-
2
-
-
12244311689
-
A taxonomy of computer worms
-
Oct.
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A Taxonomy of Computer Worms," Proc. First ACM Workshop Rapid Malcode (WORM '03), Oct. 2003.
-
(2003)
Proc. First ACM Workshop Rapid Malcode (WORM '03)
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
3
-
-
33847112108
-
Scale-free topology of email networks
-
H. Ebel, L. Mielsch, and S. Bornholdt, "Scale-Free Topology of EMail Networks," Physical Rev. E, vol. 66, 2002.
-
(2002)
Physical Rev. e
, vol.66
-
-
Ebel, H.1
Mielsch, L.2
Bornholdt, S.3
-
4
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, K.P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and Analysis of Online Social Networks," Proc. ACM SIGCOMM, 2007.
-
(2007)
Proc. ACM SIGCOMM
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
6
-
-
0242411922
-
Epidemic incidence in correlated complex networks
-
Y. Moreno, J.B. Gomez, and A.F. Pacheco, "Epidemic Incidence in Correlated Complex Networks," Physical Rev. E, vol. 68, 2003.
-
(2003)
Physical Rev. e
, vol.68
-
-
Moreno, Y.1
Gomez, J.B.2
Pacheco, A.F.3
-
7
-
-
0000494582
-
Epidemic outbreaks in complex heterogeneous networks
-
Y. Moreno, R. Pastor-Satorras, and A. Vespignani, "Epidemic Outbreaks in Complex Heterogeneous Networks," European Physical J. B, vol. 26, pp. 521-529, 2002.
-
(2002)
European Physical J. B
, vol.26
, pp. 521-529
-
-
Moreno, Y.1
Pastor-Satorras, R.2
Vespignani, A.3
-
8
-
-
2942562709
-
Epidemic spreading in complex networks with degree correlations
-
M. Boguna, R. Pastor-Satorras, and A. Vespignani, "Epidemic Spreading in Complex Networks with Degree Correlations," Statistical Mechanics of Complex Networks, vol. 625, pp. 127-147, 2003.
-
(2003)
Statistical Mechanics of Complex Networks
, vol.625
, pp. 127-147
-
-
Boguna, M.1
Pastor-Satorras, R.2
Vespignani, A.3
-
9
-
-
39049092655
-
Epidemiological modeling of peerto-peer viruses and pollution
-
R. Thommes and M. Coates, "Epidemiological Modeling of Peerto- Peer Viruses and Pollution," Proc. IEEE INFOCOM, pp. 1-12, 2006.
-
(2006)
Proc. IEEE INFOCOM
, pp. 1-12
-
-
Thommes, R.1
Coates, M.2
-
10
-
-
34548312516
-
Information survival threshold in sensor and p2p networks
-
D. Chakrabarti, J. Leskovec, C. Faloutsos, S. Madden, C. Guestrin, and M. Faloutsos, "Information Survival Threshold in Sensor and p2p Networks," Proc. IEEE INFOCOM, pp. 1316-1324, 2007.
-
(2007)
Proc. IEEE INFOCOM
, pp. 1316-1324
-
-
Chakrabarti, D.1
Leskovec, J.2
Faloutsos, C.3
Madden, S.4
Guestrin, C.5
Faloutsos, M.6
-
11
-
-
25844439630
-
The effect of network topology on the spread of epidemics
-
A. Ganesh, L. Massoulie, and D. Towsley, "The Effect of Network Topology on the Spread of Epidemics," Proc. IEEE INFOCOM, pp. 1455-1466, 2005.
-
(2005)
Proc. IEEE INFOCOM
, pp. 1455-1466
-
-
Ganesh, A.1
Massoulie, L.2
Towsley, D.3
-
12
-
-
27644462218
-
Epidemic spreading in real networks: An eigenvalue viewpoint
-
Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, "Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint," Proc. IEEE Symp. Reliable Distributed Systems, pp. 25-34, 2003.
-
(2003)
Proc. IEEE Symp. Reliable Distributed Systems
, pp. 25-34
-
-
Wang, Y.1
Chakrabarti, D.2
Wang, C.3
Faloutsos, C.4
-
13
-
-
26844473415
-
Spatial-temporal modeling of malware propagation in networks
-
Sept.
