Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism
暂无分享,去创建一个
Li Xu | Zhide Chen | Meng Wang | Huan Zhan | M. Wang | Zhide Chen | Li Xu | Huan Zhan
[1] Tao Li,et al. Strategy of fast and light-load cloud-based proactive benign worm countermeasure technology to contain worm propagation , 2012, The Journal of Supercomputing.
[2] Seong-Moo Yoo,et al. Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense , 2009, KSII Trans. Internet Inf. Syst..
[3] Giovanni Vigna,et al. Using Labeling to Prevent Cross-Service Attacks Against Smart Phones , 2006, DIMVA.
[4] Sihan Qing,et al. A survey and trends on Internet worms , 2005, Comput. Secur..
[5] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[6] A. Kohn. [Computer viruses]. , 1989, Harefuah.
[7] William H. Sanders,et al. Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms , 2007, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07).
[8] Jun Xu,et al. WORM vs. WORM: preliminary study of an active counter-attack mechanism , 2004, WORM '04.
[9] Dong Li,et al. An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.
[10] Michele Maggiore,et al. Theory and experiments , 2008 .
[11] Hong Zhao,et al. Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms , 2007, Sixth International Conference on Networking (ICN'07).
[12] Kang G. Shin,et al. Proactive security for mobile messaging networks , 2006, WiSe '06.
[13] Fred Cohen,et al. Computer viruses—theory and experiments , 1990 .