * , Q 0 * , R 0 * , D 2 0 * ) , and the disease equilibria are as follows:
S 0 * = ( ε + μ ) ( 1 + a I 0 * ) ( θ + μ ) ( λ + θ 1 ) ( ε + μ ) β I 0 * ( 2 θ ) ( θ + μ ) β M 0 * = ( λ + θ 1 ) ( ε + μ ) ( 2 θ ) ( θ + μ ) I 0 * I 0 * D 1 0 * = ε ( 1 e τ 1 ) μ I 0 * Q 0 * = ε e τ 1 η + μ I 0 * R 0 * = η ε e τ 1 ( 2 θ ) ( θ + μ ) + θ ( λ + θ 1 ) ( ε + μ ) ( η + μ ) ( σ + μ ) ( η + μ ) ( 2 θ ) ( θ + μ ) I 0 * D 2 0 * = η ε e τ 1 σ ( 1 e τ 2 ) ( 2 θ ) ( θ + μ ) + σ ( 1 e τ 2 ) θ ( λ + θ 1 ) ( ε + μ ) ( η + μ ) μ ( σ + μ ) ( η + μ ) ( 2 θ ) ( θ + μ ) I 0 * ,
The Jacobi matrix for system (1) at the disease equilibrium point is shown below:
J ( E ve * ) = I β ( λ + 1 ) / ( a I + 1 ) μ I β ( λ + 1 ) / ( a I + 1 ) β ( λ + 1 ) ( S + M ) / ( a I + 1 ) 2 ) 0 0 σ e τ 2 0 I β ( λ + θ 1 ) / ( a I + 1 ) I β ( λ + θ 1 ) / ( a I + 1 ) θ μ β ( λ + θ 1 ) ( S + M ) / ( a I + 1 ) 2 0 0 0 0 I β ( θ 2 ) / ( a I + 1 ) I β ( θ 2 ) / ( a I + 1 ) β ( θ 2 ) ( M + S ) / ( a I + 1 ) 2 μ ε 0 0 0 0 0 0 ε ε e τ 1 μ 0 0 0 0 0 ε e τ 1 0 η μ 0 0 0 θ 0 0 η μ σ 0 0 0 0 0 0 σ σ e τ 2 μ ,
Then, the following equation can be obtained:
xE J ( E v e * ) = x + I β ( λ + 1 ) / ( aI + 1 ) + μ I β ( λ + 1 ) / ( a I + 1 ) β ( λ + 1 ) ( S + M ) / ( a I + 1 ) 2 ) 0 0 σ e τ 2 0 I β ( λ + θ 1 ) / ( a I + 1 ) x I β ( λ + θ 1 ) / ( aI + 1 ) + θ + μ β ( λ + θ 1 ) ( S + M ) / ( a I + 1 ) 2 0 0 0 0 I β ( θ 2 ) / ( a I + 1 ) I β ( θ 2 ) / ( a I + 1 ) x + β ( θ 2 ) ( M + S ) / ( a I + 1 ) 2 + μ + ε 0 0 0 0 0 0 ε + ε e τ t x + μ 0 0 0 0 0 ε e τ t 0 x + η + μ 0 0 0 θ 0 0 η x + μ + σ 0 0 0 0 0 0 σ + σ e τ 2 x + μ ,
Due to the relatively large number of variables in the model and the complexity in solving the characteristic equations, some of the equations are replaced by letters below:
l 1 = I β ( λ + 1 ) / ( aI + 1 ) μ , l 2 = I β ( λ + 1 ) / ( aI + 1 ) , l 3 = β ( λ + 1 ) ( S + M ) / ( aI + 1 ) 2 ) , l 4 = σ e τ 2 , l 5 = I β ( λ + θ 1 ) / ( aI + 1 ) , l 6 = I β ( λ + θ 1 ) / ( aI + 1 ) θ μ , l 7 = β ( λ + θ 1 ) ( S + M ) / ( aI + 1 ) 2 , l 8 = I β ( θ 2 ) / ( aI + 1 ) , l 9 = β ( θ 2 ) ( M + S ) / ( aI + 1 ) 2 μ ε , l 10 = ε ε e τ 1 , l 11 = ε e τ 1 , l 12 = η μ , l 13 = μ σ , l 14 = σ σ e τ 2 . ,
Then the characteristic equation
λ E J ( E * ) = λ l 1 l 2 l 3 0 0 l 4 0 l 5 λ l 6 l 7 0 0 0 0 l 8 l 8 λ l 9 0 0 0 0 0 0 l 10 λ + μ 0 0 0 0 0 l 11 0 λ l 12 0 0 0 θ 0 0 η λ l 13 0 0 0 0 0 0 l 14 λ + μ = ( λ + μ ) ( λ + μ ) λ l 1 l 2 l 3 0 l 4 l 5 λ l 6 l 7 0 0 l 8 l 8 λ l 9 0 0 0 0 l 11 λ l 12 0 0 θ 0 η λ l 13
Obviously, the simplified equation shows that there are two eigenvalues in the original equation, x1 = x2 = − μ , which are both less than 0. It is only necessary to continue the discussion for the right matrix, and due to the presence of the dual delays in the model, in solving the eigenequation of the right matrix, the order is reduced, and the algebraic cofactors are obtained.
The first algebraic cofactor is as follows:
( λ l 1 ) λ l 6 l 7 0 0 l 8 λ l 9 0 0 0 l 11 λ l 12 0 θ 0 η λ l 13
The second algebraic cofactor is as follows:
l 2 l 5 l 7 0 0 l 8 λ l 9 0 0 0 l 11 λ l 12 0 0 0 η λ l 13
The third algebraic cofactor is as follows:
l 3 l 5 λ l 6 0 0 l 8 l 8 0 0 0 0 λ l 12 0 0 θ η λ l 13
The fourth algebraic cofactor is as follows:
l 4 l 5 λ l 6 l 7 0 l 8 l 8 λ l 9 0 0 0 l 11 λ l 12 0 θ 0 η ,
We compute each of these four algebraic cofactors and add them together to obtain the following characteristic equation of the system:
P ( λ ) + Q 1 ( λ ) + Q 2 ( λ ) = 0 ,
Among them are the following:
P ( λ ) = λ 5 + p 4 λ 4 + p 3 λ 3 + p 2 λ 2 + p 1 λ + p 0 , Q 1 ( λ ) = q 1 e λ τ 2 , Q 2 ( λ ) = q 2 e λ ( τ 1 + τ 2 ) , P 4 = l 1 l 12 l l 6 l 9 , p 3 = l 1 * l 12 + l 1 * l 13 + l 1 * l 6 + l 1 * l 9 + l 12 * l 13 + l 12 * l 6 + l 12 * l 9 + l 13 * l 6 + l 13 * l 9 l 2 * l 5 l 3 * l 8 + l 6 * l 9 l 7 * l 8 , p 2 = l 1 * l 12 * l 13 l 1 * l 12 * l 6 l 1 * l 12 * l 9 l 1 * l 13 * l 6 l 1 * l 13 * l 9 l 1 * l 6 * l 9 + l 1 * l 7 * l 8 l 12 * l 13 * l 6 l 12 * l 13 * l 9 + l 12 * l 2 * l 5 + l 12 * l 3 * l 8 l 12 * l 6 * l 9 + l 12 * l 7 * l 8 + l 13 * l 2 * l 5 + l 13 * l 3 * l 8 l 13 * l 6 * l 9   + l 13 * l 7 * l 8 + l 2 * l 5 * l 9 l 2 * l 7 * l 8 l 3 * l 5 * l 8 + l 