共 50 条
- [1] Defending against the propagation of active worms [J]. The Journal of Supercomputing, 2010, 51 : 167 - 200
- [2] Defending against the Propagation of Active Worms [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 350 - +
- [3] Defending against Instant Messaging Worms [J]. GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
- [4] Propagation of active worms: A Survey [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2009, 24 (03): : 157 - 172
- [5] Defending against Internet worms: A signature-based approach [J]. IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1384 - 1394
- [6] Characterizing and defending against divide-conquer-scanning worms [J]. COMPUTER NETWORKS, 2010, 54 (18) : 3210 - 3222
- [7] A feasibility study on defending against ultra-fast topological worms [J]. P2P: SEVENTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2007, : 61 - 68
- [10] Modeling and defending against adaptive bittorrent worms in peer-to-peer networks [J]. 1600, Association for Computing Machinery, 2 Penn Plaza, Suite 701, New York, NY 10121-0701, United States (09):