Publisher
Springer International Publishing
Reference22 articles.
1. Haley, K., Johnson, N., Fulton, J.: Symantec internet security threat report 2015. Symantec Corporation, Technical report, April 2016
2. Egele, M., Scholte, T., Kirda, E., Kruegel, C.: A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. (CSUR) 44(2), 6–54 (2012)
3. Zou, C.C., Towsley, D., Gong, W.: On the performance of internet worm scanning strategies. Perform. Eval. 63(7), 700–723 (2006)
4. Yu, W., Wang, X., Calyam, P., Xuan, D., Zhao, W.: Modeling and detection of camouflaging worm. IEEE Trans. Dependable Secure Comput. 8(3), 377–390 (2011)
5. Yu, W., Zhang, N., Fu, X., Zhao, W.: Self-disciplinary worms and countermeasures: modeling and analysis. IEEE Trans. Parallel Distrib. Syst. 21(10), 1501–1514 (2010)