3 * l 6 * l 8 , p 1 = l 1 * l 12 * l 13 * l 6 + l 1 * l 12 * l 13 * l 9 + l 1 * l 12 * l 6 * l 9 l 1 * l 12 * l 7 * l 8 + l 1 * l 12 * l 6 * l 9 l 1 * l 13 * l 7 * l 8 l 12 * l 13 * l 2 * l 5 l 12 * l 13 * l 3 * l 8 + l 12 * l 13 * l 6 * l 9 l 12 * l 13 * l 7 * l 8 l 12 * l 2 * l 5 * l 9 + l 12 * l 2 * l 7 * l 8 + l 12 * l 3 * l 5 * l 8 l 12 * l 3 * l 6 * l 8 l 13 * l 2 * l 5 * l 9 + l 13 * l 2 * l 7 * l 8 + l 13 * l 3 * l 5 * l 8 l 13 * l 3 * l 6 * l 8 , p 0 = l 1 * l 12 * l 13 * l 6 * l 9 + l 1 * l 12 * l 13 * l 7 * l 8 + l 12 * l 13 * l 2 * l 5 * l 9 l 12 * l 13 * l 2 * l 7 * l 8 l 12 * l 13 * l 3 * l 5 * l 8 + l 12 * l 13 * l 3 * l 6 * l 8 , q 1 = ( l 12 * l 5 * θ * σ + l 5 * l 9 * θ * σ l 7 * l 8 * θ * σ ) ω , q 2 = η * ε * σ * l 8 ω , q 3 = l 5 * θ * σ * ω 2 l 12 * l 5 * l 9 * θ * σ + l 12 * l 7 * l 8 * θ * σ , q 4 = η * ε * σ * l 6 * l 8 . ,
For this system, the stability of the equilibrium point needs to be discussed in different cases. To discuss each one of the delays individually, there would be numerous discussions in many single-delay models; hence, we will not go into detail here. The main analysis here is the stability of the equilibrium point in the τ 1 > 0 , τ 2 > 0 case. In this case, the stability analysis of the system needs to determine a range of values for a delay within a threshold, that is, τ 1 > 0, τ 2 < τ k or τ 1 < τ k ,   τ 2 > 0. In the above case, the variable is one of the delays, which is τ 1 or τ 2 . The case of   τ 1 > 0, τ 2 < τ k is discussed below as an example, and the other case has the same proof process as this case.
The roots of the characteristic equation of the system are λ = i ω 1 , which are obtained by substituting them into the following equation, separating the real and imaginary parts:
p 4 ω 4 p 2 ω 2 + p 0 + q 1 sin ω τ 2 + q 2 sin ( ω ( τ 1 + τ 2 ) ) + q 3 cos ω τ 2 + q 4 cos ( ω ( τ 1 + τ 2 ) ) = 0 ,
ω 5 p 3 ω 3 + p 1 ω + q 1 cos ω τ 2 + q 2 cos ( ω ( τ 1 + τ 2 ) ) + q 3 sin ω τ 2 q 4 + sin ( ω ( τ 1 + τ 2 ) ) = 0 ,
By combining the above equations, the following can be derived:
ω 10 + D 7 ω 8 + D 6 ω 6 + D 5 ω 5 + D 4 ω 4 + D 3 ω 3 + D 2 ω 2 + D 1 ω + D 0 = 0 D 7 = p 4 2 2 * p 3 D 6 = p 3 2 + 2 * p 1 2 * p 2 * p 4 D 5 = 2 * q 1 * cos ( ω * τ 2 ) 2 * q 3 * sin ( ω * τ 2 ) D 4 = p 2 2 + 2 * p 0 * p 4 2 * p 1 * p 3 + 2 * p 4 * q 3 * cos ( ω * τ 2 ) + 2 * p 4 * q 1 * sin ( ω * τ 2 ) D 3 = 2 * p 3 * q 3 * sin ( ω * τ 2 ) 2 * p 3 * q 1 * cos ( ω * τ 2 ) D 2 = p 1 2 2 * p 0 * p 2 2 * p 2 * q 3 * cos ( ω * τ 2 ) 2 * p 2 * q 1 * sin ( ω * τ 2 ) D 1 = 2 * p 1 * q 1 * cos ( ω * τ 2 ) 2 * p 1 * q 3 * sin ( ω * τ 2 ) D 0 = p 0 2 + 2 * sin ( ω * τ 2 ) * p 0 * q 1 + 2 * cos ( ω * τ 2 ) * p 0 * q 3 + q 1 2 q 2 2 + q 3 2 q 4 2
We assume that the equation has the following positive roots: ω 11 , ω 12 , ω 13 , ω 14 ω 1 k . Using the Laws–Hurwitz criterion, for each value of k, the corresponding delay threshold is as follows:
τ 1 k j = 1 ω 1 k 2 k π + arcsin p 4 ω 1 4 + p 2 ω 1 2 p 0 q 1 sin ω 1 τ 2 q 3 cos ω 1 τ 2 q 2 2 + q 4 2 arctan q 2 sin ω 1 τ 2 + q 4 cos ω 1 τ 2 q 2 cos ω 1 τ 2 q 4 sin ω 1 τ 2
where k and j are positive real numbers. Let   τ 1 * = min { τ 1 K 0 },   ω 1 * = ω 1 k , and the cross-section condition holds, the following conclusion can be drawn from Rouche’s theorem:
d ( Re λ ) d τ | τ 1 = τ 1 * > 0 ,
Theorem 3. 
Assume that   R 0 > 1  gives the following result:
(1) 
When  τ 2 [ 0 , τ 2 * )  for the positive equilibrium point of the system,  E * = ( S 0 * , M 0 * , I 0 * , D 1 0 * , Q 0 * , R 0 * , D 2 0 * )  is locally asymptotically stable. When  τ 2 > τ 2 * , the positive equilibrium point is unstable.
(2) 
When the system satisfies  d ( R e λ ) / d τ | τ 2 = τ 2 *  > 0, the positive equilibrium point  E * = ( S 0 * , M 0 * , I 0 * , D 1 0 * , Q 0 * , R 0 * , D 2 0 * )   of the system will undergo a Hopf bifurcation at  τ 2 = τ 2 * , and the system is destabilized.
(3) 
In the above equation, it can also be seen that the value of  τ 1 K j  is also affected by    τ 2 . Hence, the system may have more than one bifurcation point when   τ 1 , τ 2   are both greater than 0. This situation needs to be analyzed specifically in the experiment.

