-
1
-
-
85121085959
-
-
[1] K. Nassima C. Yannick A. Nazim 2006 The emerging threat of peer-to-peer worms [C] IEEE / IST Workshop on Monitoring, Attack Detection and Mitigation IEEE Press Tuebingen, Germany 18 20 Nassima K, Yannick C, Nazim A. The emerging threat of peer-to-peer worms [C]. In: IEEE / IST Workshop on Monitoring, Attack Detection and Mitigation. IEEE Press, Tuebingen, Germany, 2006. 18–20.
-
-
-
-
2
-
-
85121077152
-
-
[2] W. Yu B. Corey C. Sriram 2005 Peer-to-peer system-based active worm attacks: Modeling and analysis [C] Proceedings of IEEE International Conference on Communications IEEE Press Seoul, Korea 295 299 Yu W, Corey B, Sriram C et al. Peer-to-peer system-based active worm attacks: Modeling and analysis [C]. In: Proceedings of IEEE International Conference on Communications. IEEE Press, Seoul, Korea, 2005. 295–299.
-
-
-
-
3
-
-
85121066031
-
-
[3] C. Zesheng G. Lixin K. Kwiat 2003 Modeling the spread of active worms[C] Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies IEEE Press Francisco, USA 1890 1900 Zesheng C, Lixin G, Kwiat K. Modeling the spread of active worms[C]. In: Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE Press, Francisco, USA, 2003. 1890–1900.
-
-
-
-
4
-
-
85121084859
-
-
[4] L. Zhou L. Zhang F. Mcsherry 2005 A first look at peerto-peer worms: Threats and defenses [C] Proceedings of the 4th International Workshop on Peer-to-Peer Systems ACM Press Ithaca, NY 24 35 Zhou L, Zhang L, Mcsherry F et al. A first look at peerto-peer worms: Threats and defenses [C]. In: Proceedings of the 4th International Workshop on Peer-to-Peer Systems. ACM Press, Ithaca, NY, 2005. 24–35.
-
-
-
-
5
-
-
85121061846
-
-
[5] C. Guanling S. G. Robert 2006 Simulating non-scanning worms on peer-to-peer networks [C] Proceedings of the 1st International Conference on Scalable Information Systems ACM Press Hong Kong, China 29 42 Guanling C, Robert S G. Simulating non-scanning worms on peer-to-peer networks [C]. In: Proceedings of the 1st International Conference on Scalable Information Systems. ACM Press, Hong Kong, China, 2006. 29–42.
-
-
-
-
6
-
-
85121088894
-
-
[6] R. Thommes M. Coates 2006 Epidemiological modeling of peer-to-peer viruses and pollution[C] The 25th Annual IEEE Conference on Computer Communications IEEE Press Barcelona, Spain 15 26 Thommes R, Coates M. Epidemiological modeling of peer-to-peer viruses and pollution[C]. In: The 25th Annual IEEE Conference on Computer Communications. IEEE Press, Barcelona, Spain, 2006. 15–26.
-
-
-
-
7
-
-
85121085789
-
-
[7] R. Krishna S. Biplab 2006 Modeling malware propagation in Gnutella type peer-to-peer networks [C] Proceedings of the Third International Workshop on Hot Topics in Peerto-Peer Systems (Hot-P2P) ACM Press Rhodes Island, Greece 8 15 Krishna R, Biplab S. Modeling malware propagation in Gnutella type peer-to-peer networks [C]. In: Proceedings of the Third International Workshop on Hot Topics in Peerto-Peer Systems (Hot-P2P). ACM Press, Rhodes Island, Greece, 2006. 8–15.
-
-
-
-
8
-
-
85121071941
-
-
[8] W. T. Richard J. C. Mark 2005 Modeling virus propagation in peer-to-peer networks [C] IEEE International Conference on Information, Communications & Signal Processing IEEE Press Bangkok, Thailand 981 985 Richard W T, Mark J C. Modeling virus propagation in peer-to-peer networks [C]. In: IEEE International Conference on Information, Communications & Signal Processing. IEEE Press, Bangkok, Thailand, 2005. 981–985.
-
-
-
-
9
-
-
85121063180
-
-
[9] S. Shakkottai R. Srikant 2006 Peer to peer networks for defense against Internet worms [C] Proceedings from the 2006 Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer & Communications Systems (INTERPERF’06) ACM Press Pisa, Italy 34 44 Shakkottai S, Srikant R. Peer to peer networks for defense against Internet worms [C]. In: Proceedings from the 2006 Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer & Communications Systems (INTERPERF’06). ACM Press, Pisa, Italy, 2006. 34–44.
