Modeling the propagation of Peer-to-Peer worms
暂无分享,去创建一个
[1] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[2] Chuanyi Ji,et al. A self-learning worm using importance scanning , 2005, WORM '05.
[3] Tamer Basar,et al. Stochastic behavior of random constant scanning worms , 2005, Proceedings. 14th International Conference on Computer Communications and Networks, 2005. ICCCN 2005..
[4] Don Towsley,et al. Routing worm: a fast, selective attack worm based on IP address information , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).
[5] J. Frauenthal. Mathematical Modeling in Epidemiology , 1980 .
[6] Wei Yu. Analyze the worm-based attack in large scale P2P networks , 2004, Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings..
[7] Yang Xiang,et al. Propagation of active worms: A survey , 2009, Comput. Syst. Sci. Eng..
[8] H. Andersson,et al. Stochastic Epidemic Models and Their Statistical Analysis , 2000 .
[9] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[10] Yang Wang,et al. Modeling the effects of timing parameters on virus propagation , 2003, WORM '03.
[11] R. May,et al. Infectious Diseases of Humans: Dynamics and Control , 1991, Annals of Internal Medicine.
[12] Daryl J. Daley,et al. Epidemic Modelling: An Introduction , 1999 .
[13] Chuanyi Ji,et al. Importance-scanning worm using vulnerable-host distribution , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[14] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[15] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[16] Donald F. Towsley,et al. On the performance of Internet worm scanning strategies , 2006, Perform. Evaluation.
[17] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[18] N. Ling. The Mathematical Theory of Infectious Diseases and its applications , 1978 .
[19] Robert K. Cunningham,et al. A taxonomy of computer worms , 2003, WORM '03.
[20] Iván Arce,et al. An Analysis of the Slapper Worm , 2003, IEEE Secur. Priv..
[21] Norman T. J. Bailey,et al. The Mathematical Theory of Infectious Diseases , 1975 .
[22] Saurabh Bagchi,et al. Modeling and automated containment of worms , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).