Passive Worm Propagation Modeling and Analysis
暂无分享,去创建一个
[1] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[2] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[3] Dan Wu,et al. Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy , 2005, ICA3PP.
[4] Jun Xu,et al. WORM vs. WORM: preliminary study of an active counter-attack mechanism , 2004, WORM '04.
[5] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[6] Robert K. Cunningham,et al. A taxonomy of computer worms , 2003, WORM '03.
[7] J. Frauenthal. Mathematical Modeling in Epidemiology , 1980 .
[8] Wanlei Zhou,et al. Proceedings of the 6th international conference on Algorithms and Architectures for Parallel Processing , 2005 .
[9] George Kesidis,et al. Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms , 2005, QoS-IP.
[10] Ed Skoudis,et al. Malware: Fighting Malicious Code , 2003 .
[11] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[12] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.