1Spafford EH. The Intemet worm program : An analysis. Department of Computer Science, Purdue University, West Lafayette : Technical Report CSD - TR - 823,1988 : 1 - 29.
2Moor D,Shannon C,Brown J. Code -Red:A case study on the spread and victims of an Intemet worm[ C]//. Proceedings of the 2nd ACM SIGCOMM Workshop on Intemet Measurement ,Pittsburgh,2002:273 -284.
3Zou C C, Gong W, Towsley D. On the performance of Internet worm scanning strategies [ J ]. Performance Evaluation, 2006,63 (7) :700 - 723.
4Frauenthal JC. Mathematical Modeling in Epidemiology[M]. Berlin:Spring-Verlag,1980.
5Zou CC, Gong W, Towsley D. Code Red worm propagation modeling and analysis [ C ].//Proceedings of the 9th ACM Symposium on Computer and Communication Security. Washington :ACM Press,2002:138 -147.
6Wang Y, Wang C X. Modeling the effects of timing parameters on virus propagation [ C ]//proceedings of the 2003 ACM CCS Workshop on Rapid Malcode. Washington :ACM Press,2003:61 -66.