[1] Chen G,Gray R S.Simulating non-scanning worms on peer-to-peer networks[A].P roceedings of the 1st International Conference on Scalable Information Systems[C].Hong Kong:ACM,2006.29-41.
[2] Staniford S,Paxson V,Weaver N.How to own the internet in your spare time[A].Pr oceedings of the 11th USENIX Security Symposium[C].San Francisco:ACM,2002.149-167.
[3] Zou C C,Gong W,Towsley D.Code red worm propagation modeling and analysis[A].Pr oceedings of ACM Conference on Computer and Communication Security(CCS'02)[C].Washington:ACM,2002.138-147.
[4] Zou C C,Towsley D,Gong W.Email worm modeling and defense[A].Proceedings of the 13th International Conference on Computer Communications and Networks[C].Chig aco IL:IEEE,2004.409-414.
[5] Thommes R W,Coates M J.Modeling Virus Propagation in Peer-to-Peer Networks[R].Montreal,Canada:Department of Electrical and Computer Engineering,McGill Univ ersity,2005.
[6] 夏春和,石昀平,李肖坚.结构化对等网中的P2P蠕虫传播模型研究[J].计算机学报,2006,29(7):952-959. Xia Chun-he,Shi Yun-ping,Li Xiao-jian.Research on epidemic models of P2P worms in structured peer-to-peer networks[J].Chinese Journal of Computers,2006,29(7):952-959.(in Chinese)
[7] Li T,Guan Z,Wu X.Modeling and analyzing the spread of active worms based on P2P systems[J].Computer & Security,2007,26(3):213-218.
[8] Yu W,Chellappan S,Wan X,et al.Peer-to-peer system-based active worm attacks:M odeling,analysis and defense[J].Computer Communications,2008,31(17):4005-4017.
[9] 王方伟,张运凯,马剑峰.无结构P2P网络中被动型蠕虫传播建模和防治[J].天津大学学报, 2008,14(1):66-72. Wang Fang-wei,Zhang Yun-kai,Ma Jian-feng.Modeling and defending passive worms over unstructured peer-to-peer networks[J].Transaction of Tianjin Universit y,2008,14(1):66-72.(in Chinese)
[10] 王跃武,荆继武,向继,等.Contagion蠕虫传播仿真分析[J].计算机研究与发展,2008,45(2):207-216. Wang Yue-wu,Jing Ji-wu,Xiang Ji,et al.Contagion worm propagation simulation and analysis[J].Journal of Computer Research and Development,2008,45(2):207-216. (in Chinese)
[11] 王跃武,荆继武,向继,等.拓扑相关蠕虫仿真分析[J].软件学报,2008,19(6):1508-1518. Wang Yue-wu,Jing Ji-wu,Xiang Ji,et al.Topology aware worm simulation and analy sis[J].Journal of Software,2008,19(6):1508-1518.(in Chinese)
[12] Toutonji O,Yoo S.Passive Benign worm propagation modeling with dynamic quarantine defense[J].KSⅡ Transactions On Internet and Information Systems,2009,3(1):96-107.
[13] Yang W,Chang G,Yang Y,et al.Stability analysis of P2P Worm propagation model wit hdynamic quarantine defense[J].Journal of Networks,2011,6(1):152-162.
[14] Mojahedi E,Abdollahi Azgomi M.Modeling the propagation of topology-aware P2P wo rms considering temporal parameters[J].Peer-to-Peer Networking and Applications,2015,8(1):171-180.
[15] Chen T,Zhang X,Li H,et al.Propagation modeling of active P2P worms based on tern ary matrix[J].Journal of Network and Computer Applications,2013,36(5):1387-1394.
[16] Jafarabadi A,Abdollahi Azgomi M.A stochastic epidemiological model for the propa gation of active worms considering the dynamicity of network topology[J].Peer -to-Peer Networking and Applications,2015,8(6):1008-1022.
[17] Chen T,Zhang X,Wu Y.FPM:Four-factors propagation model for passive P2P worms[J].Future Generation Computer Systems,2014,36(7):133-141.
[18] Yang W,Gao Y,Zhu Z,et al.Modelling,analysis and containment of passive worms in P2P networks[J].International Journal of Internet Protocol Technology,2014,8(2-3):130-142.
[19] Feng C,Yang J,Qin Z,et al.Modeling and analysis of passive worm propagation in the P2P file-sharing network[J].Simulation Modelling Practice and Theory,2015, 51(2):87-99.
[20] Diekmann O,Heesterbeek J A P.Mathematical Epidemiology of Infectious Diseases:Mo del Builind,Analysis and Interpretation[M].Wiley,1999.
[21] Driessche P,Watmough J.Reproduction numbers and sub-threshold endemic equilibri a for compartmental models of disease transmission[J].Mathematical Biosciences,2002,180:29-48.
[22] Arnio J,Davis J,Hartley D,et al.A multi-species epidemic model with spatial dyn amics[J].Mathematical Medicine and Biology,2005,22(2):129-142. |