1. Chen Z., Gao L., Kwiat K.: Modeling the spread of active worms. In: Bauer, F. (eds) IEEE INFOCOM 2003: The Conference on Computer Communications: 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 3, pp. 1890–1900. IEEE Operations Center, New Jersey (2003)
2. Cisco technical notes: Dealing with mallocfail and high CPU utilization resulting from the “Code Red” worm. Cisco Systems, Inc. http://www.cisco.com/warp/public/63/ts_codered_worm.shtml
3. Cisco security advisory: “Code Red” worm—customer impact. Cisco Systems, Inc. http://www.cisco.com/warp/public/707/cisco-code-red-worm-pub.shtml
4. Kephart, J.O., White, S.R.: Measuring and modeling computer virus prevalence. In: Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 2–15. IEEE Computer Society Press, California (1993)
5. Kephart J.O., White S.R., Chess D.M.: Computers and epidemiology. IEEE Spectr 30(5), 20–26 (1993)