Sub-connection Based Isolation Against Network Virus
暂无分享,去创建一个
Ming Liu | Mengsong Zou | Lansheng Han | Qiwen Liu | Ming Liu | Mengsong Zou | Lansheng Han | Qiwen Liu
[1] Yeu-Pong Lai,et al. Network Security Improvement with Isolation Implementation Based on ISO-17799 Standard , 2007, NBiS.
[2] N. Ling. The Mathematical Theory of Infectious Diseases and its applications , 1978 .
[3] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[4] Zhu Jian-sheng. Discussion on technology of network isolation , 2006 .
[5] Liao Yong-song. Discussion on network isolation scheme of intranet , 2006 .
[6] Alessandro Vespignani,et al. Epidemic dynamics and endemic states in complex networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[7] Glenn Mansfield,et al. The Dynamic Symptom Isolation Algorithm for Network Fault Management and Its Evaluation , 1998 .
[8] R. Subramanian,et al. Innovative and effective methodology for implementing network isolation for manufacturing environments , 2005, ISSM 2005, IEEE International Symposium on Semiconductor Manufacturing, 2005..
[9] Fan Wen-bin. Discussion on physics isolation technology for internet and intranet , 2003 .
[10] Hui Liu,et al. Analytic Model for Network Viruses , 2005, ICNC.
[11] Yaoxue Zhang,et al. A New One-Way Isolation File-Access Method at the Granularity of a Disk-Block , 2007, ATC.
[12] Sukhan Lee,et al. Multisensor Fusion and Integration for Intelligent Systems , 2009 .
[13] M. Fernandez,et al. A failure detection and isolation algorithm for a decentralised multisensor system , 1994, Proceedings of 1994 IEEE International Conference on MFI '94. Multisensor Fusion and Integration for Intelligent Systems.
[14] Alexander Grey,et al. The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .
[15] S. Lubore,et al. A network isolation algorithm , 1970 .
[16] Matthew C. Elder,et al. On computer viral infection and the effect of immunization , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[17] Jeffrey O. Kephart,et al. Measuring and modeling computer virus prevalence , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[18] Liu Yan-bao. Physical isolation technology and data safety transmitting model , 2005 .