메뉴 건너뛰기




Volumn , Issue , 2019, Pages 11-14

On intelligent agent-based simulation of network worms propagation

Author keywords

Agent based simulation; Code Red; Malicious software; Multi agent simulation; Network worm; Simulation of epidemic process

Indexed keywords

CODES (SYMBOLS); INTELLIGENT AGENTS; MULTI AGENT SYSTEMS; NETWORK CODING;

EID: 85068073458     PISSN: 25727591     EISSN: None     Source Type: Journal    
DOI: 10.1109/CADSM.2019.8779342     Document Type: Conference Paper
Times cited : (15)

References (16)
  • 2
    • 17444431614 scopus 로고    scopus 로고
    • Worm propagation and generic attacks
    • E. Levy, "Worm propagation and generic attacks, " IEEE Security & Privacy, vol. 3, no. 2, pp. 63-65, 2005.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.2 , pp. 63-65
    • Levy, E.1
  • 6
    • 85056374562 scopus 로고    scopus 로고
    • Stochastic modelling of cash flow for personal insurance fund using the cloud data storage
    • K. Bazilevych et al. "Stochastic modelling of cash flow for personal insurance fund using the cloud data storage. " International Journal of Computing, vol. 17 (3), pp. 153-162, 2018.
    • (2018) International Journal of Computing , vol.17 , Issue.3 , pp. 153-162
    • Bazilevych, K.1
  • 7
    • 77952766714 scopus 로고    scopus 로고
    • The spread of malware on the wifi network: Epidemiology model and behaviour evaluation
    • Nanjing
    • B. Shan, "The Spread of Malware on the WiFi Network: Epidemiology Model and Behaviour Evaluation, " 2009 First International Conference on Information Science and Engineering, Nanjing, 2009, pp. 1916-1918.
    • (2009) 2009 First International Conference on Information Science and Engineering , pp. 1916-1918
    • Shan, B.1
  • 11
    • 85140821279 scopus 로고    scopus 로고
    • Intelligent simulation of network worm propagation using the code red as an example
    • D. Chumachenko et al. "Intelligent simulation of network worm propagation using the code red as an example, " in Telecommunications and Radio Engineering, vol. 78, iss. 5, pp. 443-464, 2019. https://www. doi. org/10. 1615/TelecomRadEng. v78. i5. 60
    • (2019) Telecommunications and Radio Engineering , vol.78 , Issue.5 , pp. 443-464
    • Chumachenko, D.1
  • 12
    • 0141762461 scopus 로고    scopus 로고
    • Code-Red: A case study on the spread and victims of an Internet worm
    • D. Moore et al. "Code-Red: a case study on the spread and victims of an Internet worm, " in Proc. Internet Measurement Workshop (IMW), 2002, pp. 273-284.
    • (2002) Proc. Internet Measurement Workshop (IMW) , pp. 273-284
    • Moore, D.1
  • 14
    • 26944469458 scopus 로고    scopus 로고
    • Point-set methods of clusterization of standard information
    • V. P. Mashtalir, S. V. Yakovlev. "Point-set methods of clusterization of standard information. " Cybernetics and Systems Analysis, vol. 37 (3), pp. 295-307, 2001. https://doi. org/10. 1023/A: 1011985908177.
    • (2001) Cybernetics and Systems Analysis , vol.37 , Issue.3 , pp. 295-307
    • Mashtalir, V.P.1    Yakovlev, S.V.2
  • 15
    • 84906854544 scopus 로고    scopus 로고
    • Group structures on quotient sets in classification problems
    • V. P. Mashtalir et al. "Group structures on quotient sets in classification problems. " Cybernetics and Systems Analysis, vol. 50 (4), pp. 507-518, 2014. https://doi. org/10. 1007/s10559-014-9639-z.
    • (2014) Cybernetics and Systems Analysis , vol.50 , Issue.4 , pp. 507-518
    • Mashtalir, V.P.1
  • 16
    • 68149126385 scopus 로고    scopus 로고
    • Set coverings and tolerance relations
    • S. N. Gerasin et al. "Set coverings and tolerance relations. " Cybernetics and Systems Analysis, vol. 43 (3), pp. 333-340, 2008. https://doi. org/10. 1007/s10559-008-9007-y.
    • (2008) Cybernetics and Systems Analysis , vol.43 , Issue.3 , pp. 333-340
    • Gerasin, S.N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.