메뉴 건너뛰기




Volumn , Issue , 2002, Pages 11-17

Predators: Good will mobile codes combat against computer viruses

Author keywords

Computer virus; Lotka Volterra equation; Mathematical biology; Worms

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; CODES (SYMBOLS); COMPUTER SOFTWARE; COMPUTER WORMS; INTEGRAL EQUATIONS; MATHEMATICAL MODELS; SERVERS;

EID: 0242456135     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (35)

References (17)
  • 1
    • 0242697219 scopus 로고    scopus 로고
    • Network Associates. McAfee
    • Network Associates. McAfee. http://www.nai.com/japan/.
  • 2
    • 0042035473 scopus 로고    scopus 로고
    • CAIDA analysis of code-red
    • CAIDA
    • CAIDA. CAIDA analysis of code-red. http://www.caida/org/analysis/security/code-red/.
  • 3
    • 0042536297 scopus 로고    scopus 로고
    • CERTR advisory CA-2001-26 nimda worm
    • CERT/CC; September
    • CERT/CC. CERTR advisory CA-2001-26 nimda worm, September 2001.
    • (2001)
  • 7
    • 0025475949 scopus 로고
    • The ipm model of computer virus management
    • S. Jones and C. White. The ipm model of computer virus management. Computers and Security, 9(5):411-418., 1990.
    • (1990) Computers and Security , vol.9 , Issue.5 , pp. 411-418
    • Jones, S.1    White, C.2
  • 8
    • 4243480214 scopus 로고    scopus 로고
    • On the use of intrusion technologies to distribute non-malicious programs to vulnerable computers
    • Technical report, University of Aizu
    • Atsuhi Kara. On the use of intrusion technologies to distribute non-malicious programs to vulnerable computers. Technical report, University of Aizu, 2001.
    • (2001)
    • Kara, A.1
  • 10
    • 4243915306 scopus 로고    scopus 로고
    • New worms seek and destroy code red
    • Sep
    • Brian Williams. New worms seek and destroy code red. http://www.commoncriteria.org/news/newsarchive/Sept01/sept02.htm, Sep 2001.
    • (2001)
    • Williams, B.1
  • 11
    • 0035474501 scopus 로고    scopus 로고
    • Code red for the web
    • October
    • Carolyn Meinel. Code red for the web. Scientific American, pages 36-43, October 2001.
    • (2001) Scientific American , pp. 36-43
    • Meinel, C.1
  • 12
    • 0003585999 scopus 로고    scopus 로고
    • The spread of the code-red worm (CRv2)
    • July
    • David Moore. The spread of the code-red worm (CRv2), July 2001.
    • (2001)
    • Moore, D.1
  • 13
    • 25344464511 scopus 로고    scopus 로고
    • Code red wor stats.
    • Security.NL.
    • Security.NL. Code red wor stats. http://www.security.nl/misc/codered-stats/, 2001.
    • (2001)
  • 15
    • 16244379346 scopus 로고    scopus 로고
    • Analysis of spread of July infestation of the code red worm
    • Stuart Staniford. Analysis of spread of july infestation of the code red worm. http://www.silicondefense.com/cr/.
    • Staniford, S.1
  • 16
    • 0242697226 scopus 로고    scopus 로고
    • Symantec
    • Symantec. http://www.symantec.co.jp/
  • 17
    • 0032260307 scopus 로고    scopus 로고
    • A framework for modelling Trojans and computer virus infection
    • Harold Thimbleby, Stuart Anderson, and Paul Cairns. A framework for modelling Trojans and computer virus infection. The Computer Journal, 41(7):445-458, 1998.
    • (1998) The Computer Journal , vol.41 , Issue.7 , pp. 445-458
    • Thimbleby, H.1    Anderson, S.2    Cairns, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.