4. Numerical Simulation

In the previous section, it has been shown that when R 0 < 1, the system is stable without viruses, and when R 0 > 1, the system is in a stable or unstable state under different conditions. In this section, numerical experimental analysis was conducted to demonstrate the system’s stability under different conditions and to demonstrate the impact of dual delays on the system.

4.1. Equilibrium Analysis

4.1.1. Disease-Free Equilibrium Points

In this section, the stability of the virus-free equilibrium point is verified for different initial values. When R 0 < 1, the virus is not capable of spreading in a population enough to sustain a large-scale epidemic. Over time, the number of infected people will gradually decrease, and the virus will eventually disappear. The following figure shows the change in the number of individual nodes in the system when R 0   < 1, at different initial values. Figure 2 shows the changes in susceptible nodes, reinforced nodes, infected nodes, isolated nodes, and immune nodes under different initial values, respectively, from which the stability of the virus-free equilibrium point can be proved. Theorem 2, the positive boundedness of the system, can be verified.

4.1.2. Viral Equilibrium Point Stability

When R 0 > 1, it is obvious that the system cannot do anything to remove the virus completely; we can only control the virus at an appropriate level. Figure 3 shows how the nodes of the system change when R 0 > 1 and when all the nodes reach equilibrium.

4.2. Dual Delayed Impact

After the balanced analysis, in this section, the main focus is to verify the effect of dual delays on malware propagation; in order to analyze it more clearly, the following values of each parameter are taken, and numerical simulations are carried out. In the following simulation, it is assumed that the values of each parameter are as follows: the infection rate β assumed = 0.12, the probability of immune node to susceptible node δ = 0.3, the probability of outbreak node to isolation node ε = 0.1, the probability of isolation node to immune node η = 0.1, the probability of infected node to receive the dangerous information to become a reinforced susceptible node λ = 0.8, and the defense capability of susceptible node itself θ = 0.6. In the initial stage, the total number of devices is 10000, and the number of infected devices is assumed to be 100. Due to the existence of dual delays in the system, this section firstly demonstrates the overall nonlinear phenomenon of the model through the bifurcation diagram (in order to better analyze the impact of delay on the system, the nodes entering and exiting the system are set to be fewer).

4.2.1. The Case of τ 1 = 0

The first discussion is the bifurcation of the system when τ 1 = 0, as shown in Figure 4. This case discusses the delay from the immune node to the susceptible node in the system. In the system, some immune nodes, after experiencing the virus and immunity, may experience a virus mutation. The patch is not timely, thus becoming the susceptible node again; whenever the delay value exceeds the threshold value, the system will experience the Hopf bifurcation. Hopf bifurcation may lead to periodic oscillation of the computer system, instability, increased resource consumption, network congestion, and other problems, which can seriously lead to system crash or efficiency degradation. Therefore, considering nonlinear dynamic properties and the Hopf bifurcation phenomenon when designing and optimizing computer systems can help to develop more stable and reliable systems, especially in scenarios that require high availability and stability. That is, in the case of a fork, it is necessary to control the immunization delay of the system to ensure that the malware does not become out of control. In the bifurcation diagram, it can be seen that the threshold τ 2 * of τ 2 is 200. The immunization delay needs to be less than a threshold such that the dynamic system eventually reaches equilibrium after oscillations. The curves of the device in different states are shown in Figure 5 ( τ 1 = 0, τ 2 = 100) and as shown in Figure 6 ( τ 1 = 0, τ 2 = 300), which also corresponds to the single-delay model with only immune delays, and the higher the delays, the higher the final oscillations produced after passing the bifurcation point.

4.2.2. The Case of τ 2 = 0

The next phenomenon to be discussed is the bifurcation of the system when τ 2 = 0, as shown in Figure 7, which is also equivalent to the single-delay model with only immune delays, and the larger the delays after passing through the bifurcation point, the larger the final oscillations produced; in the bifurcation diagram, it can be seen that the threshold τ 2 * of τ 2 is 200. This scenario discusses the isolation delay in the system. In real industrial environments, certain nodes need a certain amount of time to be recognized as infected and to be isolated, which leads to the isolation delay. The isolation delay directly affects the scope and severity of the virus propagation; a longer delay will lead to the rapid spread of the virus in the network, increasing the consumption of the system resources and decreasing the response speed. Isolation delay is common in most industrial scenarios, but longer delays will lead to more serious consequences. The curves of the equipment under different states are shown in Figure 8 ( τ 1   = 100, τ2 = 0) and Figure 9 ( τ 1   = 300, τ2 = 0). These Figures illustrate the system node diagrams under two conditions where τ 2   = 0 and τ 1 is respectively less than and greater than τ 1 * . It is clearly observable that the system eventually reaches a stable state when τ 1 < τ 1 * , whereas it becomes unstable when τ 1 > τ 1 * .

