共 21 条
- [1] Moore D., Paxson V., Savage S., Shannon C., Staniford S., Weaver N., Inside the slammer worm, IEEE Security and Privacy, 1, 4, pp. 33-39, (2003)
- [2] Shannon C., Moore D., The spread of the witty worm, IEEE Security and Privacy, 2, 4, pp. 46-50, (2004)
- [3] Wen W.P., Qing S.H., Jiang J.C., Wang Y.J., Research and development of Internet worms, Journal of Software, 15, 8, pp. 1208-1219, (2004)
- [4] Zou C.C., Gong W.B., Towsley D., Code red worm propagation modeling and analysis, Proc. of the 9th ACM Symp. on Computer and Communication Security (CCS 2002), pp. 138-147, (2002)
- [5] Chen Z., Gao L., Kwiat K., Modeling the spread of active worms, Proc. of the IEEE INFOCOM 2003, pp. 1890-1900, (2003)
- [6] Riley G.F., Sharif M.I., Lee W., Simulating Internet worms, Proc. of the 12th IEEE/ACM Int'l Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2004), pp. 268-274, (2004)
- [7] Wang Y.W., Liu P., Jing J.W., Jia X.Q., A multi-level fidelity-preserving bandwidth-limited worm simulation model and its application, Proc. of the 41st IEEE Annual Simulation Symp. (ANSS 2008), pp. 308-318, (2008)
- [8] The Georgia tech network simulator (GTNetS)
- [9] Liu B., Figueiredo D.R., Guo Y., Kurose J., Towsley D., A study of networks simulation efficiency: Fluid simulation vs. packet-level simulation, Proc. of the IEEE INFOCOM 2001, pp. 1244-1253, (2001)
- [10] Kesidis G., Hamadeh I., Jin Y.M., Jiwasurat S., Vojnovic M., A model of the spread of randomly scanning Internet worms that saturate access links, ACM Trans. on Modeling and Computer Simulation (TOMACS), 18, 2, (2008)