期刊文献+

一种网络病毒传播数学模型分析 被引量:4

Analysis of a Mathematical Model for Network Virus Propagation
下载PDF
导出
摘要 本文利用微分动力系统理论研究了计算机单种病毒的传播规律,特别是研究了考虑计算机病毒潜伏期的病毒传播模型。 In this paper,by using the theory of differential equations, we discuss the propagation regularity of computer viruses, especially the virus propagation model for the latent period.
出处 《计算机工程与科学》 CSCD 2006年第8期22-23,77,共3页 Computer Engineering & Science
关键词 网络病毒 潜伏期 临界值 稳定性 network virus latent period threshold value stability
  • 相关文献

参考文献8

  • 1J O Kephart, S R White. Directed Graphepidemiological Model of Computer Viruses[A]. Proc of the 1991 IEEE Syrup on security and Privacy[C]. 1991. 343-359.
  • 2潭郁松.计算机病毒传播的数学模型.计算机工程与科学,1996,18(1):115-126.
  • 3J Lopez Gondar, R. Cipolatti. A Mathematical Model for Virus Infection in a System of Interacting Computers[J]. Computational and Applied Mathematics, 2003, 22(2) : 209-231.
  • 4C C Zou, W Gong, D Towsley. Code Red Worm Propagation Modeling and Analysis[A].9th ACM Syrup on Computer and Communication Security[C]. 2002. 138-147.
  • 5F Brauer, C Castile-Chavie. Mathematical Models in Population Biology and Epidemioloy[M]. Springer,2001.
  • 6L O Wilson. An Epidemic Model Involving a Threshold[J].Math Biosci, 1972, 15(1-2): 109-121.
  • 7Z C Zou, W Gong, D Towsley. Worm Propagation Modeling and Analysis Under Dynamic Quarantine Defense[A]. ACM COS Workshop on rapid Malcode (WORM03)[C]. 2003.
  • 8郭承志,何利萍.计算机病毒与生物病毒[J].青海大学学报(自然科学版),1998,16(4):76-77. 被引量:2

二级参考文献3

  • 1刘尊全.计算机病毒防范与信息对抗技术,北京:清华大学出版社,1992.5.
  • 2王学海.计算机病毒概述.计算机信息报.1989.10.17.
  • 3Fred Cohen,Computer Viruses--theory and Experiments,Computers & Securitg,6.1987.22-35.

共引文献3

同被引文献19

  • 1胡亮,赵阔,孔令治,尤卫军.基于日志的网络背景流量模拟仿真[J].小型微型计算机系统,2006,27(2):197-201. 被引量:3
  • 2袁华,陈国青.电子邮件病毒传播仿真模型及影响因素模拟[J].计算机工程与设计,2006,27(11):1914-1916. 被引量:12
  • 3Newman MEJ,Forrest S,Balthrop J.Email networks and the spread of computer viruses [J]. Phys Rev E, 2002,66 (3): 35- 101.
  • 4Williamson M M,Leveille J.An epidemiological model of virus spread and cleanup [C]. Toronto, Canada: Proceedings of Virus Bulletin,2003.
  • 5Xiong J T.ACT:Attachment china tracing scheme for emaii virus detection and control[C].Washington DC,USA:Proceedings of the 2004 ACM workshop on Rapid Malcode,2004.
  • 6Mishra B K, Saini D.Mathematical models on computer viruses [J]. Applied Mathematics and Computation, 2007,187 (2): 929- 936.
  • 7Avlonitis M,Magkos E,Stefanidakis M,et al.A spatial stochastic model for worm propagation:Scale effects[J].Journal in Computer Virology,2007,3(2):87-92.
  • 8Andrew S Tanenbaum.计算机网络[M].北京:清华大学出版社,2006.
  • 9KEPHART J O, WHITE S R. Directed Graph epidemiological Model of Computer Viruses[ C ]// Proc of 1991 IEEE Symponseeurity and Privacy. 1991:343 - 359.
  • 10ANDERSON R M, MAY R M. Infectious diseases of humans: dynamics and control[ M] . Oxford: Oxford University Press, 1991.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部