4.2.3. The Case of τ 1 > 0, τ 2 < τ 2 *

We can see in the above experiments that the longer the delay time and the single immune delay after the bifurcation point, the greater the oscillation. Thus, we further discuss the effect of the double delay on the system. Figure 10 below is the bifurcation diagram when τ 2   = 100. In this bifurcation diagram, it can be clearly found that the system maintains a stable state before τ 1 = 100 and τ 2   = 300. However, with the increase in τ 1 , there are multiple bifurcation points. The following Figure 11 is the node state diagram when τ 1   = 300 and τ 2 = 100; the system shown is stable, but in the above experiment, when τ 1 = 300, τ 2   = 0, the final state presented is an unstable state. When τ1 increases and τ 2 does not change, the system becomes stable, which also shows that these dual delays cannot be discussed separately, and the two are mutually influencing each other.

4.2.4. The Case of τ 1 > 0, τ 2 > τ 2 *

Figure 12 shows the bifurcation diagram of τ 2 > τ 2 * , it is obvious to find that the bifurcation diagram is very irregular this time, and many abnormal points appear. At the very beginning, τ 2 is already in the state of bifurcation. However, at a later time, with the increase in isolation delay, it appears that the node state of the system is gradually stable many times. Figure 13 shows the node state diagrams of the systems with respect to τ 1 = 0, τ 2 = 300, τ 1   = 90, τ 2 = 300, τ 1 = 250, τ 2 = 300. The node state graph of the system and the bifurcation graph are exactly the same as shown in the bifurcation graph. When the isolation time delay increases, the system experiences a transition from instability to stability, which turns to instability again; this situation is more obvious in the phase diagram. Figure 14 also shows the phase diagram of the above cases. The phase diagram is a dynamic system of the relationship between the state variables in the graphical representation. In τ 1 = 0, τ 2 = 300 and τ 1 = 250, τ 2 = 300, all the trajectories are far away from a certain point, indicating that these two cases are unstable, while in τ 1 = 90, τ 2 = 300, all the trajectories converge to a single point, indicating that this case is stable and that the system is globally stable. This suggests that when there is a dual delay in the system, it is not possible to single-handedly control one delay. In this case, we need to specifically analyze the impact of both isolation delay and immunity delay together on the dynamic system. This can be more accurately controlled to ensure the stability of the system and inhibit the propagation of the virus. The aforementioned experiments demonstrate that it is essential to simultaneously regulate the values of both immune delay and isolation delay to maintain the stability of the dynamic system.
In summary, we have found that the dual delays influence each other, which indicates that it is crucial to clarify the impact of different delays on the system’s stability in a dual delay system. For example, as mentioned in Section 4.2.4 above, we cannot simply require the isolation delay to be as small as possible. This is because, when taking into account the immune delay, even a minimal isolation delay may lead to bifurcation. This necessitates a specialized analysis of the effect of the isolation delay on the dynamic system and precise control over it to ensure the system’s stability, thereby suppressing the spread of malicious software.

5. Experimental Analysis

This section will conduct a series of experiments based on a real dataset. The dataset originates from a laboratory-scale gas pipeline SCADA system described. It simulates communication and device monitoring scenarios in a gas pipeline SCADA environment.
To present the results with enhanced clarity, we developed a simulation algorithm aligned with the characteristics of our SMIQR model for replicating node transitions observed in real-world data. For effective comparison between empirical observations and differential simulations, distinct labeling conventions are adopted as follows: the baseline results (S, M, I, D1, Q, R, D2) represent real data outputs, while their simulated counterparts (Sm, Mm, Im, D1m, Qm, Rm, D2m) denote differential simulation outcomes.
Under the actual dataset, the SMIDR model evolves with the parameters   β = 0.12, δ = 0.3, ε = 0.1, η = 0.1, λ = 0.8, θ = 0.6. Below are the sets of initial conditions, respectively, and the evolution of the model under the real dataset is depicted in Figure 15 under the following initials. It can be seen that the differential equations and the actual dataset also have variations. Each state has the same trend with a good fit, indicating the model’s validity. Although some of the results reacting to the actual data differ from the theoretical data, the differences are slight, due to the difference in their simulation methods. However, the final results of both approaches converge to a steady state, showing that the model is very stable under the actual dataset.
  • (E1) (S(0), M(0), I(0), D1(0), Q(0), R(0), D2(0)) = (6000,1000,1000,0,6000,900,0).
  • (E2) (S(0), M(0), I(0), D1(0), Q(0), R(0), D2(0)) = (6000,2000,2000,0,4000,900,0).
  • (E3) (S(0), M(0), I(0), D1(0), Q(0), R(0), D2(0)) = (6000,2000,4000,0,2000,900,0).
In order to control the spread of industrial viruses, it is essential to understand some of the parameters in the system that affect the spread of viruses, which play a significant role in controlling the spread of viruses in the system faster and reducing the number of viruses in the system. There is a special parameter among all the parameters: the infection inhibition factor in the non-dominant infection rate. This parameter represents a saturation characteristic of the infection rate in the model. When the infection inhibition factor a is more prominent, the overall infection rate is smaller, the spread is slower, and fewer infected people are in the system when reaching the equilibrium, and when the infection inhibition factor a is smaller, the overall infection rate is more significant, the spread is faster, and the more infected people are in the system when reaching the equilibrium. The more-infected people are in the system at equilibrium. As shown in Figure 16, which is the node diagram for the system corresponding to four groups of a = 0.5, a = 1, a = 1.5, and a = 2 with other parameters being the same, it can be clearly seen that as the infection inhibition factor gradually increases, the infected nodes reach their maximum value more quickly. There are fewer infected nodes in the steady-state system.
The infection suppression factor describes the effect that the infection rate gradually slows down with the increase in the number of infected nodes, and this infection suppression factor can also be reflected in the SCADA industrial network, which is mainly reflected in the topology of the network, the traffic characteristics, the characteristics of the node equipment, security measures, the virus propagation mechanism, and the external environmental factors, etc. For example, in an industrial network, which belongs to a highly centralized network, the network traffic is enormous, which will have an impact on the infection suppression factor. For a highly connected network, the more connections between the nodes, the faster the virus spreads, and the infection rate may be more likely to reach saturation. In this kind of network environment, we should prioritize the isolation of devices with high-density and more connected nodes when we take isolation to slow down the propagation rate. The saturation effect of the infection rate, a value, is based on the combined results of a variety of factors. Through a comprehensive analysis of the above factors, you can determine the value of the saturation effect for a particular industrial network environment to enable the corresponding countermeasures to reduce the infection inhibition factor, such that the system reaches equilibrium when it has fewer diseased nodes and performs better.
Similarly, the parameter θ, which represents the magnitude of defense capability in the enhanced state (M), offers crucial insights into how nodes can autonomously strengthen their defenses. When a susceptible RTU node receives danger signals from infected counterparts and transitions to the enhanced state (M), a high θ value indicates that these internal defense mechanisms are highly efficient. Nodes with a strong θ are more likely to directly transition to the immune state (R) upon encountering a virus, effectively preventing infection. Conversely, a lower θ implies that the node’s self-defense capabilities are relatively weak. In such cases, despite entering the enhanced state, the node may still succumb to infection and transition to the infected state (I). As shown in Figure 17, the number of I nodes in the system corresponding to the four cases of θ = 0.5, θ = 0.6, θ = 0.7, θ = 0.9 respectively with other parameters being the same, it can be clearly seen that the peak of the infected nodes and the number of the stabilized system decrease with the increase in θ, which indicates that the enhancement in θ can have a certain inhibitory effect on the propagation of the virus in the system.
In the industrial network scenario, θ can be seen as a measure of the effectiveness of the built-in security mechanisms within RTU nodes. For example, modern RTUs may be equipped with advanced firmware that contains heuristic algorithms capable of detecting and neutralizing emerging threats. A lower θ may resemble a situation where the RTU’s security features are outdated or insufficient, leaving the RTU vulnerable to attack even after receiving alerts of potential threats. By analyzing the impact of θ on the overall system, we can better understand how to optimize the design and configuration of RTU nodes, ensuring they are better equipped to withstand cyberattacks in the complex landscape of SCADA industrial networks.
Together, the infection suppression factor a and the self-defense capability parameter θ provide a comprehensive framework for enhancing the security resilience of SCADA systems against malware propagation.

