你好,欢迎来到! 设为首页 收藏本站
联系电话
论文范文 当前位置: > 写作指南 > 论文范文 >

P2P僵尸网络的传播建模与分析(2)

时间:2015-04-23 10:55来源:www.hexinqk.com 作者:冯丽萍等 点击:
参考文献: [1]FENG L, HAN Q, WANG H,et al. Effective immune measure on P2P botnet [J]. Journal of Computer Applications, 2012, 32(9): 2617-2619.(冯丽萍,韩琦,王鸿斌,等.P2P僵尸网络的有效免
  参考文献: 
  [1]FENG L, HAN Q, WANG H,et al. Effective immune measure on P2P botnet [J]. Journal of Computer Applications, 2012, 32(9): 2617-2619.(冯丽萍,韩琦,王鸿斌,等.P2P僵尸网络的有效免疫措施[J].计算机应用,2012,32(9):2617-2619.)
  [2]JIANG J, ZHUGE J, DUAN H,et al. Research on botnet mechanisms and defenses [J]. Journal of Software, 2012, 23(1): 82-96.(江健,诸葛建伟,段海新,等.僵尸网络机理与防御技术[J]. 软件学报,2012,23(1): 82-96.) 
  [3]HOLZ T, STEINER M, DAHL F,et al. Measurements and mitigation of peer-to-peer botnets: a case study on storm worm [C]// Proceeding of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats. Berkeley: USENIX Association, 2008: 1-9. 
  [4]YAN G, HA D T, EIDENBENZ S. AntBot: anti-pollution peer-to-peer botnets [J]. Computer Networks, 2011, 55(8): 1941-1956. 
  [5]KOLESNICHENKOA, REMKEA, de BOER PT,et al.Compari-son of the mean-field approach and simulation in a peer-to-peer botnet case study [C]// EPEW 2011: Proceedings of the 8th European Performance Engineering Workshop, LNCS 6977. Berlin: Springer, 2011: 133-147. 
  [6]van RUITENBEEK E, SANDERS W H. Modeling peer-to-peer botnets [C]// QEST08: Proceeding of the 5th International Conference on the Quantitative Evaluation of Systems. Piscataway: IEEE, 2008: 307-316. 
  [7]WANGP, SPARKSS, ZOUC. An advanced hybridpeer-to-peer botnet [J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(2): 113-127. 
  [8]KHOSROSHAHY M, ALI M K, QIU D. The SIC botnet lifecycle model: a step beyond traditional epidemiological models [J]. Computer Networks, 2013, 57(2): 404-421. 
  [9]ZHANG J, PERDISCI R, LEE W,et al. Building a scalable system for stealthy P2P-botnet detection [J]. IEEE Transactions on Information Forensics and Security, 2014, 9(1): 27-38. 
  [10]KHATTAK S, RAMEY N R, KHAN K R,et al. A taxonomy of botnet behavior, detection, and defense [J]. IEEE Communications Surveys & Tutorials, 2014, 16(2): 898-924. 
  [11]WANG P, ASLAM B, ZOU C. Peer-to-peer botnet: the next generation of botnet attacks [M]. Berlin: Springer, 2010: 335-350. 
  [12]FENG L, WANG H, HAN Q,et al. Modeling peer-peer botnet on scale-free network [J]. Abstract and Applied Analysis, 2014, 2014: 1-8. 
  [13]FENG L, LIAO X, HAN Q,et al. Modeling and analysis of peer-peer botnet [J]. Abstract and Applied Analysis, 2012: 1-18. 
  [14]ANDERSON R M, MAY R M. Infectious diseases of humans: dynamics and control [M]. Oxford: Oxford University Press, 1991: 25-56.


  核心期刊网(www.hexinqk.com)秉承“诚以为基,信以为本”的宗旨,为广大学者老师提供投稿辅导、写作指导、核心期刊推荐等服务。
  核心期刊网专业期刊发表机构,为学术研究工作者解决北大核心CSSCI核心统计源核心EI核心等投稿辅导咨询与写作指导的问题。

  投稿辅导咨询电话:18915033935
  投稿辅导客服QQ: 论文投稿1002080872 论文投稿1003158336
  投稿辅导投稿邮箱:1003158336@qq.com
------分隔线----------------------------
栏目列表  
推荐论文  
热点论文  
 
QQ在线咨询
投稿辅导热线:
189-1503-3935
微信号咨询:
18915033935
网站简介 核刊总览 普刊专栏 期刊验证 学术答疑 服务流程 写作指南 支付方式 信用说明 联系我们
CopyRight © 2013 All Rights Reserved.
免责声明:本站提供投稿辅导 论文投稿 投稿辅导 核心期刊检索 核心投稿辅导等服务,本站刊载文章仅代表作者观点
并不意味着本站认同,部分作品系转载,版权归原作者或相应的机构;若某篇作品侵犯您的权利,请来信告知:1003158336@qq.com