메뉴 건너뛰기




Volumn 67, Issue 6, 2010, Pages 485-499

Performance analysis of email systems under three types of attacks

Author keywords

Email attack; Information leakage probability; Network security; Performance analysis; Queueing system

Indexed keywords

EMAIL ATTACK; INFORMATION LEAKAGE; INFORMATION LEAKAGE PROBABILITY; PERFORMANCE ANALYSIS; QUEUEING SYSTEM;

EID: 77950859128     PISSN: 01665316     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.peva.2010.01.003     Document Type: Article
Times cited : (19)

References (17)
  • 3
    • 14944372409 scopus 로고    scopus 로고
    • Attachment chain tracing scheme for email virus detection and control
    • ACT:, New York, NY, USA
    • J. Xiong, ACT: Attachment chain tracing scheme for email virus detection and control, in: Proceedings of the 2004 ACM workshop on Rapid malcode, New York, NY, USA, 2004.
    • (2004) Proceedings of the 2004 ACM workshop on Rapid malcode
    • Xiong, J.1
  • 9
    • 33947496984 scopus 로고    scopus 로고
    • Short term and total life impact analysis of email worms in computer systems
    • Park I., Sharman R., Rao H.R., and Upadhyaya S. Short term and total life impact analysis of email worms in computer systems. Decision Support Systems 43 3 (2007) 827-841
    • (2007) Decision Support Systems , vol.43 , Issue.3 , pp. 827-841
    • Park, I.1    Sharman, R.2    Rao, H.R.3    Upadhyaya, S.4
  • 13
    • 4944261900 scopus 로고    scopus 로고
    • Two types of R G-factorizations of quasi-birth-and-death processes and their applications to stochastic integral functionals
    • Li Q.L., and Cao J. Two types of R G-factorizations of quasi-birth-and-death processes and their applications to stochastic integral functionals. Stochastic Models 20 3 (2004) 299-340
    • (2004) Stochastic Models , vol.20 , Issue.3 , pp. 299-340
    • Li, Q.L.1    Cao, J.2
  • 15
    • 34250338058 scopus 로고    scopus 로고
    • A queueing analysis for the denial of service (DoS) attacks in computer networks
    • Wang Y., Lin C., Li Q.L., and Fang Y. A queueing analysis for the denial of service (DoS) attacks in computer networks. Computer Networks 51 (2007) 3564-3573
    • (2007) Computer Networks , vol.51 , pp. 3564-3573
    • Wang, Y.1    Lin, C.2    Li, Q.L.3    Fang, Y.4
  • 17
    • 8144221250 scopus 로고    scopus 로고
    • An algorithmic approach on sensitivity analysis of perturbed QBD processes
    • Li Q.L., and Liu L.M. An algorithmic approach on sensitivity analysis of perturbed QBD processes. Queueing Systems 48 3-4 (2004) 365-397
    • (2004) Queueing Systems , vol.48 , Issue.3-4 , pp. 365-397
    • Li, Q.L.1    Liu, L.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.