Author:
AL-Maksousy Hassan Hadi Latheeth,Weigle Michele C.
Publisher
Springer International Publishing
Reference26 articles.
1. Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. IEEE Secur. Priv. 1(4), 33–39 (2003)
2. Islam, A., Oppenheim, N., Thomas, W.: EternalBlue SMB protocol exploit (2017).
https://www.fireeye.com/blog/threatresearch/2017/05/smb-exploited-wannacry-useof-eternalblue.html
3. Mishra, B.K., Jha, N.: SEIQRS model for the transmission of malicious objects in computer network. Appl. Math. Model. 34(3), 710–715 (2010)
4. Mishra, B., Pandey, S.: Fuzzy epidemic model for the transmission of worms in computer network. Nonlinear Anal. R. World Appl. 11(5), 4335–4341 (2010)
5. Toutonji, O.A., Yoo, S.-M.: Stability analysis of VEISV propagation modeling for network worm attack. Appl. Math. Model. 36(6), 2751–2761 (2012)