[1]
D. Seeley, A tour of the worm, in: Proc. USENIX Technical, 1989, p.287–304.
Google Scholar
[2]
S. Qing, W. Wen, A survey and trends on Internet worms, Computers & Security vol. 24(4), 2005, pp.334-346.
DOI: 10.1016/j.cose.2004.10.001
Google Scholar
[3]
C.C. Zou, W. Gong, D. Towsley, Code Red worm propagation modeling and analysis, in: Proc. of the 9th ACM Conference on Computer and Communications Security (CCS 02), (2002).
DOI: 10.1145/586110.586130
Google Scholar
[4]
C.C. Zou, D. Towsley, W. Gong, On the performance of Internet worm scanning strategies, Journal of Performance Evaluation vol. 63(7), 2006, pp.700-723.
DOI: 10.1016/j.peva.2005.07.032
Google Scholar
[5]
C.C. Zou, W. Gong, D. Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, in: Proc. ACM workshop on rapid malcode (WORM 03), Washington, 2003, pp.51-60.
DOI: 10.1145/948187.948197
Google Scholar
[6]
S. Staniford, Containment of scanning worm in an enterprise networks, Journal of Computer Security, (2004).
Google Scholar
[7]
D.M. Nicol, The impact of stochastic variance on worm propagation and detection, in: Proc. of the 4th ACM workshop on recurring malcode (WORM 06), 2006, pp.57-64.
DOI: 10.1145/1179542.1179555
Google Scholar
[8]
J.R.C. Piqueira, A.A. Vasconcelos, C.E.C.J. Gabriel, V.O. Araujo, Dynamic models for computer viruses, Journal Computers & Security vol. 27(7-8), 2008, pp.355-359.
DOI: 10.1016/j.cose.2008.07.006
Google Scholar
[9]
C. Frank, C.S. Emre, X. Jun, WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism, in: Proc. ACM CCS Workshop on Rapid Malcode (WORM 04), Washington, USA, 2004, pp.1205-1212.
DOI: 10.1145/1029618.1029631
Google Scholar