1 |
Cliff C. Zou, Weibo Gong, Don Towsley. 'Code Red Worm Propagation Modeling and Analysis', 9th ACM Conference on Computer and Communication Security (CCS'02), 2002
|
2 |
http://lists.jammed.com/incidents/2001/07/0149.html
|
3 |
'The Spread of the Sapphire/Slammer Worm', http://www.caida.org/outreach/ papers/2003/sapphire/sapphire.html
|
4 |
S. Staniford, V. Paxson, and N. Weaver, 'How to Own the Internet in Your Spare Time', Proceedings of the USENIX Security Symposium, pp. 149-167, 2002
|
5 |
J. Kim, S. Radhakrishnan, S. K. Dhall, 'Measurement and Analysis of Worm Propagation on Internet Network Topology', International Conference on Computer Communications and Networks(ICCCN'04) 2004, 2004
|
6 |
전용희, '인터넷 웜의 탐지 및 대응기술 ', 한국통신학회지, 제 22권 8호, pp.1088-1103, 2005
|
7 |
D. Moore, C. Shanning and K. Claffy, 'Code-Red: a case study on the spread and victims of an Internet worm', Proceedings of the 2nd Internet Measurement Workshop, pp. 273–ヨ284, 2002
|
8 |
정관진, 이희조, '인터넷 웜과 바이러스의 진화 와 전망', 한국정보처리학회지, 제 10권 제 2 호, pp.27-37, 2003
|
9 |
http://lists.jammed.com/incidents/2001/07/0159.html
|
10 |
James D. Murray, 'Mathematical Biology', Springer-Verlag, 1993
|
11 |
A. Wagner and T. Dubendorfer, 'Experiences with Worm Propagation Simulations', WORM '03, 2003
|
12 |
D. Moore, C. Shannon, G. Voelker, and S. Savage, 'Internet quarantine: Requirements for containing selfpropagating code', Proceedings of 22nd Annual Joint Conference of IEEE Computer and Communication societies (INFOCOM 2003), 2003
|
13 |
신원, '고성능 네트워크에서 인터넷 웜 확산 모델링', 제 12-C 제 6호, pp.839-846, 2005
|
14 |
Thomas M. Chen, Jean-Marc Robert, 'Worm Epidemics in High-Speed Networks', IEEE Computer Society, pp.48-53, 2004
|
15 |
H. W. Hethcote, 'The Mathematics of Infectious Diseases', SIAM Review, Vol. 42, No. 4, 2000
|
16 |
Z. Chen and L. Gao and K. Kwiat, 'Modeling the Spread of Active Worms', IEEE INFOCOM, 2003
|