6. Model Comparison

In this section, to quantitatively validate the advantages of the proposed SMLBR model, we conducted comparative experiments with two representative models: the SLBR model [31] and the SEIQP model [15].
This four-state model (S: Susceptible, L: Latent, B: Burst, R: Recovered) is compared with our SMIQR model. Our model introduces two additional states: M (Enhanced Susceptibility through risk information exchange) and Q (Quarantined). This comparison aims to verify whether the control strategies (risk information propagation and quarantine) in SMIQR effectively improve virus containment. The dynamic equations of SLBR are as follows:
d S d t = b β S ( L + B ) μ S d L d t = ( 1 p ) β ( L + B ) S γ L + ε B μ L d B d t = p β ( L + B ) S + γ L ε B α B μ B d R d t = α B μ R . ,
And the second model SEIQR model has five states which are S (Susceptible state), E (Exposed state), I (Infected state), I (Infected state), Q (Quarantine state), R (Immune state). In this model, the authors also proposed controlling the spread of viruses through isolation and patching using the same isolation approach as proposed in this model. The main difference between the SMIQR model and the SEIQR model is that the prevention and control strategies used are different. The approach taken in this paper is through information dissemination. Hence, the significance of comparing it with this model focuses more on whether or not this approach helps to reduce the number of infected nodes. Its dynamic equations are as follows:
d S d t = ( η + ξ ) P + θ I σ S β S I ρ S d E d t = σ S + β S I γ E d I d t = γ E θ I δ I d Q d Q = δ I ε Q d P d t = ρ S + ε Q ( η + ξ ) P . ,
The initial node values for the three models are as follows:
SLBR: (S(0), L(0), B(0), R(0)) = (3000, 3000, 3000, 1000)
SEIQP: (S(0), E(0), I(0), Q(0), P(0)) = (3000, 3000, 3000, 0, 1000)
SMIQR: (S(0), M(0), I(0), Q(0), R(0)) = (3000, 1000, 3000, 2000, 1000)
The specific parameters for each model are shown in Table 1. However, because the meaning of the parameters used for the three models are different, it is impossible to completely realize the unity of the parameter values, in order to control the infectiousness of the virus in the three models, in this experiment, the reusable number R0 is used as a standard, to control the same value of R0, the same R0 indicates the reproduction ability of the virus, and the difference in the number of nodes in the results is due to the strategy not used in the model itself. The specific parameters shown in the graphs indicate that R0 is basically the same under the three models, and the experiment has some reference value.
First we observe the evolution of S nodes and R nodes under the three models, as shown in the Figure 18, the number of S and R nodes of the three models eventually stabilizes, after stabilization it shows that our model has the highest number of S, R, the SLBR model has a higher number of S, and the number of R nodes is less, indicating that more node states are in the S state after this model reaches the steady state, and the SLBR model has the lowest number of S, and the higher number of R that indicates that more node states are in S state after reaching steady state in SEIQR model. The experimental results show that the SMIQR model has more S and R nodes, which also indicates that the immunity of the nodes is improved after taking the preventive and control measures in this model.
In both network systems and SCADA-based industrial systems, latent nodes and infected nodes are the most critical state variables due to their inherent infectiousness and potential to cause widespread damage. Theoretically, minimizing their numbers can significantly reduce system-wide losses. In our study, we combine the latent and burst states into a unified metric I ˜ , which represents the total number of individuals in the infection cycle during viral propagation. Figure 19 below illustrates I ˜ evolution across the three models:
As shown in Figure 19, the SMIQR model achieves the lowest I ˜ compared to the baseline models. This demonstrates its superior performance in viral containment; it effectively suppresses viral spread during epidemic phases, maintains infected nodes at minimal levels, and thereby enhances overall system security. These results underscore that SMIQR’s integrated strategies (e.g., risk-aware immunization and dynamic quarantine) are highly effective in mitigating infection cycles and reducing systemic risks.

