References
- E. Aben, "Conficker/Conflicker/Downadup as seen from the UCSD Network Telescope," http://www.caida.org/research/security/ms08-067/conficker.xml, 2009.
- Phillip Porras, Hassen Saıdi, and Vinod Yegneswaran, "A Foray into Conficker's Logic and Rendezvous Points," USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), 2009
- Kephart J O, White S R, "Directed-graph Epidemiological Models of Computer Viruses," Proc. of the IEEE Computer Society Symposium on Research in Security and Privacy. Oakland, California, USA: IEEE Computer Society Press, 1991: 343-359.
- Stuart Staniford, Vern Paxson, Nicholas Weaver, "How to Own the internet in your spare time," USENIX security, 2002
- Piqueira JRC, Navarro BF, Monteiro LHA, "Epidemiological models applied to viruses in computer networks," journal of computer science, 2005.
- Dagon D, Zou CC, Lee W., "Modeling botnet propagation using time zones," In: Proc. Of the 13thAnnualNetworkandDistributedSystemSecur itySymp.(NDSS2006).2006.
- ChangRui Guo, ShaoHong Cai, HaiPing Zhou, DaMin Zhang, "Susceptible-Infected-Susceptible Virus Spread Model in 2-Dimension Regular Network under Local Area Control," International Conference on Networking and Digital Society, 2009.
- Chen Junhua, Wei Shengjun, Peng Wu, "General Worm Propagation Model for Wireless Ad Hoc Networks," International Conference on Computer Science and Information Technology, 2009.
- Ben-hua Guo, Shao-hong Cai, "THE SIS-BD MODEL OF COMPUTER VIRUS SPREADING ON INTERNET," Wireless Communications, Networking and Mobile Computing, 2007.
- Ming Liu, Lansheng Han*, Fan Hong, Mengsong Zou, "A Computer Virus Propagation Model in P2P Networks," International Workshop on Education Technology and Computer Science, 2009.
- Narisa Zhao, Xianfeng Zhang, "The Worm Propagation Model and Control Strategy Based on Distributed Honeynet," International Conference on Computer Science and Software Engineering, 2008.
- Jose R.C. Piqueira, Adolfo A. de Vasconcelos, Carlos E.C.J. Gabriel, Vanessa O. Araujo, "Dynamical models for computer viruses," Computers & Security, 2008.
- Jose Roberto C. Piqueira, Vanessa O. Araujo, "A modified epidemiological model for computer viruses," Applied Mathematics and Computation, 2009.
- Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi, "Modeling and Automated Containment of Worms," Transactions on Dependable and Secure Computing, 2008.
- Piet Van Mieghem, Jasmina Omic, and Robert Kooij, "Virus Spread in Networks," Transactions on Networking, 2009.
- Jose R. C. Piqueira and Felipe Barbosa Cesar, "Dynamical models for computer viruses Propagation," Mathematical Problems in Engineering, 2008
- Marc Lelarge, Jean Bolot, "A Local Mean Field Analysis of Security Investments in Networks," Proceedings of the 3rd international workshop on Economics of networked systems, 2008.
- Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan and Antonio Nucci, "A Social Network Based Patching Scheme for Worm Containment in Cellular Networks," INFOCOM, 2009.
Cited by
- Propagation Models for Structural Parameters in Online Social Networks vol.15, pp.1, 2014, https://doi.org/10.7472/jksii.2014.15.1.125