期刊文献+

计算机病毒网络传播模型稳定性与控制研究

Research on the Stability and Control of Domputer Virus Network Communication Model
下载PDF
导出
摘要 随着现代计算机技术的不断革新,各国计算机的普及率都在明显上升,部分不法分子也利用计算机网络病毒从事违法行为,导致其他计算机用户个人信息丢失或财产损失等,因此各国都在进一步增加互联网安全和病毒防御控制工作的力度。文章对计算机病毒网络传播模型稳定性和控制方法进行研究,说明了当前各类计算机病毒的特性,探讨了4种计算机病毒传播模型和稳定性,并阐述了相应的控制措施,以期能为相关工作提供参考。 With the continuous reform of the modern-computer technology, the popularization of computers in the country has increased significantly, which makes the use of computer network viruses for some criminals to conduct illegal activities, resulting in other computer users personal information loss or loss of property, etc., because this country is further increased the intensity of Internet security and virus defense control efforts.In this paper, the stability and control method of computer virus network propagation model is studied.The characteristics of various computer viruses are described.The model and the stability of the four computer viruses are discussed, and the corresponding control measures are described in order to provide reference for the related work.
作者 龚威
出处 《无线互联科技》 2015年第22期24-25,共2页 Wireless Internet Technology
关键词 计算机病毒 传播模型 稳定性 控制措施 computer virus transmission model stability control measures
  • 相关文献

参考文献5

二级参考文献31

  • 1李哲,封汉颍.一类改进的计算机病毒传播模型[J].微计算机信息,2008,24(12):64-66. 被引量:3
  • 2李晓丽,王丽娜.网络中的计算机病毒传播模型[J].计算机工程,2005,31(18):153-155. 被引量:19
  • 3张文良,黄亚楼,倪维健.基于差分贡献的垃圾邮件过滤特征选择方法[J].计算机工程,2007,33(8):80-82. 被引量:10
  • 4韩兰胜,洪帆,韩淑霞.邮件病毒传播的迭代模型[J].计算机工程,2007,33(6):1-2. 被引量:8
  • 5刘秉正,彭建华.非线性动力学[M].北京:高等教育出版社,2007:22-31.
  • 6J O Kephart, et al. Fighting computer viruses [ J ]. Scientific American, 1997,277(5) :56 -61.
  • 7Jeffrey O Kephart and Steve R White. Directed - graph epidemiological models of computer viruses[C]. In Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, pages, 1991, 343 -361.
  • 8Jeffrey O Kephart and Steve R White. Measuring and modeling computer virus prevalence[ C]. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993.2 - 15.
  • 9C C Zou, W Gong, D Towsley. Code red worm propagation modeling and analysis[ C]. In Proceedings of the 9th ACM conference on computer and communications security, New York: ACM Press 2002. 138 - 147.
  • 10Lansheng Han, Hui Liu and Asiedu Bafour Kojo. Analytic Model for Network Viruses [ C ]. In Proceedings of the ICNC2005, LNCS3612, Springer - Verlag, Berlin Heidelberg, 2005. 903 -910.

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部