[1] FALLIERE N, MURCHU L O, CHIEN E. W32.Stuxnet dossier[EB/OL].[2018-01-10]. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf. [2] 国家计算机病毒应急处理中心.关于"Petya"勒索病毒攻击事件的预警[EB/OL].[2018-02-10]. http://www.cverc.org.cn/yubao/yubao_730.htm. (National Computer Virus Emergency Response Center. Early warning about the "Petya" ransomware attack[EB/OL].[2018-02-10]. http://www.cverc.org.cn/yubao/yubao_730.htm.) [3] 中国互联网络信息中心. 2016年中国社交应用用户行为研究报告[R/OL].[2018-02-10]. http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/sqbg/201712/P020180103485975797840.pdf. (China Internet Network Information Center. 2016 China social application user behavior research report[R/OL].[2018-02-10]. http://www.cnnic.net.cn/hlwfzyj/hlwxzbg/sqbg/201712/P020180103485975797840.pdf.) [4] KEPHART J O, WHITE S R. Directed-graph epidemiological models of computer viruses[EB/OL].[2018-02-10]. https://www.worldscientific.com/doi/abs/10.1142/9789812812438_0004. [5] KEPHART J O, WHITE S R. Measuring and modeling computer virus prevalence[C]//Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy. Washington, DC:IEEE Computer Society, 1993:2-15. [6] ZOU C C, GONG W B, TOWSLEY D. Code red worm propagation modeling and analysis[C]//CCS 2002:Proceedings of the 9th ACM Conference on Computer and Communications Security. New York:ACM, 2002:138-147. [7] HAN X, TAN Q L. Dynamical behavior of computer virus on Internet[J]. Applied Mathematics and Computation,2010,64(7):1-7. [8] 冯丽萍, 王鸿斌, 冯素琴. 改进的SIR计算机病毒传播模型[J]. 计算机应用, 2011, 31(7):1891-1893. (FENG L P, WANG H B, FENG S Q. Improved SIR model of computer virus propagation in the network[J]. Journal of Computer Applications, 2011, 31(7):1891-1893.) [9] 冯丽萍, 韩琦, 王鸿斌. 具有变化感染率的僵尸网络传播模型[J]. 计算机科学, 2012, 39(11):51-53. (FENG L P, HAN Q, WANG H B. Botnet propagation model with variable infection rate[J]. Computer Science, 2012, 39(11):51-53.) [10] 冯丽萍, 宋礼鹏, 王鸿斌,等. P2P僵尸网络的传播建模与分析[J]. 计算机应用, 2015, 35(1):68-71. (FENG L P, SONG L P, WANG H B, et al. Propagation modelling and analyzing of peer-to-peer botnet[J]. Journal of Computer Applications, 2015, 35(1):68-71.) [11] FENG L P, SONG L P, ZHAO Q S, et al. Modelling and stability analysis of worm propagation in wireless sensor networks[J]. Mathematical Problems in Engineering, 2015, 2015:Article ID 129598. [12] ZHU Q Y, CEN C. A novel computer virus propagation model under security classification[J]. Discrete Dynamics in Nature and Society, 2017, 2017:Article ID 8609082. [13] 孙文君, 苏旸, 曹镇. 一种非对称信息条件下的APT攻防博弈模型[J]. 计算机应用, 2017, 37(9):2557-2562. (SONG W J, SU Y, CAO Z. Attack-defense game model for advanced persistent threats with asymmetric information[J]. Journal of Computer Applications, 2017, 37(9):2557-2562.) [14] 唐赞玉, 刘虹. 多阶段大规模网络攻击下的网络安全态势评估方法研究[J]. 计算机科学, 2018, 45(1):245-248. (TANG Z Y, LIU H. Study on evolution method of network security situation under multi-stage large-scale network attack[J]. Computer Sceince, 2018, 45(1):245-248.) [15] LIU W P, ZHONG S M. Web malware spread modelling and optimal control strategies[J]. Scientific Report, 2017, 7:Article ID 42308. [16] 马知恩, 周义仓. 传染病动力学的数学建模与研究[M]. 北京:科学出版社, 2004. (MA Z E, ZHOU Y C. Mathematical Modelling and Study on Infectious Disease Dynamics[M]. Beijing:Sceince Press, 2004.) |