[1] |
Faghani M R,Saidi H.Malware propagation in online social networks[C]∥Proc of the 4th Malicious and Unwanted programs(MALWARE09), 2009:814.
|
[2] |
Kim J, Radhakrishana S, Jang J. Cost optimization in SIS model of worm infection[J]. ETRI Journal, 2006,28(5):692695.
|
[3] |
Zhou H, Wen Y, Zhao H. Modeling and analysis of active benign worms and hybrid benign worms containing the spread of worms[C]∥Proc of the IEEE International Conference on Networking (ICN’07), 2007:65.
|
[4] |
Khouzani M H R,Sarkar S,Altman E. Maximum damage malware attack in mobile wireless networks[C]∥Proc of INFOCOM’10, 2010:19.
|
[5] |
Ma zhien,Zhou Yicang.Ordinary differential equations qualitative and stability [M]. Beijing:Science Press,2001.(in Chinese)
|
[6] |
Kephart J O,White S R.Directedgraphepidemiological models of computer viruses[C]∥Proc of the IEEE Symposium on Security and Privacy, 1991:343361.
|
[7] |
NLANR Active Measurement Program(AMP)[EB/OL].[20111215].http://watt.nlanr.net/.
|
[8] |
Abilene network[EB/OL].[20111215].http://abilene.internet2.edu/.
|
[9] |
Su Fei,Lin Zhanwan,Ma Yan. Modeling and analysis of internetworm propagation[J]. Journal of China Universities of Posts and Telecommunications, 2010,4(17):6368.
|
[10] |
Yang Feng,Duan Haixin,Li Xing.Modeling and analysis of network worm diffusion and benign worm interaction process[J]. Science in China Series E(Information Sciences), 2004,34(8):841856. (in Chinese)
|
[11] |
Moore D.The spread of the codered worm[EB/OL].[20070131]. http://www.caida.org/data/passive/codered_worms_dataset.xml.
|
[12] |
Liu Jianfang,Liu Qiming,Liu Lihong.Analysis of a mathematical model for virus propagation[J]. Mathematics in Practice and Theory, 2008,38(12):4952. (in Chinese)
|
[13] |
Toutonji O A,Yoo SM,Park M. Stability analysis of VEISV propagation modeling for network worm attack[J]. Applied Mathematical Modelling, 2012,36(6):27512761.
|
[14] |
Liu Qiming.Construction and analysis of a SIRS model for worm virus propagation[J]. Journal of Southwest China Normal University, 2010,35(1):168171. (in Chinese)
|
[15] |
Zou Changchun, Gong Weibo. Code red worm propagation modeling and analysis[C]∥Proc of the 9th ACM Symposium on Computer and Communication Security, 2002:1.
|
[16] |
Zhang Dianxu, Zhang Yi,Liu Xiaoyang, et al. Research on the SRF spread model of friendly worms[J]. Computer Engineering & Science, 2010,32(7):1823. (in Chinese)
|
|
附中文参考文献:
|
[5] |
马知恩,周义仓.常微分方程定性与稳定性方法[M]. 北京:科学出版社,2001.
|
[8] |
张殿旭,张怡,刘晓阳,等.良性蠕虫SRF 扩散模型研究[J].计算机工程与科学,2010,32(7):1823.
|
[10] |
杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学E辑(信息学),2004,34(8):841856.
|
[12] |
刘建芳,刘启明,刘立红.计算机蠕虫病毒传播的数学模型分析[J].数学的实践与认识.2008,38(12):4952.
|
[14] |
刘启明.一个蠕虫病毒传播SIRS模型的建立与分析[J].西南师范大学学报,2010,35(1):168171.
|