Author:
Karyotis Vasileios,Kakalis Anastasios,Papavassiliou Symeon
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference14 articles.
1. Peeters J, Dyson P. Cost-effective security. IEEE Security and Privacy Magazine, May-June 2007, 5(3): 85–87.
2. Pastor-Satorras R, Vespignani A. Epidemics and Immunization in Scale-Free Network. Handbook of Graphs and Networks: From the Genome to the Internet, Bornholdt S, Schuster H (eds.), Berlin: Wiley-VCH, 2002, pp.113–132.
3. Chen Z, Gao L, Kwiat K. Modeling the spread of active worms. In Proc. 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), Vol. III, San Francisco, CA, USA, March-April 2003, 1890–1900.
4. Zou C C, Gong W, Towsley D. Code red worm propagation modeling and analysis. In Proc. the 9th ACM Conference on Computer and Communications Security (CCS), Washington, DC, USA, November 2002, pp.138–147.
5. Zou C C, Gong W, Towsley D, Gao L. The monitoring and early detection of Internet worms. IEEE/ACM Trans. Networking, October 2005, 13(5): 961–974.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献