-
Z. Chen and C. Ji, "Spatial-Temporal Modeling of Malware Propagation in Networks," IEEE Trans. Neural Networks, vol. 16, no. 5, pp. 1291-1303, Sept. 2005.
-
(2005)
IEEE Trans. Neural Networks
, vol.16
, Issue.5
, pp. 1291-1303
-
-
Chen, Z.1
Ji, C.2
-
14
-
-
34248995311
-
Modeling and simulation study of the propagation and defense of internet e-mail worms
-
Apr.-June
-
C.C. Zou, D. Towsley, and W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 105- 118, Apr.-June 2007.
-
(2007)
IEEE Trans. Dependable and Secure Computing
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
15
-
-
79956032303
-
Malware propagation in online social networks: Nature, dynamics, and defense implications
-
G. Yan, G. Chen, S. Eidenbenz, and N. Li, "Malware Propagation in Online Social Networks: Nature, Dynamics, and Defense Implications," Proc. Sixth ACM Symp. Information Computer Comm. and Security (ASIACCS '11), 2011.
-
(2011)
Proc. Sixth ACM Symp. Information Computer Comm. and Security (ASIACCS '11)
-
-
Yan, G.1
Chen, G.2
Eidenbenz, S.3
Li, N.4
-
17
-
-
77955517954
-
Modeling the propagation of peer-to-peer worms
-
X. Fan and Y. Xiang, "Modeling the Propagation of Peer-to-Peer Worms," Future Generation Computer Systems, vol. 26, pp. 1433- 1443, 2010.
-
(2010)
Future Generation Computer Systems
, vol.26
, pp. 1433-1443
-
-
Fan, X.1
Xiang, Y.2
-
18
-
-
79551680433
-
On modeling malware propagation in generalized social networks
-
Jan
-
S.M. Cheng, W. Ao, P.Y. Chen, and K.C. Chen, "On Modeling Malware Propagation in Generalized Social Networks," IEEE Comm. Letters, vol. 15, no. 1, pp. 25-27, Jan. 2011.
-
(2011)
IEEE Comm. Letters
, vol.15
, Issue.1
, pp. 25-27
-
-
Cheng, S.M.1
Ao, W.2
Chen, P.Y.3
Chen, K.C.4
-
19
-
-
35348871999
-
Analysis of topological characteristics of huge online social networking services
-
Y.Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, "Analysis of Topological Characteristics of Huge Online Social Networking Services," Proc. ACM Int'l Conf. World Wide Web (WWW '07), 2007.
-
(2007)
Proc. ACM Int'l Conf. World Wide Web (WWW '07)
-
-
Ahn, Y.Y.1
Han, S.2
Kwak, H.3
Moon, S.4
Jeong, H.5
-
20
-
-
80052853005
-
Eliminating errors in worm propagation models
-
Sept
-
Y. Wang, S. Wen, S. Cesare, W. Zhou, and Y. Xiang, "Eliminating Errors in Worm Propagation Models," IEEE Comm. Letters, vol. 15, no. 9, pp. 1022-1024, Sept. 2011.
-
(2011)
IEEE Comm. Letters
, vol.15
, Issue.9
, pp. 1022-1024
-
-
Wang, Y.1
Wen, S.2
Cesare, S.3
Zhou, W.4
Xiang, Y.5
-
21
-
-
77954950954
-
Symantec internet security threat report 2010
-
Symantec Corp., Mar.
-
M. Fossi and J. Blackbird, "Symantec Internet Security Threat Report 2010," technical report, Symantec Corp., Mar. 2011.
-
(2011)
Technical Report
-
-
Fossi, M.1
Blackbird, J.2
-
22
-
-
37649029105
-
Email networks and the spread of computer viruses
-
M.E.J Newman, S. Forrest, and J. Balthrop, "Email Networks and the Spread of Computer Viruses," Physical Rev. E, vol. 66, 2002.
-
(2002)
Physical Rev. e
, vol.66
-
-
Newman, M.E.J.1
Forrest, S.2
Balthrop, J.3
-
23
-
-
84862814724
-
Locating defense positions for thwarting the propagation of topological worms
-
Apr
-
S. Wen, W. Zhou, Y. Wang, W.L. Zhou, and Y. Xiang, "Locating Defense Positions for Thwarting the Propagation of Topological Worms," IEEE Comm. Letters, vol. 16, no. 4, pp. 560-563, Apr. 2012.
