1 |
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, "Inside the Slammer Worm," IEEE Security & Privacy, vol.1, no.4, 2003.
|
2 |
J.C. Frauenthal, "Mathematical Modeling in Epidemiology," Springer-Verlag, 1980.
|
3 |
C.C. Zou, W. Gong, D. Towsley, "Code Red Worm Propagation Modeling and Analysis," in Proc. of CCS02, 2002.
|
4 |
CAIDA (Cooperative Association for InternetData Analysis). http://www.caida.org.
|
5 |
IANA (Internet Assigned Numbers Authority). http://www.iana.org.
|
6 |
The network simulator: NS-2. http://www.isi.edu/nsnam/ns.
|
7 |
The MathWorks. http://www.mathworks.com.
|
8 |
C.C. Zou, D. Towsley, W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm," IEEE Transactions on Dependable and Secure Computing, vol.4, no.2, pp.105-118, 2007.
DOI
|
9 |
C.C. Zou, W. Gong, D. Towsley, L. Gao, "The monitoring and early detection of internet worms," IEEE/ACM Transactions on Networking (TON), vol.13, no.5, pp.961-974, 2005.
DOI
|
10 |
N. Provos, J. McClain, K. Wang, "Search Worms," in Proc. of the 4th ACM Workshop on Recurring Malcode, pp.1-8, 2006.
|
11 |
D. Moore, C. Shannon, G.M. Voelker, S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code," in Proc. of IEEE Conference(INFOCOM 2003), 2003.
|
12 |
S. Staniford, V. Paxson, N. Weaver, "How to Own the Internet in Your Spare Time," in Proc. of the 11th USENIX Security Symposium, pp.149-167, 2002.
|
13 |
H.W. Hethcote, "The Mathematics of Infectious Diseases," In SIAM Review, vo.42, no.4, pp. 599-653, 2000.
DOI
ScienceOn
|
14 |
D. Moore, C. Shannon, "Code-Red: a Case Study on the Spread and Victims of an Internet Worm," in Proc. of the 2002 ACM SIGCOMM Internet Measurement Workshop, pp.273-284, 2002.
|
15 |
Morris worm. http://en.wikipedia.org/wiki/Morris worm.
|
16 |
Norman T. J. BAILEY, "The Mathematical Theory of Epidemics," Hafner Publishing Co, 1957.
|
17 |
C.C. Zou, D. Towsley, W. Gong, S. Cai, "Advanced Routing Worm and Its Security Challenges," Simulation, vol.82, no.1, pp.75-85, 2006.
DOI
ScienceOn
|
18 |
D.M. Kienzle, M.C. Elder, "Recent worms: a survey and trends," in Proc. of the ACM Workshop on Rapid Malcode, pp.1-10, 2003.
|
19 |
S. Qing, W. Wen, "A survey and trends on Internet worms," Computers & Security, vol.24, pp. 334-346, 2005.
DOI
ScienceOn
|