1 |
"인터넷침해사고 동향 및 분석월보", 한국인터넷진흥원, 2012
|
2 |
H. W. Hethcote, "The Mathematics of Infectious Diseases", SIAM Review, Vol. 42, No. 4, 2000
|
3 |
James D. Murray, "Mathematical Biology", Springer-Verlag, 1993
|
4 |
Cliff C. Zou, Don Towsley, Weibo Gong, "On the Performance of Internet Worm Scanning Strategies", Elsevier Journal of Performance Evaluation, vol. 63, no. 7, pp. 700-723, 2006
DOI
ScienceOn
|
5 |
Cliff C. Zou, Weibo Gong, Don Towsley. "Code Red Worm Propagation Modeling and Analysis", 9th ACM Conference on Computer and Communication Security (CCS'02), 2002
|
6 |
신원, 이경현, "인터넷 환경에서 웜 확산 모델의 제안과 분석", 한국정보보보학회논문지, Vol.16 No.3, pp. 165-172, 2006
과학기술학회마을
|
7 |
"The Spread of the Sapphire/Slammer Worm", http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html
|
8 |
Bluetooth, http://en.wikipedia.org/wiki/Bluetooth
|
9 |
Y. Bulygin, "Epidemics of Mobile Worms", Performance, Computing, and Communications Conference, 2007. pp.475-478, 2007
|
10 |
Multimedia Messaging Service, http://en.wikipedia.org/wiki/Multimedia_Messaging_Service
|
11 |
Wi-Fi, http://en.wikipedia.org/wiki/Wi-Fi
|
12 |
P. Wang, M. Gonzalez, C. A. Hidalgo, A.-L. Barabasi, "Understanding the spreading patterns of mobile phone viruses", Science, 324, pp. 1071-1076, 2009
DOI
ScienceOn
|