-
(2012)
IEEE Comm. Letters
, vol.16
, Issue.4
, pp. 560-563
-
-
Wen, S.1
Zhou, W.2
Wang, Y.3
Zhou, W.L.4
Xiang, Y.5
-
24
-
-
13944252976
-
A measure of betweenness centrality based on random walks
-
M. Newman, "A Measure of Betweenness Centrality Based on Random Walks," Social Networks, vol. 27, pp. 39-54, 2005.
-
(2005)
Social Networks
, vol.27
, pp. 39-54
-
-
Newman, M.1
-
25
-
-
0042474227
-
Modelling the spread of active worms
-
Z. Chen, L. Gao, and K. Kwiat, "Modelling the Spread of Active Worms," Proc. IEEE INFOCOM, pp. 1890-1900, 2003.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
26
-
-
0038349210
-
Code red worm propagation modelling and analysis
-
C.C. Zou, W. Gong, and D. Towsley, "Code Red Worm Propagation Modelling and Analysis," Proc. Ninth ACM Computer and Comm. Security Conf. (CCS '02), pp. 138-147, 2002.
-
(2002)
Proc. Ninth ACM Computer and Comm. Security Conf. (CCS '02)
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
27
-
-
73449125776
-
Propagation of active worms: A survey
-
Y. Xiang, X. Fan, and W. Zhu, "Propagation of Active Worms: A Survey," Int'l J. Computer Systems Science and Eng., vol. 24, pp. 157- 172, 2009.
-
(2009)
Int'l J. Computer Systems Science and Eng.
, vol.24
, pp. 157-172
-
-
Xiang, Y.1
Fan, X.2
Zhu, W.3
-
28
-
-
33646150900
-
On the performance of internet worm scanning strategies
-
C.C. Zou, D. Towsley, and W. Gong, "On the Performance of Internet Worm Scanning Strategies," Performance Evaluation, vol. 63, pp. 700-723, 2006.
-
(2006)
Performance Evaluation
, vol.63
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
29
-
-
34547320799
-
Systematic topology analysis and generation using degree correlations
-
P. Mahadevan, D. Krioukov, K. Fall, and A. Vahdat, "Systematic Topology Analysis and Generation Using Degree Correlations," Proc. ACM SIGCOMM, 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Mahadevan, P.1
Krioukov, D.2
Fall, K.3
Vahdat, A.4
-
30
-
-
34748827408
-
Bluetooth worm propagation: Mobility pattern matters
-
G. Yan, H.D. Flores, L. Cuellar, N. Hengartner, S. Eidenbenz, and V. Vu, "Bluetooth Worm Propagation: Mobility Pattern Matters," Proc. Second ACM Symp. Information Computer and Comm. Security (ASIACCS '07), 2007.
-
(2007)
Proc. Second ACM Symp. Information Computer and Comm. Security (ASIACCS '07)
-
-
Yan, G.1
Flores, H.D.2
Cuellar, L.3
Hengartner, N.4
Eidenbenz, S.5
Vu, V.6
-
31
-
-
58849141571
-
Modeling propagation dynamics of bluetooth worms (extended version)
-
Mar.
-
G. Yan and S. Eidenbenz, "Modeling Propagation Dynamics of Bluetooth Worms (Extended Version)," IEEE Trans. Mobile Computing, vol. 8, no. 3, pp. 353-367, Mar. 2009.
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.3
, pp. 353-367
-
-
Yan, G.1
Eidenbenz, S.2
-
32
-
-
79955073428
-
Network immunization and virus propagation in email networks: Experimental evaluation and analysis
-
C. Gao, J. Liu, and N. Zhong, "Network Immunization and Virus Propagation in Email Networks: Experimental Evaluation and Analysis," Knowledge and Information Syst., vol. 27, pp. 253- 279, 2011.
-
(2011)
Knowledge and Information Syst.
, vol.27
, pp. 253-279
-
-
Gao, C.1
Liu, J.2
Zhong, N.3
-
34
-
-
84880054642
-
Shannon the nyxem email virus: Analysis and inferences
-
CAIDA, Feb.
-
Moore and C. Shannon, "The Nyxem Email Virus: Analysis and Inferences," technical report, CAIDA, Feb. 2006.
-
(2006)
Technical Report
-
-
Moore1
Shannon, C.2
|