Computer Science ›› 2013, Vol. 40 ›› Issue (5): 141-146.
Previous Articles Next Articles
TANG Hao-kun,LIU Yan-bing,HUANG Jun and ZHANG Heng
[1] Lui S M,Kwok S H.Interoperability of Peer-To-Peer File Sharing Protocols[J].ACM SIGCOM Exchanges,2002,3(3):25-33 [2] Zhou L D,Zhang L T,Frank M,et al.A first look at peer-to-peer worms threats and defenses[C]∥Proceedings of IPTPS05.Peer-to-Peer Systems IV Lecture Notes in Computer Science,2005,3640:24-35 [3] Yu W.Analyze the worm-based attack in large scale P2P networks[C]∥Proceedings of The 8th IEEE International Symposium on High Assurance Systems Engineering.Tampa,Florida:IEEE Press,2004:308-309 [4] Arce I,Levy E.An analysis of the Slapper worm.IEEE Security & Privacy,2003:82-87 [5] Chen G,Gray R S.Simulating non-scanning worms on peer-to-peer networks[C]∥Proceedings of the 1st International Conferen-ce on Scalable Information Systems.Hong Kong,China,2006 [6] Xie C,Yin Z Y.The Research of Worms in P2P Networks[C]∥Proceedings of Computational Intelligence and Natural Computing International Conference.2009:389-392 [7] 夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(6):952-959 [8] 罗兴睿,姚羽,高福祥.基于纯P2P原理的蠕虫传播模型的研究[J].通信学报,2006,27(11):53-58 [9] Fan X,Xiang Y.Modeling the Propagation of Peer-to-PeerWorms under Quarantine[C]∥Proceedings of Network Operations and Management Symposium (NOMS).Osaka,Japan:IEEE Press,2010:942-945 [10] Fan X,Xiang Y.Modeling the Propagation Process of Topology-Aware Worms:An Innovative Logic Matrix Formulation[C]∥Proceedings of Network and Parallel Computing 2009Sixth IFIP International Conference.Gold Coast,QLD:IEEE Press,2009:182-189 [11] Fan X,Xiang Y.Propagation Modeling of Peer-to-Peer Worms[C]∥Proceedings of 24th IEEE International Conference on Advanced Information Networking and Applications.2010:1128-1135 [12] Fan X,Guo W W,Looi M.Modeling and Simulating the Propagation of Unstructured Peer-to-Peer Worms[C]∥ Proceedings of Computational Intelligence and Security 2011Seventh International Conference.Hainan,China:IEEE Press,2011:573-577 [13] Shin J,Kim T,TAK S.A Reputation Management Scheme Improving the Trustworthiness of P2P Networks[C]∥Proceedings of Convergence and Hybrid Information Technology 2008International Conference.Daejeon,Korea:IEEE Press,2008:92-97 [14] 冯朝胜,秦志光,Cuthbert L,等.P2P网络中沉默型蠕虫传播建模与分析[J].计算机研究与发展,2010,47(3):500-507 [15] Yang W,Li Y.P2P worm Propagation modeling and analysis under dynamic quarantine defense[C]∥Proceedings of e-Business and Information System Security 20102nd International Conferen-ce.Wuhan,Huhei:IEEE Press,2010:1-4 [16] Yu W,Boyer C,Chellappan S,et al.Peer-to-Peer System-based Active Worm Attacks:Modeling and Analysis[C]∥Proceedings of IEEE International Conference on Communications.2005:295-300 [17] Jafarabadi A,Azgomi M A.An SIR model for the propagation of topology-aware active worms considering the join and leave of hosts[C]∥Proceedings of Information Assurance and Security 7th International Conference.2011:204-209 [18] Gao C X,Zhang F Y,Xin Y,et al.Research on Worm’s Propagation and Defense Model in Different P2P Networks[J].Journal of Beijing University of Posts and Telecommunications,2006,29(22):49-53 [19] 邓眣轶.对等网络蠕虫及其防御技术研究[D].成都:电子科技大学,2007 |
No related articles found! |
|