[1]
Sboch,John F, Jon A. Hupp. The wrom programs early experiencc with a distdbuted computation,communications of the ACM,1982,25(3),pp.172-180.
Google Scholar
[2]
Tanachaiwiwat S,Helmy A. Modeling and analysis of worm interactions(war of the worms)[C]/Fourth InternationalConference on Broadband Communications,Networks and Systems(BROADNETS'07). Raleigh,NC,USA:IEEE Press,2007:649-658.
DOI: 10.1109/broadnets.2007.4550495
Google Scholar
[3]
Castaneda F,Sezer E C,Xu J. WORM vs. WORM:preliminary study of an active counter-attack mechanism[C]/Proceedings of the 2004 ACM Workshop on Rapid Malcode(WORM'04). Washington DC,USA:ACM Press,2004:83-93.
DOI: 10.1145/1029618.1029631
Google Scholar
[4]
Tamimi Z M, Khan J I. Modeling and analysis of worm attacks with predator and patching interply[C]/Proceedings of the international conference of communications, internet and information. Virgin Islands: IEEE press 2006: 533-809.
Google Scholar
[5]
Tamimi Z M,Khan J I. Model-based analysis of two fighting worms[C]/IEEE/IIU Proceedings of International Conference on Computer & Communication Engineering(ICCCE'06). Kuala Lumpur,Malaysia:IEEE Press,2006:157-163.
Google Scholar
[6]
Tanachaiwiwat S,Helmy A. Computer worm ecology in encounter-based networks[C]/Fourth International Conference on Broadband Communications,Networks and Systems (BROADNETS'07). Raleigh,NC,USA:IEEE Press,2007:535-543.
DOI: 10.1109/broadnets.2007.4550479
Google Scholar
[7]
Tanachaiwiwat S,Helmy A. Encounter-based worms:analysis and defense[J]. Ad Hoc Networks,2009,7(7):1414-1430.
DOI: 10.1016/j.adhoc.2009.02.004
Google Scholar
[8]
Van den Driessche P,Watmough J. Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission[J]. Mathematical Biosciences,2002,180 (1): 29-48.
DOI: 10.1016/s0025-5564(02)00108-6
Google Scholar
[9]
Robinson R C. An introduction to dynamical system:continuousand discrete[M]. USA:Prentice Hall,(2004).
Google Scholar
[10]
Bailey M,Cooke E,Jahanian F et al. The blaster worm:then and now[J]. IEEE Security & Privacy,2005,3(4):26-31.
DOI: 10.1109/msp.2005.106
Google Scholar