Author:
Jafarabadi Ahmad,Azgomi Mohammad Abdollahi
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference32 articles.
1. Fan X, Xiang Y (2010) Modeling the propagation of peer-to-peer worms. Futur Gener Comput Syst 26(8):1433–1443
2. Xiang Y, Fan X, Zhu WT (2009) Propagation of active worms: a survey. Int J Comput Syst Sci Eng 24(3):157–172
3. Yu W (2004) Analyze the worm-based attack in large scale P2P. In Proceedings of the Eighth IEEE International Symposium on High Assurance Systems Engineering, College Station, TX, pp. 308–309
4. Anderson RM, May RM, Anderson B (1992) Infectious diseases of humans: dynamics and control. Oxford Science, New York
5. Hatahet S, Bouabdallah A, Challal Y (2010) A new worm propagation threat in BitTorrent: modeling and analysis. Telecommun Syst 45(2–3):95–109
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献