Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy
暂无分享,去创建一个
[1] J. Frauenthal. Mathematical Modeling in Epidemiology , 1980 .
[2] Eugene H. Spafford,et al. The Internet Worm Incident , 1989, ESEC.
[3] Qing Si-han,et al. Research and Development of Internet Worms , 2004 .
[4] Hiroshi Toyoizumi,et al. Predators: good will mobile codes combat against computer viruses , 2002, NSPW '02.
[5] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[6] Donald F. Towsley,et al. Monitoring and early warning for internet worms , 2003, CCS '03.
[7] Donald F. Towsley,et al. On the performance of Internet worm scanning strategies , 2006, Perform. Evaluation.
[8] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.