[1] iResearch.iResearch China Instant Messaging Research Report[EB/OL].http://www.2chinable.com/china-internet-market-free-reptort-download/cat_view/45-china-social-media- market-free-reports,2010.[2] hugo.腾点:腾讯2011年同时在线用户达1.5,注册用户达7亿[EB/OL].http://www.tendow.com/?p=2653,2011.11.17.[3] 中国互联网络信息中心.中国互联网络发展状况统计报告[EB/OL].http://www.cnnic.cn/research/bgxz/tjbg/201201/P020120118512855484817.pdf,2013.[4] Smith R D.Instant Messaging as a Scale-Free Network[EB/OL].http://arxiv.org/abs/cond-mat/0206378,2002.[5] P Holme,B J Kim.Growing scale-free networks with tunable clustering[J].Physical Review E,2002,65(2):026107.[6] Ryan Naraine.Researchers Say Automated IM Worm Is Inevitable[EB/OL].http://www.eweek.com/c/a/Security/Researchers-Say-Automated-IM-Worm-Is-Inevitable/,2005.[7] McAfee.W32/Hello.worm[EB/OL].http://www.mcafee.com/threat-intelligence/malware/default.aspx? id=99077,2003. [8] Rising.爱情森林病毒[EB/OL].http://it.rising.com.cn/newSite/Channels/Anti_Virus/Antivirus_Base/TopicDatabase Package/27-155400316.htm,2002.[9] Yu WU,Yanrong YANG,Huanzheng WU,Gongxiao WANG.Modeling and simulation on information propagation on instant messaging network based on two-layer scale-free networks with tunable clustering[A].Proceedings of the 2009 IEEE International Conference on Systems,Man,and Cybernetics[C].San Antonio,TX:IEEE Press,2009.5184-5188.[10] 姚文斌,杨松涛.复杂网络中即时通信蠕虫病毒传播的研究[J].计算机工程与应用,2009,45(18):129-131. YAO Wen-bin,YANG Song-tao.Study of instant messaging worms spreading on complex network[J].Computer Engineering and Applications,2009,45(18):129-131.(in Chinese)[11] 冯朝胜,邓婕,秦志光,刘霞,劳伦斯·库珀特.即时通信蠕虫传播建模[J].计算机工程,2010,36(5):143-145. FENG Chao-sheng,DENG Jie,QIN Zhi-guang,LIU Xia,Laurence Cuthbert4.Modeling of instant message worms propagation[J].Computer Engineering,2010,36(5):143-145.(in Chinese)[12] Williamson M W.Throttling viruses:Restricting propagation to defeat malicious mobile code[A].Proceedings of Computer Security Applications Conference[C].Las Vegas,Nevada:IEEE Press,2002.61-68.[13] Williamson M W,Parry A,Byde A.Virus throttling for instant messaging[A].Proceedings of Virus Bulletin Conference[C].Chicago,USA:Virus Bulletin Limited,2004.1-10.[14] Mannan M,Oorschot P C.On instant messaging worms,analysis and countermeasures[A].Proceedings of ACM CCS Workshop on Rapid Malcode[C].Fairfax,Virginia,USA:ACM Press,2005.2-11.[15] 赵彬彬,张玉清,刘宇.IM 蠕虫检测方案的设计与实现[J].计算机工程,2009,35(21):147-150. ZHAO Bin-bin,ZHANG Yu-qing,LIU Yu.Design and implementation of IM worm detection method[J].Computer Engineering,2009,35(21):147-150.(in Chinese)[16] 张静,胡华平,刘波.基于行为分析的IM蠕虫检测方法[J].通信学报,2007,28(8A):154-157. Zhang Jing,Hu Huaping,Liu Bo.Behavior analysis based IM worm detecting[J].Journal on Communication,2007,28(8A):154-157.(in Chinese)[17] 百度百科.云安全[EB/OL].http://baike.baidu.com/view/1725454.htm,2011.[18] Katharine Gammon.Networking:Four Ways to Reinvent the Internet[OL].http://www.nature.com/news/2010/100203/full/463602a.html,2010.[19] 张琳,王汝传,张永平.一种基于模糊集合的可用于网格环境的信任评估模型[J].电子学报,2008,36(5):862-868. ZHANG Lin,WANG Ru-chuan,ZHANG Yong-ping.A trust evaluation model based on fuzzy set for grid environment[J].Acta Electronica Sinica,2008,36(5):862-868.(in Chinese) [20] 陈超,王汝传,张琳.一种基于开放式网络环境的模糊主观信任模型研究[J].电子学报,2010,38(11):2505-2509. CHEN Chao,WANG Ru-chuan,ZHANG Lin.The research of subjective trust model based on fuzzy theory in open networks[J].Acta Electronica Sinica,2010,38(11):2505-2509.(in Chinese)[21] 贾春福,刘昕,刘国友,胡志超,王冬.一种基于社会信任的恶意网页协防机制[J].通信学报,2012,33(10):110-116. JIA Chun-fu,LIU Xin,LIU Guo-you,HU Zhi-chao,WANG Dong.A collaborative defending scheme against malicious Web pages based on social trust[J].Journal on Communications,2012,33(10):110-116.(in Chinese)[22] 卿斯汉,王超,何建波,李大治.即时通信蠕虫研究与发展[J].软件学报,2006,17(10):2118-2130. Qing SH,Wang C,He JB,Li DZ.Research and development of instant messaging worms[J].Journal of Software,2006,17(10):2118-2130.(in Chinese)[23] iResearch.2009 China IM Communication Security Study Report[EB/OL].http://www.2chinable.com/china-internet-market-free-reptort-download/cat_view/45-china-social-me dia-market-free-reports,2010.[24] GOLBECK J.Computing and Applying Trust in Web-Based Social Networks[D].Maryland:University of Maryland,College Park,2005.[25] Jia Chunfu,Liu Xin,Liu Guoyou,et al.Worm containment based on double-neighbor lists in P2P overlay networks[A].Proceedings of 2010 IEEE International Conference on Information Theory and Information Security (ICITIS 2010)[C].Beijing: IEEE Press,2010.558-562. |