Computer Science ›› 2015, Vol. 42 ›› Issue (3): 128-131.doi: 10.11896/j.issn.1002-137X.2015.03.026
Previous Articles Next Articles
ZHANG Jian-feng, CHEN Gou-xi and YANG Qiu-xiang
[1] Moore D,Shannon C.Code-Red:a case study on the spread and victims of an Internet worm[C]∥Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment.Marseille,France:ACM,2002:273-284 [2] Nazario J.The conficker cabal announced[EB/OL].http://www.asert.arbornetworks.com/2009/02/the-conficker-cabal-announced/,2009 [3] Kermack W O,McKendrick A G.Contributions to the mathematical theory of epidemics.II.The problem of endemicity[J].Proceedings of the Royal society of London,1932,8(834):55-83 [4] Chen Z,Gao L,Kwiat K.Modeling the spread of active worms[C]∥Twenty-Second Annual Joint Conference of the IEEE Computer and Communications(INFOCOM 2003).IEEE Societies,2003:1890-1900 [5] Zou C C,Towsley D,Gong W,et al.Routing worm:A fast,selective attack worm based on ip address information[C]∥Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation.Washington,DC,USA:IEEE Computer Society,2005:199-206 [6] Li Y,Chen Z,Chen C.Understanding divide-conquer-scanningworm-s[C]∥Performance,Computing and Communications Conference,2008(IPCCC 2008).IEEE International,Austin,Texas:IEEE,2008:51-58 [7] Chen Z,Ji C.An information-theoretic view of network-awaremalware attacks[J].IEEE Transactions on Information Forensics and Security,2009,4(3):530-541 [8] Bose A,Shin K G.Agent-based modeling of malware dynamics in heterogeneous environments[J].Security and Communication Networks,2011,6(12):1576-1589 [9] Wagdarikar R R,C Maheshwar R,Raichurakar M A.Securing a Network by Modeling and Containment of Worms Using Preference Scanning[J].International Journal of Research in Computerand Communication Technology,2013,2(10):959-963 [10] 佟晓筠,李巧军.基于免疫主机的蠕虫非线性传播新模型优化[J].计算机科学,2013,9(5):99-101 [11] 苏飞,林昭文,马严,等.IPv6 网络环境下的蠕虫传播模型研[J].通信学报,2011,32(9):51-60 |
No related articles found! |
|