References
- Morris worm. http://en.wikipedia.org/wiki/Morris worm.
- Norman T. J. BAILEY, "The Mathematical Theory of Epidemics," Hafner Publishing Co, 1957.
- H.W. Hethcote, "The Mathematics of Infectious Diseases," In SIAM Review, vo.42, no.4, pp. 599-653, 2000. https://doi.org/10.1137/S0036144500371907
- D.M. Kienzle, M.C. Elder, "Recent worms: a survey and trends," in Proc. of the ACM Workshop on Rapid Malcode, pp.1-10, 2003.
- S. Qing, W. Wen, "A survey and trends on Internet worms," Computers & Security, vol.24, pp. 334-346, 2005. https://doi.org/10.1016/j.cose.2004.10.001
- C.C. Zou, D. Towsley, W. Gong, S. Cai, "Advanced Routing Worm and Its Security Challenges," Simulation, vol.82, no.1, pp.75-85, 2006. https://doi.org/10.1177/0037549706065344
- C.C. Zou, D. Towsley, W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm," IEEE Transactions on Dependable and Secure Computing, vol.4, no.2, pp.105-118, 2007. https://doi.org/10.1109/TDSC.2007.1001
- C.C. Zou, W. Gong, D. Towsley, L. Gao, "The monitoring and early detection of internet worms," IEEE/ACM Transactions on Networking (TON), vol.13, no.5, pp.961-974, 2005. https://doi.org/10.1109/TNET.2005.857113
- N. Provos, J. McClain, K. Wang, "Search Worms," in Proc. of the 4th ACM Workshop on Recurring Malcode, pp.1-8, 2006.
- D. Moore, C. Shannon, G.M. Voelker, S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code," in Proc. of IEEE Conference(INFOCOM 2003), 2003.
- S. Staniford, V. Paxson, N. Weaver, "How to Own the Internet in Your Spare Time," in Proc. of the 11th USENIX Security Symposium, pp.149-167, 2002.
- D. Moore, C. Shannon, "Code-Red: a Case Study on the Spread and Victims of an Internet Worm," in Proc. of the 2002 ACM SIGCOMM Internet Measurement Workshop, pp.273-284, 2002.
- D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, "Inside the Slammer Worm," IEEE Security & Privacy, vol.1, no.4, 2003.
- J.C. Frauenthal, "Mathematical Modeling in Epidemiology," Springer-Verlag, 1980.
- C.C. Zou, W. Gong, D. Towsley, "Code Red Worm Propagation Modeling and Analysis," in Proc. of CCS02, 2002.
- CAIDA (Cooperative Association for InternetData Analysis). http://www.caida.org.
- IANA (Internet Assigned Numbers Authority). http://www.iana.org.
- The network simulator: NS-2. http://www.isi.edu/nsnam/ns.
- The MathWorks. http://www.mathworks.com.