-
3
-
-
0034486891
-
The mathematics of infectious diseases
-
Hethcote H.W. The mathematics of infectious diseases. SIAM Review 42 4 (2000) 599-653
-
(2000)
SIAM Review
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
5
-
-
0343742810
-
-
Society for Industrial and Applied Mathematics (SIAM), Philadelphia: PA
-
LaSalle J.P. The stability of dynamics systems (1976), Society for Industrial and Applied Mathematics (SIAM), Philadelphia: PA
-
(1976)
The stability of dynamics systems
-
-
LaSalle, J.P.1
-
6
-
-
34249894205
-
Functional similarities between computer worms and biological pathogens
-
Li J., and Knickerbocker P. Functional similarities between computer worms and biological pathogens. Computer & Security 26 4 (2007) 338-347
-
(2007)
Computer & Security
, vol.26
, Issue.4
, pp. 338-347
-
-
Li, J.1
Knickerbocker, P.2
-
7
-
-
0742276097
-
Inside the slammer worm
-
Moore D., Paxson V., Savage S., Shannon C., Staniford S., and Weaver N. Inside the slammer worm. IEEE Security and Privacy 1 4 (2003) 33-39
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
9
-
-
44849092256
-
Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies
-
Palmieri F., and Fiore U. Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies. Computer & Security 27 1-2 (2008) 48-62
-
(2008)
Computer & Security
, vol.27
, Issue.1-2
, pp. 48-62
-
-
Palmieri, F.1
Fiore, U.2
-
11
-
-
55649121612
-
Dynamic models for computer viruses
-
Piqueira J.R.C., de Vasconcelos A.A., Gabriel C.E.C.J., and Araujo V.O. Dynamic models for computer viruses. Computer & Security 27 7-8 (2008) 255-359
-
(2008)
Computer & Security
, vol.27
, Issue.7-8
, pp. 255-359
-
-
Piqueira, J.R.C.1
de Vasconcelos, A.A.2
Gabriel, C.E.C.J.3
Araujo, V.O.4
-
13
-
-
77951207806
-
Combating against internet worms in large-scale networks: an autonomic signature-based solution
-
Simkhada K., Taleb T., Waizumi Y., Jamalipour A., and Nemoto Y. Combating against internet worms in large-scale networks: an autonomic signature-based solution. Security and Communication Networks 2 1 (2009) 11-28
-
(2009)
Security and Communication Networks
, vol.2
, Issue.1
, pp. 11-28
-
-
Simkhada, K.1
Taleb, T.2
Waizumi, Y.3
Jamalipour, A.4
Nemoto, Y.5
-
14
-
-
58349117882
-
A rough set approach for automatic key attributes identification of zero-day polymorphic worms
-
Sun W., and Chen Y. A rough set approach for automatic key attributes identification of zero-day polymorphic worms. Expert Systems with Applications 36 3 (2008) 4672-4679
-
(2008)
Expert Systems with Applications
, vol.36
, Issue.3
, pp. 4672-4679
-
-
Sun, W.1
Chen, Y.2
-
16
-
-
77951203718
-
Computer virus replication
-
Tippet P.S. Computer virus replication. Comput Syst Eur 10 (1990) 33-36
-
(1990)
Comput Syst Eur
, vol.10
, pp. 33-36
-
-
Tippet, P.S.1
-
18
-
-
0036845274
-
Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission
-
Van den Driessche P., and Watmough J. Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. Mathematical Biosciences 180 1 (2002) 29-48
-
(2002)
Mathematical Biosciences
, vol.180
, Issue.1
, pp. 29-48
-
-
Van den Driessche, P.1
Watmough, J.2
-
20
-
-
34547261222
-
Packet vaccine: Black-box exploit detection and signature generation
-
Wang X, Li Z, Xu J, Reiter M, Kil C, Choi J. Packet vaccine: black-box exploit detection and signature generation. In: Proceedings of the 13th ACM conference on computer and communication security (CCS'06); 2006. pp. 37-46.
-
(2006)
Proceedings of the 13th ACM conference on computer and communication security (CCS'06)
, pp. 37-46
-
-
Wang, X.1
Li, Z.2
Xu, J.3
Reiter, M.4
Kil, C.5
Choi, J.6
-
22
-
-
63249091894
-
Behavior-based worm detection and signature generation
-
Yao Y, Lv J, Gao F, Zhang Y, Yu G. Behavior-based worm detection and signature generation. In: 2008 international multi-symposiums on computer and computational sciences; 2008. pp. 124-31.
-
(2008)
2008 international multi-symposiums on computer and computational sciences
, pp. 124-131
-
-
Yao, Y.1
Lv, J.2
Gao, F.3
Zhang, Y.4
Yu, G.5
-
23
-
-
55949131751
-
Network virus-epidemic model with the point-to-group information propagation
-
Yuan H., and Chen G. Network virus-epidemic model with the point-to-group information propagation. Applied Mathematics and Computation 206 1 (2008) 357-367
-
(2008)
Applied Mathematics and Computation
, vol.206
, Issue.1
, pp. 357-367
-
-
Yuan, H.1
Chen, G.2
-
27
-
-
33646150900
-
On the performance of internet worm scanning strategies
-
Zou C.C., Towsley D., and Gong W. On the performance of internet worm scanning strategies. Performance Evaluation 63 7 (2006) 700-723
-
(2006)
Performance Evaluation
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
|