Author:
Liu Wanping,Liu Chao,Liu Xiaoyang,Cui Shaoguo,Huang Xianying
Subject
Applied Mathematics,Modeling and Simulation
Reference22 articles.
1. D. Alyias, et al., Microsoft Security Intelligence Report Volume 13 (January–June 2012), 2012. http://www.microsoft.com/en-us/download/details.aspx?id=44937.
2. Technological networks and the spread of computer viruses;Balthrop;Science,2004
3. Modeling and simulation study of the propagation and defense of Internet e-mail worms;Zou;IEEE Trans. Dependable Secur. Comput.,2007
4. Vigilante: end-to-end containment of Internet worm epidemics;Costa;ACM Trans. Comput. Syst.,2008
5. Complex networks: beyond enemy lines;Vespignani;Nat. Phys.,2005
Cited by
54 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献