1 |
NASEER M, RUSDI J F, SHANONO N M, et al. Malware detection: issues and challenges[J]. Journal of Physics: Conference Series, 2021, 1807(1): No.012011. 10.1088/1742-6596/1807/1/012011
|
2 |
冯朝胜,秦志光,劳伦斯·库珀特,等. P2P文件共享网络中被动蠕虫传播建模与分析[J]. 电子科技大学学报, 2009,38 (2):262-265, 273. 10.3969/j.issn.1001-0548.2009.02.25
|
|
FENG C S, QIN Z G, CUTHBET L, et al. Propagation modeling and analysis of passive worms in peer-to-peer file-sharing networks[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(2): 262-265, 273. 10.3969/j.issn.1001-0548.2009.02.25
|
3 |
MOHAMMED A A, KADHIM D J. Analysis of threats and security issues evaluation in mobile P2P networks[J]. International Journal of Electrical and Computer Engineering, 2020, 10(6): 6435-6445. 10.11591/ijece.v10i6.pp6435-6445
|
4 |
DEHKORDI M J, SADEGHIYAN B. An effective node-removal method against P2P botnets[J]. Computer Networks, 2020, 182: No.107488. 10.1016/j.comnet.2020.107488
|
5 |
廖军. 基于P2P的恶意代码检测及防御技术研究[D]. 成都:电子科技大学, 2014:27-30.
|
|
LIAO J. Research of P2P-based malicious code detection and protection technology[D]. Chengdu: University of Electronic Science and Technology of China, 2014:27-30.
|
6 |
关欣,朱冰,陈震,等. 基于特征码病毒扫描技术的研究[J]. 信息网络安全, 2013, 13(4):8-13. 10.3969/j.issn.1671-1122.2013.04.003
|
|
GUAN X, ZHU B, CHEN Z, et al. Study on virus signatures based on matching in virus-detecting technologies[J]. Netinfo Security, 2013, 13(4): 8-13. 10.3969/j.issn.1671-1122.2013.04.003
|
7 |
高宇,莫有权,李庆荣,等. 基于分布式结构的网络恶意代码智能分析系统[J]. 计算机应用与软件, 2010, 27(5):121-124. 10.3969/j.issn.1000-386X.2010.05.036
|
|
GAO Y, MO Y Q, LI Q R, et al. Distributed structure-based intelligent network malicious code analysing system[J]. Computer Applications and Software, 2010, 27(5): 121-124. 10.3969/j.issn.1000-386X.2010.05.036
|
8 |
王平,方滨兴,云晓春,等. 基于用户习惯的蠕虫的早期发现[J]. 通信学报, 2006, 27(2):56-65. 10.3321/j.issn:1000-436X.2006.02.009
|
|
WANG P, FANG B X, YUN X C, et al. User-habit based early warning of worm[J]. Journal on Communication, 2006, 27(2): 56-65. 10.3321/j.issn:1000-436X.2006.02.009
|
9 |
吴国政,秦志光. 基于节点自杀的对等网络蠕虫防治方法[J]. 电子科技大学学报, 2012, 41(1):125-130. 10.3969/j.issn.1001-0548.2012.01.024
|
|
WU G Z, QIN Z G. Suicide based P2P worms defensive approach[J]. Journal of University of Electronic Science and Technology of China, 2012,41 (1): 125-130. 10.3969/j.issn.1001-0548.2012.01.024
|
10 |
谢承灏,董健全. P2P文件共享系统中的恶意代码防治策略[J]. 计算机工程与应用, 2006, 42(24):152-156. 10.3321/j.issn:1002-8331.2006.24.046
|
|
XIE C H, DONG J Q. A malware defence strategy in file-sharing system[J]. Computer Engineering and Applications, 2006, 42(24): 152-156. 10.3321/j.issn:1002-8331.2006.24.046
|
11 |
YANG R, WANG B H, REN J, et al. Epidemic spreading on heterogeneous networks with identical infectivity[J]. Physics Letters A, 2006, 364(3/4): 189-193. 10.1016/j.physleta.2006.12.021
|
12 |
HETHCOTE H W. The mathematics of infectious diseases[J]. SIAM Review, 2000, 42(4): 599-653. 10.1137/s0036144500371907
|
13 |
徐文雄,张仲华. 具有预防接种免疫力的双线性传染率SIR流行病模型全局稳定性[J]. 大学数学, 2003, 19(6):76-80. 10.3969/j.issn.1672-1454.2003.06.019
|
|
XU W X, ZHANG Z H. Global stability of SIR epidemiological model with vaccinal immunity and bilinear incidence rates[J]. College Mathematics, 2003, 19(6): 76-80. 10.3969/j.issn.1672-1454.2003.06.019
|
14 |
REN J G, YANG X F, ZHU Q Y, et al. A novel computer virus model and its dynamics[J]. Nonlinear Analysis: Real World Applications, 2012, 13(1): 376-384. 10.1016/j.nonrwa.2011.07.048
|
15 |
付伟,王静,潘晓中,等. 动态同质网络上的SIR谣言传播模型[J]. 计算机应用, 2018, 38(7):1951-1955, 1966.
|
|
FU W, WANG J, PAN X Z, et al. SIR rumor propagation model on dynamic homogeneity network[J]. Journal of Computer Applications, 2018, 38(7): 1951-1955, 1966.
|
16 |
JACKSON M, CHEN-CHARPENTIER B M. Modeling plant virus propagation with delays[J]. Journal of Computational and Applied Mathematics, 2017, 309: 611-621. 10.1016/j.cam.2016.04.024
|
17 |
LA SALLE J P. The Stability of Dynamical Systems[M]. Philadelphia, PA: Society for Industrial and Applied Mathematics, 1976: 7-34. 10.1137/1.9781611970432
|
18 |
CLARK R N. The Routh-Hurwitz stability criterion, revisited[J]. IEEE Control Systems Magazine, 1992, 12(3): 119-120. 10.1109/37.165530
|
19 |
LAVRETSKY E, WISE K A. Lyapunov stability of motion[M]// Robust and Adaptive Control: With Aerospace Applications. London: Springer, 2013: 225-261. 10.1007/978-1-4471-4396-3_8
|
20 |
XIAO X, FU P, DOU C S, et al. Design and analysis of SEIQR worm propagation model in mobile Internet[J]. Communications in Nonlinear Science and Numerical Simulation, 2017, 43: 341-350. 10.1016/j.cnsns.2016.07.012
|