[1] |
SPAFFORD E H . The Internet Worm Program:an Analysis[R]. Technical Report,CSD-TR-823,West Lafayette:Department of Computer Science,Purdue University, 1988. 1-29.
|
[2] |
MOORE D , SHANNON C , BROWN J . Code-Red:a case study on the spread and victims of an Internet worm[A]. Proceedings of the Second ACM SIGCOMM Workshop on Internet Measurement[C]. 2002. 273-284.
|
[3] |
刘玉岭, 冯登国, 吴丽辉 等. 基于静态贝叶斯博弈的蠕虫攻防策略绩效评估[J]. 软件学报, 2012,23(3):712-723. LIU Y L , FENG D G , WU L H , et al. Performance evaluation of worm attack and defense strategies based on static Bayesian game[J]. Journal of Software, 2012,23(3):712-723.
|
[4] |
汪洁, 王建新, 刘绪崇 . 基于近邻关系特征的多态蠕虫防御方法[J]. 通信学报, 2011,32(8):150-158. WANG J , WANG J X , LIU X C . Novel approach based on neighborhood relation signature against polymorphic internet worms[J]. Journal on Communications, 2011,32(8):150-158.
|
[5] |
洪征, 吴礼发 . 基于阳性选择的蠕虫检测系统[J]. 软件学报, 2010,21(4):816-826. HONG Z , WU L F . Worm detection system based on positive selection[J]. Journal of Software, 2010,21(4):816-826.
|
[6] |
唐勇, 诸葛建伟, 陈曙晖 等. 蠕虫正则表达式特征自动提取技术研究[J]. 通信学报, 2013,34(3):141-147. TANG Y , ZHUGE J W , CHEN S H , et al. Automatic generating regular expression signatures for real network worms[J]. Journal on Communications, 2013,34(3):141-147.
|
[7] |
STANIFORD S , PAXSON V , WEAVER N . How to own the Internet in your spare time[A]. Proc of the 11th Usenix Security Symp[C]. San Francisco, 2002.
|
[8] |
ZOU C C , GONG W , TOWSLEY D . Code Red worm propagation modeling and analysis[A]. Proc of the 9th ACM Symp.on Computer and Communication Security[C]. 2002. 138-147.
|
[9] |
CHEN Z , GAO L , KWIAT K . Modeling the spread of active worms[A]. IEEE INFOCOM 2003[C]. 2002. 1890-1900.
|
[10] |
YU W , WANG X , PRASAD C , ZHAO W . Modeling and detection of Camouflaging worm[J]. IEEE Transaction on Dependable and Secure Computing, 2011,8(4): 377-390.
|
[11] |
冯朝胜, 秦志光, 袁丁 等. P2P 网络中被动型蠕虫传播与免疫建模[J]. 电子学报, 2013,41(5):884-889. FENG C S , QIN Z G , YUAN D , et al. Modeling propagation and immunization of passive worms in peer-to-peer networks[J]. Acta Electronica Sinica, 2013,41(5):884-889.
|
[12] |
孙鑫, 刘衍珩, 朱建启 等. 社交网络蠕虫仿真建模研究[J]. 计算机学报, 2011,34(7):1252-1261. SUN X , LIU Y H , ZHU J Q , et al. Research on simulation and modeling of social network worm propagation[J]. Chinese Journal of Computers, 2011,34(7):1252-1261.
|
[13] |
YU W , ZHANG N , FU X W , et al. Self-disciplinary worms and countermeasures:modeling and analysis[J]. IEEE Transactions on Parallel and Distributed Systems, 2010,21(10):1501-1514.
|
[14] |
张伟, 王汝传, 李鹏 . 基于云安全环境的蠕虫传播模型[J]. 通信学报, 2012,33(4):17-24. ZHANG W , WANG R C , LI P . Worm propagation modeling in cloud security[J]. Journal on Communications, 2012,33(4):17-24.
|
[15] |
JENNIFER T . Jackson and sadie creese,virus propagation in heterogeneous bluetooth networks with human behaviors[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(6): 930-943.
|
[16] |
刘烃, 郑庆华, 管晓宏 等. 基于随机实验的蠕虫传播预测研究[J]. 通信学报, 2007,28(12):72-77. LIU J , ZHENG Q H , GUAN X H , et al. Research of worm-propagation prediction based on stochastic experiment[J]. Journal on Communications, 2007,28(12):72-77.
|
[17] |
SARAH S , NESS B S , SAURABH B . Modeling and automated containment of worms[J]. IEEE Transactions on Dependable and Secure Computing, 2008,5(2): 528-537.
|
[18] |
ROSS S . Stochastic Processes[M]. John Wiley & Sons, 1996
|