-
-
-
-
10
-
-
85121065902
-
-
[10] K. Andrew A. Abhinav G. Minaxi 2006 A study of malware in peer-to-peer networks [C] Proceedings of the 6th ACM SIGCOMM on Internet Measurement ACM Press Janeriro, Brazil 327 332 Andrew K, Abhinav A, Minaxi G. A study of malware in peer-to-peer networks [C]. In: Proceedings of the 6th ACM SIGCOMM on Internet Measurement. ACM Press, Janeriro, Brazil, 2006. 327–332.
-
-
-
-
11
-
-
85121080906
-
-
[11] Jacky C, Kevin L, Brian N L. Availability and popularity measurements of peer-to-peer file systems [EB/OL]. http://signl.cs.umass.edu/pubs/, 2007-05-16.
-
-
-
-
12
-
-
85121080998
-
-
[12] S. Stefan P. G. Krishna D. G. Steven 2002 A measurement study of peer-to-peer files sharing systems [C] Proceedings of Multimedia Computing and Networking 2002 (MMCN ’02) ACM Press San Jose, CA 361 382 Stefan Saroiu, Krishna P G, Steven D G. A measurement study of peer-to-peer files sharing systems [C]. In: Proceedings of Multimedia Computing and Networking 2002 (MMCN ’02). ACM Press, San Jose, CA, 2002. 361–382.
-
-
-
-
13
-
-
85121076647
-
-
[13] P. G. Krishna J. D. Richard S. Stefan 2003 Measurement, modeling, and analysis of a peer-to-peer file-sharing workload [C] Proceedings of the 19th ACM Symposium on Operating System Principles (SOSP 2003) Bolton Landing, NY ACM Press 314 329 Krishna P G, Richard J D, Stefan Saroiu et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload [C]. In: Proceedings of the 19th ACM Symposium on Operating System Principles (SOSP 2003). ACM Press, Bolton Landing, NY, 2003. 314–329.
-
-
-
-
14
-
-
85121070855
-
-
[14] M. W. Matthew 2002 Throttling viruses: Restricting propagation to defeat malicious mobile code [C] Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC) IEEE Press Nevada, USA 61 68 Matthew M W. Throttling viruses: Restricting propagation to defeat malicious mobile code [C]. In: Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC). IEEE Press, Nevada, USA, 2002. 61–68.
-
-
-
-
15
-
-
0035420732
-
Random graphs with arbitrary degree distribution and their applications [J]
-
[15] M. E. J. Newman S. H. Strogatz D. J. Watts 2001 Random graphs with arbitrary degree distribution and their applications [J] Physical Review E 64 2 1 18 Newman M E J, Strogatz S H, Watts D J. Random graphs with arbitrary degree distribution and their applications [J]. Physical Review E, 2001, 64(2): 1–18.
-
(2001)
Physical Review E
, vol.64
, Issue.2
, pp. 1-18
-
-
Newman, M.E.J.1
Strogatz, S.H.2
Watts, D.J.3
-
16
-
-
85121075536
-
-
[16] D. Stutzbach R. Rejaie S. Sen 2005 Characterizing unstructured overlay topologies in modern P2P file-sharing systems [C] Proceedings of the Fifth ACM Internet Measurement Conference ACM Press Berkeley, CA 49 62 Stutzbach D, Rejaie R, Sen S. Characterizing unstructured overlay topologies in modern P2P file-sharing systems [C]. In: Proceedings of the Fifth ACM Internet Measurement Conference. ACM Press, Berkeley, CA, 2005. 49–62.
-
-
-
-
17
-
-
41349104828
-
Growing scale-free networks with tunable clustering [J]
-
[17] P. Holme B. J. Kim 2002 Growing scale-free networks with tunable clustering [J] Physical Review E (Statistical Nonlinear, and Soft Matter Physics) 65 2 1 4 Holme P, Kim B J. Growing scale-free networks with tunable clustering [J]. Physical Review E (Statistical Nonlinear, and Soft Matter Physics), 2002, 65(2): 1–4.
-
(2002)
Physical Review E (Statistical Nonlinear, and Soft Matter Physics)
, vol.65
, Issue.2
, pp. 1-4
-
-
Holme, P.1
Kim, B.J.2
-
18
-
-
0038483826
-
Emergence of scaling in random networks [J]
-
[18] A. L. Barabasi R. Albert 1999 Emergence of scaling in random networks [J] Science 286 5439 509 512 10.1126/science.286.5439.509 2091634 Barabasi A L, Albert R. Emergence of scaling in random networks [J]. Science, 1999, 286(5439): 509–512.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabasi, A.L.1
Albert, R.2
|