Author:
Mojahedi Elnaz,Azgomi Mohammad Abdollahi
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference20 articles.
1. Pele LI, Salour M, Su X (2008) A survey of internet worm detection and containment. IEEE Communications Surveys and Tutorials 10:20–35
2. Zhou L, et al (2005) A first look at peer-to-peer worms: Threats and defenses, In Peer-to-peer systems IV. Springer Berlin/Heidelberg, vol. 3640, pp. 24–35.
3. Xiao-song Z, Ting C, Jiong Z, Hua L (2010) Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks. Journal of Zhejiang University—Science C 11(2):119–129
4. Chen G, Gray R (2006) Simulating non-scanning worms on peer-to-peer networks, In: Proceedings of the 1st international conference on Scalable information systems (InfoScale ‘06), 2006
5. Feng C, Qin Z, Cuthbet L, Tokarchuk L (2008) Propagation model of active worms in P2P Networks, In: The 9th International Conference for Young Computer Scientists, pp. 1908–1912
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献