期刊文献+

一种具有抑制作用的多信息传播模型 被引量:4

A Model of Multi-Information Dissemination with Suppressed Action
下载PDF
导出
摘要 针对大量现实系统中多种信息传播并存,且不同传播之间存在相互作用的现象,以复杂网络为系统模型,采用复杂网络传播动力学相关理论,对同一系统中多信息传播并存情况下的传播模型和传播动力学过程以及相关性质进行系统的探索研究。针对多信息传播并存过程中相互抑制作用,给出多信息传播的SIn模型。以仿真的方法对研究结果进行试验验证,确认该模型对模拟和预测多种信息传播并存系统动力学行为是有效的。 For phenomenon of multi-information existing and interacting with each other simutanously in amounts of real systems,models and propagation dynamics of such system are exploited systematically by adopting complex network models and its dynamics theory.SIn model of multi-information is proposed for mutual inhibtion among multi-information spreading simutaously.Research validity of this model in imitating and predicting dynamic behavior in such system is verified by computer simulation.
出处 《复杂系统与复杂性科学》 EI CSCD 2010年第1期47-51,共5页 Complex Systems and Complexity Science
基金 国家自然基金(200905030-03)
关键词 复杂网络 多信息传播模型 传播动力学 complex network multi-information dissemination model dissemination dynamics
  • 相关文献

参考文献8

  • 1ZHOU Tao,FU Zhongqian,WANG Binghong.Epidemic dynamics on complex networks[J].Progress in Natural Science:Materials International,2006,16(5):452-457. 被引量:36
  • 2周涛,傅忠谦,牛永伟,王达,曾燕,汪秉宏,周佩玲.复杂网络上传播动力学研究综述[J].自然科学进展,2005,15(5):513-518. 被引量:71
  • 3Xu X J, Peng H O, Wang X M, et al. Epidemic spreading with time delay in complex networks[ J ]. Physica A, 2006, 367: 525 -530.
  • 4Das Bistro. Project's anti - code - red default, ida. [ DB/OL ]. [ 2009 -06 -01 ]. http ://www. dasbistro. com/default. ida.
  • 5Nicol D, Liljenstam M. Models of active worm defenses. [ DB/OL]. [ 2009 -06 -01 ]. http://www. linklings, net/MOSES/papers/ipsi - 236. pdf.
  • 6杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27
  • 7Newman M E J. Threshold effects for two pathogens spreading on a network[ J]. Phys Rev Lett,2005, 95:108701.
  • 8Ahn Y Y, Jeong H, Masuda N, et al. Epidemic dynamics of two species of interacting particles on scale - free networks[ J ]. Physical Review E, 2006,74: 066113.

二级参考文献135

  • 1[2]CERT Advisory CA-2001-23. Continued Threat of the "Code Red Ⅱ" Worm. http:∥www. cert. org/advisories/CA-2001-23 .html
  • 2[3]Moore D. The Spread of the Code-Red Worm (CRv2). http:∥www. caida.org/analysis/security/-code-red/coderedv2 analysis.xml, Nov 2001
  • 3[4]Staniford S, Paxson V, Weaver N. How to Own the Internet in Your Spare Time. In: Proc of the USENIX Security Symposium, 2002
  • 4[5]Das Bistro Project's anti-code-red default.ida. http:∥www. dasbitro.com/default.ida
  • 5[6]Douglas Knowles, Frederic Perriot and Peter Szor, Symantec security response: W32/Nachi. A,http:∥www. f-prot.com/virusinfo/descriptions/nachi_A.html
  • 6[7]Douglas Knowles, Frederic Perriot and Peter Szor, Symantec security response: W32.Blaster. Worm,http:∥securityresponse.symantec.com/avcenter/venc/data/w32.blaster, worm.html
  • 7[8]Cliff Changchun Zou, Don Towsley, Email Virus Propagation Modeling and Analysis, Umass ECE Technical Report TR-03-CSE-04, May, 2003
  • 8[9]Michael Liljenstam, A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations, In: Proceedings of the Tenth IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE Computer Society Press, Fort Worth,TX, Oct 2002
  • 9[10]David Moore, Code-Red: A case study on the spread and victims of an Internet worm, In: Presented at the Internet Measurement Workshop (IMW) in 2002
  • 10[11]Cliff Changchun Zou, Weibo Gong, Don Towsley. Code Red Ⅱ Worm Propagation Modeling and Analysis.In: 9th ACM Conference on Computer and Communication Security, Nov. 18-22, Washington DC, USA,2002. http:∥tennis.ecs.umass.edu/~czou/research/codered.pdf

共引文献128

同被引文献56

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部