메뉴 건너뛰기




Volumn 26, Issue 3, 2007, Pages 213-218

Modeling and analyzing the spread of active worms based on P2P systems

Author keywords

Active worms; Modeling; P2P systems; Security

Indexed keywords

COMPUTER SIMULATION; COMPUTER WORMS; INTERNET; SECURITY OF DATA;

EID: 34248394369     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2006.10.003     Document Type: Article
Times cited : (12)

References (6)
  • 2
    • 34248330676 scopus 로고    scopus 로고
    • Code Red II Worm. Incident Analysis, SecurityFocus
    • Russell R., and Machie A. Code Red II Worm. Incident Analysis, SecurityFocus. Technical Report. (August 2001)
    • (2001) Technical Report.
    • Russell, R.1    Machie, A.2
  • 3
    • 85084162258 scopus 로고    scopus 로고
    • Staniford S, Paxson V, Weaver N. How to own the Internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium (Security'02); 2002.
  • 4
    • 34248329862 scopus 로고    scopus 로고
    • Slyck news, .
  • 6
    • 85163670488 scopus 로고    scopus 로고
    • Zeitoun A, Jamin S. Rapid exploration of Internet live address space using optimal discovery path. In: Proceedings of IEEE GLOBECOM (Next Generation Networks and Internet), San Francisco, CA; December 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.