2J Shoch, J Hupp. The " Worm" Programs-early Experiments with a Distributed Computation [ J ]. Communications of the ACM, 1982,22(3) :172-180.
3D Seeley. A Tour of the Worm [ C ]. CA : Proceedings of the Winter Usenix Conference ,1989. 287.
4D Moore,V Paxson,S Savage, et al. Inside the Slammer Worm[J].IEEE Magazine on Security and Privacy,2003,1 (4) :33-39.
5D Moore, V Paxson, C Shannon, et al. The Spread of the Sapphire/Slammer Worm [ R ]. Proceedings of the CAIDA Technical Report,2003.1-9.
6N Weaver, V Paxson, S Staniford,et al. A Taxonomy of Computer Worms [ C ]. Proc. ACM CCS Workshop on Rapid Malcode, 2003.http ://www. silicondefense, com/research/.
7Cliff Changchun Zou, Weibo Gong, Donald F. Towsley: Code Red Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense[ C]. ACM Conference on Computer and Communications Security, 2003. 51-60.
8Cliff Changchun Zou, Weibo Gong, Donald F. Towsley: Code Red Worm Propagation Modeling and Analysis [ C ]. ACM Conference on Computer and Communications Security, 2002. 138-147.
9J Daley, J Gani. Epidemic Modeling, an Introduction [ M ]. Cambridge Univ. Press, 1999.
10D Moore, C Shannon, Geoffrey, et 02. Intemet Quarantine: Requirements for Containing Serf-propagating Code[ C]. INFOCOM 2003. http ://www. cs. ucf. edu/-jglenn/research, html.