3Zou C C,Gong W, Towsley D.Code red worm propagation modeling and analysis[C].Washington DC:9th ACM Symposium on Computer and Communication Security,2002:138-147.
4Hironori Hiraishi,Fumio Mizoguchi.Design of a visual browser for network intrusion detection[C].IEEE,2001:132-137.
5Wang C,Knight J C,Elder M C.On viral propagation and the effect of immunization[C]. New Orleans,LA:Proceedings of 16th ACM Annual Computer Applications Conference,2000.
6Berk V H,Gray R S,Bakos G.Using sensor networks and data fusion for early detection of active worms[C].Proc of the SPIE AeroSense,2003.