7. Conclusions

(1)
This paper analyzes the structure of SCADA systems and the security threats they face and proposes a novel SCADA industrial network virus propagation model, SMIQR. The construction of this model is based on the phenomenon observed in social networks, financial markets, and urban transportation systems, where “immune” nodes reduce virus propagation through information exchange. It simulates the process by which infected nodes transmit dangerous information to uninfected nodes. The model considers the impact of information transmission between nodes and allows nodes to enhance their defensive capabilities after receiving dangerous information, thereby improving the overall antivirus capability of the group of nodes.
(2)
Methodologically, this paper adopts the assumptions of nonlinear infection rates and dual delay, which align more closely with the actual conditions of industrial control networks. Unlike the commonly used bilinear infection rate assumption in existing research, this paper considers the uncertainty in the behavior of susceptible devices, thereby introducing the concept of nonlinear infection rates and incorporating isolation strategies to effectively control virus propagation.
(3)
Based on the characteristics of industrial viruses and the model, this paper designs an algorithm using a real dataset and validates the model’s effectiveness through this dataset.
(4)
Building on this foundation, the paper investigates the propagation of malware in industrial control networks, the stability of dynamic systems, and the Hopf bifurcation phenomenon. The study finds that in a dual delay system, the dual delays interact and cannot be simply separated into two single-delay systems for individual discussion. During the research process, it is essential to clarify the impact of different delays on system stability, and one cannot merely require one delay to be as small as possible. This is because, in a dual delay system, a small value of the other delay may still lead to bifurcation even if one delay is fixed. Therefore, it is necessary to specifically analyze the combined impact of the dual delays on the dynamic system and precisely control them to ensure system stability, thereby suppressing the spread of malware.
(5)
Furthermore, through the analysis of the infection suppression factor, it is found that when implementing isolation measures, priority should be given to isolating devices with high connection density and more connected nodes to slow down the virus propagation rate. The value of the infection suppression factor *a* is a comprehensive result of multiple factors. By comprehensively analyzing the characteristics of the SCADA system, the saturation effect value suitable for this industrial network can be determined, enabling the formulation of corresponding strategies to reduce the infection suppression factor and achieve a system equilibrium with fewer infected nodes.
However, our current model is constrained by its closed single-network system assumption, which cannot characterize cross-network propagation paths. Additionally, the oversimplified premise of uniform security policies across networks fails to reflect real-world complexity. To address these limitations, our ongoing research extends the baseline homogeneous model through the following enhancements:
  • Degree-dependent parameters to quantify propagation capability differences between hub nodes and edge nodes.
  • Enhanced cross-layer propagation terms characterizing viral penetration through gateway devices.
  • Dynamic threshold adaptation based on real-time topological features.
Additionally, further research is needed to explore how the dual delays specifically interact to affect system stability and how to determine the specific ranges of the dual delays while ensuring system stability. These issues require further refinement in subsequent studies.

Author Contributions

Conceptualization, J.W., J.T. and Q.F.; Data curation, J.T., C.L., Z.M. and J.Y.; Investigation, J.T.; Methodology, J.W., J.T., C.L., Z.M., J.Y. and Q.F.; Supervision, J.W. and Q.F.; Validation, J.T., J.Y. and Q.F.; Writing—original draft, J.W. and J.T.; Writing—review and editing, J.T., C.L., Z.M., J.Y. and Q.F. All authors have read and agreed to the published version of the manuscript.

Funding

Liaoning Province Nature Fund Project (2024-BSLH-214).

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Acknowledgments

The authors sincerely appreciate the support from the Liaoning Province Nature Fund Project.

Conflicts of Interest

The authors declare that they have no conflicts of interest to report regarding the present study.

