Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks
暂无分享,去创建一个
[1] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[2] Krishna P. Gummadi,et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.
[3] Steve Chien,et al. A First Look at Peer-to-Peer Worms: Threats and Defenses , 2005, IPTPS.
[4] Kendrick,et al. Applications of Mathematics to Medical Problems , 1925, Proceedings of the Edinburgh Mathematical Society.
[5] G. Röst,et al. ON A SEIR EPIDEMIC MODEL WITH DELAY , 2012 .
[6] K. L. Cooke,et al. Analysis of an SEIRS epidemic model with two delays , 1996, Journal of mathematical biology.
[7] M. Newman,et al. Random graphs with arbitrary degree distributions and their applications. , 2000, Physical review. E, Statistical, nonlinear, and soft matter physics.
[8] Li Lin,et al. Balancing Trust and Incentive in Peer-to-Peer Collaborative System , 2007, Int. J. Netw. Secur..
[9] Beom Jun Kim,et al. Growing scale-free networks with tunable clustering. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.
[10] Minaxi Gupta,et al. A study of malware in peer-to-peer networks , 2006, IMC '06.
[11] YuWei,et al. Peer-to-peer system-based active worm attacks , 2008 .
[12] Yingyou Wen,et al. Passive Worm Propagation Modeling and Analysis , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).
[13] B. Levine,et al. Availability and Popularity Measurements of Peer-to-Peer File Systems , 2004 .
[14] Qingyu Zhang,et al. A Peer-based Recovery Scheme for Group Rekeying in Secure Multicast , 2008, Int. J. Netw. Secur..
[15] Xia Chun. Research on Epidemic Models of P2P Worm in Structured Peer-to-Peer Networks , 2006 .
[16] Mark Coates,et al. Epidemiological Modelling of Peer-to-Peer Viruses and Pollution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[17] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.
[18] Dinesh Kumar Saini,et al. SEIRS epidemic model with delay for transmission of malicious objects in computer network , 2007, Appl. Math. Comput..
[19] Guanling Chen,et al. Simulating non-scanning worms on peer-to-peer networks , 2006, InfoScale '06.