| 1 |
E. Aben, “Conficker/Conflicker/Downadup as seen from the UCSD Network Telescope,” http://www.caida.org/research/security/ms08-06 7/conficker.xml, 2009. |
미소장 |
| 2 |
Phillip Porras, Hassen Saıdi, and Vinod Yegneswaran, “A Foray into Conficker’s Logic and Rendezvous Points,” USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET), 2009 |
미소장 |
| 3 |
Kephart J O, White S R, “Directed-graph Epidemiological Models of Computer Viruses,” Proc. of the IEEE Computer Society Symposium on Research in Security and Privacy. Oakland, California, USA: IEEE Computer Society Press, 1991: 343-359. |
미소장 |
| 4 |
Stuart Staniford, Vern Paxson, Nicholas Weaver, “How to Own the internet in your spare time,” USENIX security, 2002 |
미소장 |
| 5 |
Epidemiological Models Applied to Viruses in Computer Networks  |
미소장 |
| 6 |
Dagon D, Zou CC, Lee W., “Modeling botnet propagation using time zones,” In: Proc. Of the 13thAnnualNetworkandDistributedSystemSecur itySymp.(NDSS2006).2006. |
미소장 |
| 7 |
ChangRui Guo, ShaoHong Cai, HaiPing Zhou, DaMin Zhang, “Susceptible-Infected-Susceptible Virus Spread Model in 2-Dimension Regular Network under Local Area Control,” International Conference on Networking and Digital Society, 2009. |
미소장 |
| 8 |
Chen Junhua, Wei Shengjun, Peng Wu,“General Worm Propagation Model forWireless Ad Hoc Networks,” InternationalConference on Computer Science andInformation Technology, 2009. |
미소장 |
| 9 |
Ben-hua Guo, Shao-hong Cai, “THE SIS-BD MODEL OF COMPUTER VIRUS SPREADING ON INTERNET,” Wireless Communications, Networking and Mobile Computing, 2007. |
미소장 |
| 10 |
Ming Liu, Lansheng Han*, Fan Hong, Mengsong Zou, “A Computer Virus Propagation Model in P2P Networks,” International Workshop on Education Technology and Computer Science, 2009. |
미소장 |
| 11 |
Narisa Zhao, Xianfeng Zhang, “The Worm Propagation Model and Control Strategy Based on Distributed Honeynet,” International Conference on Computer Science and Software Engineering, 2008. |
미소장 |
| 12 |
Jose R.C. Piqueira, Adolfo A. de Vasconcelos, Carlos E.C.J. Gabriel, Vanessa O. Araujo, “Dynamical models for computer viruses,” Computers & Security, 2008. |
미소장 |
| 13 |
Jose Roberto C. Piqueira, Vanessa O. Araujo, “A modified epidemiological model for computer viruses,” Applied Mathematics and Computation, 2009. |
미소장 |
| 14 |
Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi, “Modeling and Automated Containment of Worms,” Transactions on Dependable and Secure Computing, 2008. |
미소장 |
| 15 |
Virus Spread in Networks  |
미소장 |
| 16 |
Dynamical Models for Computer Viruses Propagation  |
미소장 |
| 17 |
Marc Lelarge, Jean Bolot, “A Local Mean Field Analysis of Security Investments in Networks,” Proceedings of the 3rd international workshop on Economics of networked systems, 2008. |
미소장 |
| 18 |
Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan and Antonio Nucci, “A Social Network Based Patching Scheme for Worm Containment in Cellular Networks,” INFOCOM, 2009. |
미소장 |