References

  1. Gaushell, D.J.; Darlington, H.T. Supervisory control and data acquisition. Proc. IEEE 1987, 75, 1645–1658. [Google Scholar] [CrossRef]
  2. Gelmini, A. 5G Scada Based Control System. Ph.D. Thesis, University of South Wales, Cardiff, UK, 2024. [Google Scholar]
  3. Wang, J.; Si, C.; Wang, Z.; Fu, Q. A New Industrial Intrusion Detection Method Based on CNN-BiLSTM. Comput. Mater. Contin. 2024, 79, 4297. [Google Scholar] [CrossRef]
  4. Hudedmani, M.G.; Umayal, R.M.; Kabberalli, S.K.; Hittalamani, R. Programmable logic controller (PLC) in automation. Adv. J. Grad. Res. 2017, 2, 37–45. [Google Scholar] [CrossRef]
  5. Zhang, H.; Tan, J.; Liu, X.; Huang, S.; Hu, H.; Zhang, Y. Cybersecurity threat assessment integrating qualitative differential and evolutionary games. IEEE Trans. Netw. Serv. Manag. 2022, 19, 3425–3437. [Google Scholar] [CrossRef]
  6. Kephart, J.O.; White, S.R. Directed-graph epidemiological models of computer viruses. In Computation: The Micro and the Macro View; World Scientific: Singapore, 1992; pp. 71–102. [Google Scholar]
  7. Kephart, J.O.; White, S.R.; Chess, D.M. Computers and epidemiology. IEEE Spectr. 1993, 30, 20–26. [Google Scholar] [CrossRef]
  8. Kephart, J.O.; White, S.R. Measuring and modeling computer virus prevalence. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, 24–26 May 1993; IEEE: Piscataway, NJ, USA, 1993; pp. 2–15. [Google Scholar]
  9. Wo, K. A contribution to the mathematical theory of epidemics. Proc. R. Soc. A 1927, 115, 700–721. [Google Scholar]
  10. Serazzi, G.; Zanero, S. Computer virus propagation models. In International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems; Springer: Berlin/Heidelberg, Germany, 2003; pp. 26–50. [Google Scholar]
  11. Wu, J.; Zhang, X.; Zhu, X.; Xu, X. A variant sirs virus spreading model. In Proceedings of the 2017 International Conference on Computer Systems, Electronics and Control (ICCSEC), Dalian, China, 25–27 December 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 121–124. [Google Scholar]
  12. Dodds, P.S.; Watts, D.J. A generalized model of social and biological contagion. J. Theor. Biol. 2005, 232, 587–604. [Google Scholar] [CrossRef]
  13. Zhao, T.; Zhang, Z.; Upadhyay, R.K. Delay-induced Hopf bifurcation of an SVEIR computer virus model with nonlinear incidence rate. Adv. Differ. Equ. 2018, 2018, 256. [Google Scholar] [CrossRef]
  14. Safar, J.L.; Tummala, M.; McEachen, J.C.; Bollmann, C. Modeling worm propagation and insider threat in air-gapped network using modified SEIQV model. In Proceedings of the 2019 13th International Conference on Signal Processing and Communication Systems (ICSPCS), Gold Coast, QLD, Australia, 16–18 December 2019; pp. 1–6. [Google Scholar]
  15. Sulaiman, M.; Khan, A.; Ali, A.N.; Laouini, G.; Alshammari, F.S. Quantitative analysis of worm transmission and insider risks in air-gapped networking using a novel machine learning approach. IEEE Access 2023, 11, 111034–111052. [Google Scholar] [CrossRef]
  16. Tang, W.; Liu, Y.J.; Chen, Y.L.; Yang, Y.X.; Niu, X.X. SLBRS: Network virus propagation model based on safety entropy. Appl. Soft Comput. 2020, 97, 106784. [Google Scholar] [CrossRef]
  17. Zhang, X.; Gan, C. Global attractivity and optimal dynamic countermeasure of a virus propagation model in complex networks. Phys. A Stat. Mech. Its Appl. 2018, 490, 1004–1018. [Google Scholar] [CrossRef]
  18. Jun, W.; Haoyang, G. Virtual force field coverage algorithms for wireless sensor networks in water environments. Int. J. Sens. Netw. 2020, 32, 174–181. [Google Scholar] [CrossRef]
  19. Shen, S.; Li, H.; Han, R.; Vasilakos, A.V.; Wang, Y.; Cao, Q. Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 1962–1973. [Google Scholar] [CrossRef]
  20. Matta, V.; Di Mauro, M.; Longo, M.; Farina, A. Cyber-threat mitigation exploiting the birth–death–immigration model. IEEE Trans. Inf. Forensics Secur. 2018, 13, 3137–3152. [Google Scholar] [CrossRef]
  21. Carcano, A.; Coletta, A.; Guglielmi, M.; Masera, M.; Fovino, I.N.; Trombetta, A. A multidimensional critical state analysis for detecting intrusions in SCADA systems. IEEE Trans. Ind. Inform. 2011, 7, 179–186. [Google Scholar] [CrossRef]
  22. Sheng, C.; Yao, Y.; Fu, Q.; Yang, W.; Liu, Y. Study on the intelligent honeynet model for containing the spread of industrial viruses. Comput. Secur. 2021, 111, 102460. [Google Scholar] [CrossRef]
  23. Wang, Y.; Gu, D.; Peng, D.; Chen, S.; Yang, H. Stuxnet vulnerabilities analysis of scada systems. In Proceedings of the International Conference on Network Computing and Information Security, Shanghai, China, 7–9 December 2012; Springer: Berlin/Heidelberg, Germany, 2012; pp. 640–646. [Google Scholar]
  24. Valentine, S.E. PLC Code Vulnerabilities Through SCADA Systems; University of South Carolina: Columbia, SC, USA, 2013. [Google Scholar]
  25. Stanković, A.M.; Tomsovic, K.L.; De Caro, F.; Braun, M.; Chow, J.H.; Čukalevski, N.; Dobson, I.; Eto, J.; Fink, B.; Hachmann, C.; et al. Methods for analysis and quantification of power system resilience. IEEE Trans. Power Syst. 2022, 38, 4774–4787. [Google Scholar] [CrossRef]
  26. He, J.; Li, Y.; Tang, J.; Wang, H.; Yang, G.; Li, T.; Lan, X. An Immune Knowledge-Driven SCADA-Based Industrial Virus Propagation Model. IEEE Internet Things J. 2024, 11, 29956–29970. [Google Scholar] [CrossRef]
  27. Zhang, R.; Cao, Z.; Yang, S.; Si, L.; Sun, H.; Xu, L.; Sun, F. Cognition-driven structural prior for instance-dependent label transition matrix estimation. IEEE Trans. Neural Netw. Learn. Syst. 2024, 36, 3730–3743. [Google Scholar] [CrossRef]
  28. Zhang, R.; Tan, J.; Cao, Z.; Xu, L.; Liu, Y.; Si, L.; Sun, F. Part-aware correlation networks for few-shot learning. IEEE Trans. Multimed. 2024, 26, 9527–9538. [Google Scholar] [CrossRef]
  29. Wu, Y.; Ru, Y.; Lin, Z.; Liu, C.; Xue, T.; Zhao, X.; Chen, J. Research on cyber attacks and defensive measures of power communication network. IEEE Internet Things J. 2022, 10, 7613–7635. [Google Scholar] [CrossRef]
  30. Nankya, M.; Chataut, R.; Akl, R. Securing industrial control systems: Components, cyber threats, and machine learning-driven defense strategies. Sensors 2023, 23, 8840. [Google Scholar] [CrossRef]
  31. Zhu, Q.; Zhang, G.; Luo, X.; Gan, C. An industrial virus propagation model based on SCADA system. Inf. Sci. 2023, 630, 546–566. [Google Scholar] [CrossRef]
  32. Wang, J.; Wang, N.; Wang, H.; Cao, K.; El-Sherbeeny, A.M. GCP: A multi-strategy improved wireless sensor network model for environmental monitoring. Comput. Netw. 2024, 254, 110807. [Google Scholar] [CrossRef]
