Related references
Note: Only part of the references are listed.Locating Defense Positions for Thwarting the Propagation of Topological Worms
Sheng Wen et al.
IEEE COMMUNICATIONS LETTERS (2012)
On Modeling Product Advertisement in Large-Scale Online Social Networks
Yongkun Li et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2012)
The Microcosmic Model of Worm Propagation
Yini Wang et al.
COMPUTER JOURNAL (2011)
Eliminating Errors in Worm Propagation Models
Yini Wang et al.
IEEE COMMUNICATIONS LETTERS (2011)
Modeling and Detection of Camouflaging Worm
Wei Yu et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2011)
Network immunization and virus propagation in email networks: experimental evaluation and analysis
Chao Gao et al.
KNOWLEDGE AND INFORMATION SYSTEMS (2011)
Online social networks-Paradise of computer viruses
W. Fan et al.
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS (2011)
Modeling the propagation of Peer-to-Peer worms
Xiang Fan et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2010)
Defending against the propagation of active worms
Xiang Fan et al.
JOURNAL OF SUPERCOMPUTING (2010)
A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection
Jiankun Hu et al.
IEEE NETWORK (2009)
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)
Guanhua Yan et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2009)
A SURVEY OF INTERNET WORM DETECTION AND CONTAINMENT
Pele Li et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)
Modeling and automated containment of worms
Sarah H. Sellke et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2008)
Impact of non-Poissonian activity patterns on spreading processes
Alexei Vazquez et al.
PHYSICAL REVIEW LETTERS (2007)
Modeling and simulation study of the propagation and defense of internet e-mail worms
Cliff C. Zou et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2007)
Understanding localized-scanning worms
Zesheng Chen et al.
2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2 (2007)
Information survival threshold in sensor and P2P networks
Deepayan Chakrabarti et al.
INFOCOM 2007, VOLS 1-5 (2007)
Systematic topology analysis and generation using degree correlations
Priya Mahadevan et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2006)
On the performance of Internet worm scanning strategies
Cliff C. Zou et al.
PERFORMANCE EVALUATION (2006)
Spatial-temporal modeling of malware propagation in networks
ZS Chen et al.
IEEE TRANSACTIONS ON NEURAL NETWORKS (2005)
The spread of the witty worm
C Shannon et al.
IEEE SECURITY & PRIVACY (2004)
Epidemic incidence in correlated complex networks -: art. no. 035103
Y Moreno et al.
PHYSICAL REVIEW E (2003)
Measuring the size of the Internet via importance sampling
S Xing et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2003)
Scale-free topology of e-mail networks
H Ebel et al.
PHYSICAL REVIEW E (2002)
Epidemic outbreaks in complex heterogeneous networks
Y Moreno et al.
EUROPEAN PHYSICAL JOURNAL B (2002)
Epidemic spreading in scale-free networks
R Pastor-Satorras et al.
PHYSICAL REVIEW LETTERS (2001)