Computer Science ›› 2014, Vol. 41 ›› Issue (7): 130-134.doi: 10.11896/j.issn.1002-137X.2014.07.026
Previous Articles Next Articles
GAO Wei-min,ZHU Ling-zhi and LIANG Jun-bin
[1] 王长广.无线环境下恶意程序的传播机制研究[D].西安:电子科技大学,2006 [2] 王长广,沈玉龙,马建峰,等.一种蓝牙环境下恶意程序的传播模型[J].西安电子科技大学学报,2009,36(1):94-98 [3] 陶智飞.网络病毒传播模型及两阶段动态免疫策略研究[D].武汉:华中科技大学,2006 [4] 副帅,往长广,马建峰.无线传感器网络中恶意程序的传播模型[J].计算机工程,2011,7(3):129-131 [5] 杨春霞,胡丹婷.动态演化的互联网病毒建模与分析[J].计算机应用研究,2012,9(7):2678-2680 [6] 陈丹伟,唐平,周书桃.基于沙盒技术的恶意程序检测模型[J].计算机科学,2012,9(6):12-14 [7] Royer E,Melliar-Smith P M,Moser L.An analysis of optimum node density for ad Hoc mobile networks[C]∥Proc.IEEE.ICC,June 2001:857-861 [8] Yoon J,Liu Ming-yan,Noble B.Random waypoint consideredharmful[C]∥Twenty-Second Annual Joint Conference of the IEEE Computer and Communications.2003:1312-1321 [9] Bettstetter C,Krause O.On border effects in modeling mo simulation of wireless ad hoc networks[C]∥The 3rd IEEE International Conference on Mobile and Wireless Communication Networks.August 2001 [10] Bettstetter C,Resta G,Santi P.The node distribution of the random waypoint mobility mobility for wireless ad hoc networks[J].IEEE Transactions on Mobile Computing,2003,2(3):257-269 [11] 方宝平.复杂网络的病毒传播及免疫策略[D].合肥:安徽大学,2011 |
No related articles found! |
|