共 10 条
[1]
Bailey N.T.J., 1975, MATH THEORY INFECT D
[2]
Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
[3]
Dech G., 1971, RUKOVODSTVO K PRAKTI
[4]
Gatsenko O.Yu, 2001, ZASHCHITA INFORM OSN, P180
[5]
Kalinin M. O, 2010, BEZOPASNOST KOMPYUTE
[6]
Kephart J. O., 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.91CH2986-8), P343, DOI 10.1109/RISP.1991.130801
[7]
Kotenko I.V., 2007, T S PETERB I INF ROS
[8]
Stochastic behavior of Random Constant Scanning worms
[J].
ICCCN 2005: 14th International Conference on Computer Communications and Networks, Proceedings,
2005,
:339-344
[9]
WILLIAMSON MM, 2003, EPIDEMIOLOGICAL MODE
[10]
Zegzhda P. D., 2012, UPRAVLENIE BEZOPASNO