[1]Staniford S, Paxson V, Weaver N. How to own the internet in your spare time[C]∥ Proc
of the 11th USENIX Security Symposium, 2002:149167.
[2]Kim J, Radhakrishnan S, Dhall S. Measurement and analysis of worm propagation on
internet network topology[C]∥ Proc of the 13th International Conference on Computer
Communications and Networks, 2004:495500.
[3]Zou C C, Gong W, Towsley D. Code red worm propagation modeling and analysis[C]∥ Proc
of the 9th ACM Conference on Computer and Communications Security, 2002:138147.
[4]Chen Z S, Gao L X, Kwiat K. Modeling the spread of active worms[C]∥ Proc of the 22nd
Annual Joint Conference of the IEEE Computer and Communications, 2003:18901900.
[5]Faghani M R, Sandi H. Social networks’ XSS worms[C]∥ Proc of the International
Conference on Computational Science and Engineering, 2009:11371141.
[6]Wang Y, Wen S, Xiang Y. Modeling worms propagation on probability[C]∥ Proc of the
5th International Conference on Network and System Security, 2011:4956.
[7]Holme P, Kim B J. Growing scalefree networks with tunable clustering[J]. Physical
Review E, 2002,65(2):107112.
[8]Thelwall M. Social networks, gender and friending:An analysis of MySpace member
profiles[J]. Journal of the American Society for Information Science and Technology, 2008,
59(8):13211330.
[9]Wang Y, Wen S, Cesare S, et al. The microcosmic model of worm propagation[J]. The
Computer Journal, 2011,54(10):17001720. |