Modeling active worm propagation on the P2P network

被引:0
|
作者
机构
[1] Wu, Guozheng
[2] 1,Feng, Chaosheng
[3] Qin, Zhiguang
关键词
11;
D O I
10.3772/j.issn.1006-6748.2012.04.012
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] A new distributed P2P network architecture basing on active network technology
    Huang, DY
    Huang, JH
    Li, ZP
    Mang, AL
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (01): : 35 - 38
  • [42] PROACTIVE WORM PREVENTION BASED ON P2P NETWORKS
    Wu, Kai-Gui
    Feng, Yong
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (3B): : 205 - 210
  • [43] P2P Service Performance Analysis of Unstructured P2P Network
    Mao, JunPeng
    Cui, YanLi
    Huang, JianHua
    Zhang, JianBiao
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 50 - +
  • [44] The Bitcoin P2P Network
    Donet Donet, Joan Antoni
    Perez-Sola, Cristina
    Herrera-Joancomarti, Jordi
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY: FC 2014 WORKSHOPS, BITCOIN AND WAHC 2014, 2014, 8438 : 87 - 102
  • [45] Modeling and analyzing the spread of active worms based on P2P systems
    Li, Tao
    Guan, Zhihong
    Wu, Xianyong
    COMPUTERS & SECURITY, 2007, 26 (03) : 213 - 218
  • [46] Active distribution network operation management integrated with P2P trading
    Ruan, Hebin
    Gao, Hongjun
    Gooi, Hoay Beng
    Liu, Junyong
    APPLIED ENERGY, 2022, 323
  • [47] Model of proactive malicious code propagation and vaccine contradiction in P2P network
    Xu, Xiao-Long
    Yang, Geng
    Xiong, Jing-Yi
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2013, 33 (06): : 605 - 611
  • [48] Your Propagation Model of File-sharing System in P2P Network
    Wu, Yanpeng
    Liu, Hao
    Lei, Juncheng
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1633 - 1636
  • [49] Model for files-sharing P2P worm and simulation
    Yang, Ding
    Zhang, Yu-Qing
    Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 130 - 135
  • [50] Hybrid Trust Model for Worm Mitigation in P2P Networks
    Amine Rguibi, Mohamed
    Moussa, Najem
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 43 : 21 - 36