1 |
Chen Junhua, Wei Shengjun, Peng Wu, "General Worm Propagation Model for Wireless Ad Hoc Networks," International Conference on Computer Science and Information Technology, 2009.
|
2 |
Ben-hua Guo, Shao-hong Cai, "THE SIS-BD MODEL OF COMPUTER VIRUS SPREADING ON INTERNET," Wireless Communications, Networking and Mobile Computing, 2007.
|
3 |
Ming Liu, Lansheng Han*, Fan Hong, Mengsong Zou, "A Computer Virus Propagation Model in P2P Networks," International Workshop on Education Technology and Computer Science, 2009.
|
4 |
Narisa Zhao, Xianfeng Zhang, "The Worm Propagation Model and Control Strategy Based on Distributed Honeynet," International Conference on Computer Science and Software Engineering, 2008.
|
5 |
Jose R.C. Piqueira, Adolfo A. de Vasconcelos, Carlos E.C.J. Gabriel, Vanessa O. Araujo, "Dynamical models for computer viruses," Computers & Security, 2008.
|
6 |
E. Aben, "Conficker/Conflicker/Downadup as seen from the UCSD Network Telescope," http://www.caida.org/research/security/ms08-067/conficker.xml, 2009.
|
7 |
Phillip Porras, Hassen Saıdi, and Vinod Yegneswaran, "A Foray into Conficker's Logic and Rendezvous Points," USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), 2009
|
8 |
Piet Van Mieghem, Jasmina Omic, and Robert Kooij, "Virus Spread in Networks," Transactions on Networking, 2009.
|
9 |
Jose Roberto C. Piqueira, Vanessa O. Araujo, "A modified epidemiological model for computer viruses," Applied Mathematics and Computation, 2009.
|
10 |
Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi, "Modeling and Automated Containment of Worms," Transactions on Dependable and Secure Computing, 2008.
|
11 |
Jose R. C. Piqueira and Felipe Barbosa Cesar, "Dynamical models for computer viruses Propagation," Mathematical Problems in Engineering, 2008
|
12 |
Marc Lelarge, Jean Bolot, "A Local Mean Field Analysis of Security Investments in Networks," Proceedings of the 3rd international workshop on Economics of networked systems, 2008.
|
13 |
Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan and Antonio Nucci, "A Social Network Based Patching Scheme for Worm Containment in Cellular Networks," INFOCOM, 2009.
|
14 |
Dagon D, Zou CC, Lee W., "Modeling botnet propagation using time zones," In: Proc. Of the 13thAnnualNetworkandDistributedSystemSecur itySymp.(NDSS2006).2006.
|
15 |
Kephart J O, White S R, "Directed-graph Epidemiological Models of Computer Viruses," Proc. of the IEEE Computer Society Symposium on Research in Security and Privacy. Oakland, California, USA: IEEE Computer Society Press, 1991: 343-359.
|
16 |
Stuart Staniford, Vern Paxson, Nicholas Weaver, "How to Own the internet in your spare time," USENIX security, 2002
|
17 |
Piqueira JRC, Navarro BF, Monteiro LHA, "Epidemiological models applied to viruses in computer networks," journal of computer science, 2005.
|
18 |
ChangRui Guo, ShaoHong Cai, HaiPing Zhou, DaMin Zhang, "Susceptible-Infected-Susceptible Virus Spread Model in 2-Dimension Regular Network under Local Area Control," International Conference on Networking and Digital Society, 2009.
|