1 |
Cliff Changchun Zou, Weibo Gong, Don Towsley "Code Red Worm Propagation Modeling and Analysis", Conferrence on Computer and Communications Security, 2002.
|
2 |
D. J. Deley and J. Gani, "Epidemic Modeling: An Introduction", Cambridge university Press, 1999.
|
3 |
F. B Cohen, "A Formal Definition of Computer Worms and Some Related Results", Computer & Security, 7(11) pp.641-652, 1992.
|
4 |
Dr. Winfried Gleissner, "A Mathematical Theory for the Spread of Computer Viruses", Computer & Security, 8(1) pp.35-41, 1989.
DOI
|
5 |
Wangner A., Dubendorfer T., Plattner B. and Hiestand R., "experiences with worm propagation simulations", Proceedings of the 2003 ACM workshop on Rapid malcode, pp.34-41, 2003.
|
6 |
Yang W. and Chenxi W., "modeling the effects of timing parameters on virus propagation", Proceedings of the 2003 ACM workshop on Rapid malcode, pp. 61-66, 2003.
|
7 |
박원형, 김영진, 이동휘, 김귀남, "마코브 체인을 이용한 Mass SQL Injection 웜 확산 예측에 관한 연구", 정보보안논문지, 제8권 제4호, pp. 173-181, 2008.
|
8 |
한학용, "패턴 인식 개론", 한빛미디어, pp. 432-438, 2009.
|
9 |
Farrington, David P., Martin Gill, Sam J., Waples, and Javier Argomaniz., "The effects of closed-circuit television on crime: meta-analysis of an English national quasi-experimental multi-site evaluation", Journal of Experimental Criminology Volume 3 Number 1, pp. 21-38, 2007.
DOI
|
10 |
Symantec, "Symantec Internet Security Threat Report trends for 2010", Volume 16, 2011.
|
11 |
AhnLab, "ASEC REPORT", Annual Report, 2013.
|
12 |
http://www.trojanhunter.com/trojanhunter/portlist/
|