![]() |
Volumn 26, Issue 8, 2010, Pages 1433-1443
|
Modeling the propagation of Peer-to-Peer worms
|
Author keywords
Defense; Invasive software; Modeling; Network security; Peer to Peer; Propagation; Worms
|
Indexed keywords
DISCRETE-TIME;
IN-NETWORK;
INVASIVE SOFTWARE;
MATRIX;
MATRIX APPROACH;
P2P WORM;
PEER TO PEER;
PROPAGATION CHARACTERISTICS;
PROPAGATION MODELS;
PROPAGATION PROCESS;
SECURITY RESEARCH;
SIMULATION EXPERIMENTS;
STRUCTURED P2P;
UNSTRUCTURED P2P NETWORK;
WORM PROPAGATION;
COMPUTER CRIME;
COMPUTER SOFTWARE;
DIFFERENCE EQUATIONS;
DISTRIBUTED COMPUTER SYSTEMS;
INTERNET;
NETWORK SECURITY;
RESEARCH;
PEER TO PEER NETWORKS;
|
EID: 77955517954
PISSN: 0167739X
EISSN: None
Source Type: Journal
DOI: 10.1016/j.future.2010.04.009 Document Type: Article |
Times cited : (31)
|
References (21)
|