메뉴 건너뛰기




Volumn , Issue , 2009, Pages 185-190

Propagation model for botnet based on conficker monitoring

Author keywords

Botnet; Conficker; Propagation; Worm

Indexed keywords

ENGINEERING; INDUSTRIAL ENGINEERING; WAVE PROPAGATION;

EID: 77952649859     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISISE.2009.18     Document Type: Conference Paper
Times cited : (4)

References (11)
  • 1
    • 41949123110 scopus 로고    scopus 로고
    • Research and Development of Botnets
    • March
    • ZHUGE Jian-Wei .Research and Development of Botnets. Journal of Software, Vol.19, No.3, March 2008, pp.702-715
    • (2008) Journal of Software , vol.19 , Issue.3 , pp. 702-715
    • Zhuge, J.-W.1
  • 5
    • 77952606066 scopus 로고    scopus 로고
    • Stochastic.SIS Model Analysis on Small-world Network
    • June
    • LI Guang-zheng,,SHI Ding-huaStochastic.SIS Model Analysis on Small-world Network. Computer Engineering,Vol.35,No.12,June 2009
    • (2009) Computer Engineering , vol.35 , Issue.12
    • Li, G.-Z.1    Shi, D.-H.2
  • 7
    • 14944368398 scopus 로고    scopus 로고
    • Worm propagation modeling and analysis under dynamic quarantine defense
    • Staniford S, ed. New York: ACM Press
    • Zou CC, Gong W, Towsley D. Worm propagation modeling and analysis under dynamic quarantine defense. In: Staniford S, ed. Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003). New York: ACM Press, 2003. 51-60.
    • (2003) Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003) , pp. 51-60
    • Zou, C.C.1    Gong, W.2    Towsley, D.3
  • 9
    • 0442280819 scopus 로고    scopus 로고
    • Modeling Computer Virus Prevalence with a Susceptible-infected- susceptible Model with Reintroduction
    • J
    • Wierman J C, Marchette D J. Modeling Computer Virus Prevalence with a Susceptible-infected-susceptible Model with Reintroduction [J]. Computational Statistics & Data Analysis, 2004, 45(1): 3-23.
    • (2004) Computational Statistics & Data Analysis , vol.45 , Issue.1 , pp. 3-23
    • Wierman, J.C.1    Marchette, D.J.2
  • 10
    • 33744992032 scopus 로고    scopus 로고
    • Predation and the Cost of Replication: New Approaches to Malware Prevention?
    • J
    • Richard F, Mark B, Alexander B. Predation and the Cost of Replication: New Approaches to Malware Prevention?[J]. Computers & Security, 2006, 25(4): 257-264.
    • (2006) Computers & Security , vol.25 , Issue.4 , pp. 257-264
    • Richard, F.1    Mark, B.2    Alexander, B.3
  • 11
    • 77952620078 scopus 로고    scopus 로고
    • www.cert.org.cn


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.