Requirements on worm mitigation technologies in MANETS
暂无分享,去创建一个
[1] Norman T. J. Bailey,et al. The Mathematical Theory of Infectious Diseases , 1975 .
[2] Charles E. Perkins,et al. The Ad Hoc on-demand distance-vector protocol , 2001 .
[3] Giuseppe Serazzi,et al. Computer Virus Propagation Models , 2003, MASCOTS Tutorials.
[4] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[5] Alexander Grey,et al. The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .
[6] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[7] J. Frauenthal. Mathematical Modeling in Epidemiology , 1980 .
[8] Andreas Terzis,et al. On the Effectiveness of Distributed Worm Monitoring , 2005, USENIX Security Symposium.
[9] Yang Wang,et al. Modeling the effects of timing parameters on virus propagation , 2003, WORM '03.
[10] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[11] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[12] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[13] Robert G. Cole. Initial Studies on Worm Propagation in Manets for Future Army Combat Systems , 2004 .
[14] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.