|
参考文献:
[1]FENG L, HAN Q, WANG H,et al. Effective immune measure on P2P botnet [J]. Journal of Computer Applications, 2012, 32(9): 2617-2619.(冯丽萍,韩琦,王鸿斌,等.P2P僵尸网络的有效免疫措施[J].计算机应用,2012,32(9):2617-2619.)
[2]JIANG J, ZHUGE J, DUAN H,et al. Research on botnet mechanisms and defenses [J]. Journal of Software, 2012, 23(1): 82-96.(江健,诸葛建伟,段海新,等.僵尸网络机理与防御技术[J]. 软件学报,2012,23(1): 82-96.)
[3]HOLZ T, STEINER M, DAHL F,et al. Measurements and mitigation of peer-to-peer botnets: a case study on storm worm [C]// Proceeding of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. Berkeley: USENIX Association, 2008: 1-9.
[4]YAN G, HA D T, EIDENBENZ S. AntBot: anti-pollution peer-to-peer botnets [J]. Computer Networks, 2011, 55(8): 1941-1956.
[5]KOLESNICHENKOA, REMKEA, de BOER PT,et al.Compari-son of the mean-field approach and simulation in a peer-to-peer botnet case study [C]// EPEW 2011: Proceedings of the 8th European Performance Engineering Workshop, LNCS 6977. Berlin: Springer, 2011: 133-147.
[6]van RUITENBEEK E, SANDERS W H. Modeling peer-to-peer botnets [C]// QEST08: Proceeding of the 5th International Conference on the Quantitative Evaluation of Systems. Piscataway: IEEE, 2008: 307-316.
[7]WANGP, SPARKSS, ZOUC. An advanced hybridpeer-to-peer botnet [J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(2): 113-127.
[8]KHOSROSHAHY M, ALI M K, QIU D. The SIC botnet lifecycle model: a step beyond traditional epidemiological models [J]. Computer Networks, 2013, 57(2): 404-421.
[9]ZHANG J, PERDISCI R, LEE W,et al. Building a scalable system for stealthy P2P-botnet detection [J]. IEEE Transactions on Information Forensics and Security, 2014, 9(1): 27-38.
[10]KHATTAK S, RAMEY N R, KHAN K R,et al. A taxonomy of botnet behavior, detection, and defense [J]. IEEE Communications Surveys & Tutorials, 2014, 16(2): 898-924.
[11]WANG P, ASLAM B, ZOU C. Peer-to-peer botnet: the next generation of botnet attacks [M]. Berlin: Springer, 2010: 335-350.
[12]FENG L, WANG H, HAN Q,et al. Modeling peer-peer botnet on scale-free network [J]. Abstract and Applied Analysis, 2014, 2014: 1-8.
[13]FENG L, LIAO X, HAN Q,et al. Modeling and analysis of peer-peer botnet [J]. Abstract and Applied Analysis, 2012: 1-18.
[14]ANDERSON R M, MAY R M. Infectious diseases of humans: dynamics and control [M]. Oxford: Oxford University Press, 1991: 25-56.
|
|
核心期刊网(www.hexinqk.com)秉承“诚以为基,信以为本”的宗旨,为广大学者老师提供投稿辅导、写作指导、核心期刊推荐等服务。 核心期刊网专业期刊发表机构,为学术研究工作者解决北大核心、CSSCI核心、统计源核心、EI核心等投稿辅导咨询与写作指导的问题。 投稿辅导咨询电话:18915033935 投稿辅导客服QQ: 投稿辅导投稿邮箱:1003158336@qq.com |