  33. Wang, J.; Luo, D.; Peng, F.; Chen, W.; Liu, J.; Zhang, H. Wireless sensor deployment optimisation based on cost, coverage, connectivity, and load balancing. Int. J. Sens. Netw. 2023, 41, 126–135. [Google Scholar] [CrossRef]
  34. Irmak, E.; Erkek, İ. An overview of cyber-attack vectors on SCADA systems. In Proceedings of the 2018 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 22–25 March 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–5. [Google Scholar]
  35. Knapp, E.D. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems; Elsevier: Amsterdam, The Netherlands, 2024. [Google Scholar]
  36. Fu, Q.; Wang, J.; Si, C.; Liu, J. The Effect of Key Nodes on the Malware Dynamics in the Industrial Control Network. Comput. Mater. Contin. 2024, 79, 329. [Google Scholar] [CrossRef]
  37. Veblen, T.T. Regeneration dynamics. Plant Succession Theory Predict. 1992, 11, 152–187. [Google Scholar]
  38. Diekmann, O.; Heesterbeek, J.A.P.; Roberts, M.G. The construction of next-generation matrices for compartmental epidemic models. J. R. Soc. Interface 2010, 7, 873–885. [Google Scholar] [CrossRef]
  39. Yuan, H.; Chen, G. Network virus-epidemic model with the point-to-group information propagation. Appl. Math. Comput. 2008, 206, 357–367. [Google Scholar] [CrossRef]
  40. Yang, J.; Zhang, F.; Wang, X. A class of SIR epidemic model with saturation incidence and age of infection. In Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), Qingdao, China, 30 July 2007; IEEE: Piscataway, NJ, USA, 2007; Volume 1, pp. 146–149. [Google Scholar]
Figure 1. Model state transition diagram.
Figure 1. Model state transition diagram.
Electronics 14 02058 g001
Figure 2. Variations in S, M, I, Q, and R nodes for different initial values. (a) Variation of S. (b) Variation of M. (c) Variation of I. (d) Variation of Q. (e) Variation of R.
Figure 2. Variations in S, M, I, Q, and R nodes for different initial values. (a) Variation of S. (b) Variation of M. (c) Variation of I. (d) Variation of Q. (e) Variation of R.
Electronics 14 02058 g002
Figure 3. When R0 > 1, the system node graph changes.
Figure 3. When R0 > 1, the system node graph changes.
Electronics 14 02058 g003
Figure 4. Hopf bifurcation diagram for the τ 1 = 0 system.
Figure 4. Hopf bifurcation diagram for the τ 1 = 0 system.
Electronics 14 02058 g004
Figure 5. Node state diagram for τ 1 = 0, τ 2 = 100.
Figure 5. Node state diagram for τ 1 = 0, τ 2 = 100.
Electronics 14 02058 g005
Figure 6. Node state diagram for τ 1 = 0, τ 2 = 300.
Figure 6. Node state diagram for τ 1 = 0, τ 2 = 300.
Electronics 14 02058 g006
Figure 7. Hopf bifurcation diagram for the τ 2 = 0 system.
Figure 7. Hopf bifurcation diagram for the τ 2 = 0 system.
Electronics 14 02058 g007
Figure 8. Node state diagram for τ 1 = 100, τ 2 = 0.
Figure 8. Node state diagram for τ 1 = 100, τ 2 = 0.
Electronics 14 02058 g008
Figure 9. Node state diagram for τ 1   = 300 , τ 2 = 0.
Figure 9. Node state diagram for τ 1   = 300 , τ 2 = 0.
Electronics 14 02058 g009
Figure 10. Bifurcation diagram at τ 2 = 100.
Figure 10. Bifurcation diagram at τ 2 = 100.
Electronics 14 02058 g010
Figure 11. Node state diagram for τ1 = 300 with τ 2 = 100.
Figure 11. Node state diagram for τ1 = 300 with τ 2 = 100.
Electronics 14 02058 g011
Figure 12. Bifurcation diagram of the system with τ 2 = 300.
Figure 12. Bifurcation diagram of the system with τ 2 = 300.
Electronics 14 02058 g012
Figure 13. State diagram of system nodes for different values of τ 1 , τ 2 .
Figure 13. State diagram of system nodes for different values of τ 1 , τ 2 .
Electronics 14 02058 g013
Figure 14. Phase diagrams of S(t), I(t), M(t) for different values of τ 1 , τ 2 .
Figure 14. Phase diagrams of S(t), I(t), M(t) for different values of τ 1 , τ 2 .
Electronics 14 02058 g014
Figure 15. Node Number Evolution in SMIQR Model: Real Data Outputs (S, M, I, D1, Q, R, D2) vs. Differential Simulation Outcomes (Sm, Mm, Im, D1m, Qm, Rm, D2m). (a) Variation of S. (b) Variation of M. (c) Variation of I. (d) Variation of D1. (e) Variation of Q. (f) Variation of R. (g) Variation of D2.
Figure 15. Node Number Evolution in SMIQR Model: Real Data Outputs (S, M, I, D1, Q, R, D2) vs. Differential Simulation Outcomes (Sm, Mm, Im, D1m, Qm, Rm, D2m). (a) Variation of S. (b) Variation of M. (c) Variation of I. (d) Variation of D1. (e) Variation of Q. (f) Variation of R. (g) Variation of D2.
Electronics 14 02058 g015
Figure 16. Number of the Nodes(I) corresponding to a = 0.5, a = 1, a = 1.5, a = 2.
Figure 16. Number of the Nodes(I) corresponding to a = 0.5, a = 1, a = 1.5, a = 2.
Electronics 14 02058 g016
Figure 17. Number of the Nodes(I) corresponding to θ = 0.5, θ = 0.6, θ = 0.7, θ = 0.9.
Figure 17. Number of the Nodes(I) corresponding to θ = 0.5, θ = 0.6, θ = 0.7, θ = 0.9.
Electronics 14 02058 g017
Figure 18. Variations in S and R nodes under three models. (a)Variation of S. (b)Variation of R.
Figure 18. Variations in S and R nodes under three models. (a)Variation of S. (b)Variation of R.
Electronics 14 02058 g018
Figure 19. Variations in I nodes under the three models.
Figure 19. Variations in I nodes under the three models.
Electronics 14 02058 g019
Table 1. The specific parameters for the three models.
Table 1. The specific parameters for the three models.
Parameter R 0 β ab ε μ α δ η λ θ γ ζ p σ
Model
SLBR1.520.350.20.40.20.180.1
SEIQP1.580.60.30.150.30.20.30.20.040.15
SMIQR1.510.3510.20.10.2 0.30.10.90.7
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, J.; Tang, J.; Li, C.; Ma, Z.; Yang, J.; Fu, Q. Modeling and Analysis in the Industrial Internet with Dual Delay and Nonlinear Infection Rate. Electronics 2025, 14, 2058. https://doi.org/10.3390/electronics14102058

AMA Style

Wang J, Tang J, Li C, Ma Z, Yang J, Fu Q. Modeling and Analysis in the Industrial Internet with Dual Delay and Nonlinear Infection Rate. Electronics. 2025; 14(10):2058. https://doi.org/10.3390/electronics14102058

Chicago/Turabian Style

Wang, Jun, Jun Tang, Changxin Li, Zhiqiang Ma, Jie Yang, and Qiang Fu. 2025. "Modeling and Analysis in the Industrial Internet with Dual Delay and Nonlinear Infection Rate" Electronics 14, no. 10: 2058. https://doi.org/10.3390/electronics14102058

APA Style

Wang, J., Tang, J., Li, C., Ma, Z., Yang, J., & Fu, Q. (2025). Modeling and Analysis in the Industrial Internet with Dual Delay and Nonlinear Infection Rate. Electronics, 14(10), 2058. https://doi.org/10.3390/electronics14102058

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop