期刊文献+

计算机网络蠕虫病毒及防治 被引量:2

在线阅读 下载PDF
导出
摘要 在分析蠕虫病毒的特点和传播方式的基础上,从企业用户和个人用户两个方面探讨蠕虫病毒的一些防范措施。
出处 《甘肃科技》 2006年第5期60-61,84,共3页 Gansu Science and Technology
  • 相关文献

参考文献1

二级参考文献17

  • 1J Shoch, J Hupp. The " Worm" Programs-early Experiments with a Distributed Computation [ J ]. Communications of the ACM, 1982,22(3) :172-180.
  • 2D Seeley. A Tour of the Worm [ C ]. CA : Proceedings of the Winter Usenix Conference ,1989. 287.
  • 3D Moore,V Paxson,S Savage, et al. Inside the Slammer Worm[J].IEEE Magazine on Security and Privacy,2003,1 (4) :33-39.
  • 4D Moore, V Paxson, C Shannon, et al. The Spread of the Sapphire/Slammer Worm [ R ]. Proceedings of the CAIDA Technical Report,2003.1-9.
  • 5N Weaver, V Paxson, S Staniford,et al. A Taxonomy of Computer Worms [ C ]. Proc. ACM CCS Workshop on Rapid Malcode, 2003.http ://www. silicondefense, com/research/.
  • 6Cliff Changchun Zou, Weibo Gong, Donald F. Towsley: Code Red Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense[ C]. ACM Conference on Computer and Communications Security, 2003. 51-60.
  • 7Cliff Changchun Zou, Weibo Gong, Donald F. Towsley: Code Red Worm Propagation Modeling and Analysis [ C ]. ACM Conference on Computer and Communications Security, 2002. 138-147.
  • 8J Daley, J Gani. Epidemic Modeling, an Introduction [ M ]. Cambridge Univ. Press, 1999.
  • 9D Moore, C Shannon, Geoffrey, et 02. Intemet Quarantine: Requirements for Containing Serf-propagating Code[ C]. INFOCOM 2003. http ://www. cs. ucf. edu/-jglenn/research, html.
  • 10D Moore, C Shannon. Code-red: A Case Study on the Spread and Victims of an Internet Worm [ C ]. Proceedings of the 2002 ACM SICGOMM Internet Measurement Workshop,2002. 273-284.

共引文献12

同被引文献13

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部