Communications of the ACM
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
A Biological Approach to the Development of Computer Autoimmune Systems
ISMIS '02 Proceedings of the 13th International Symposium on Foundations of Intelligent Systems
MET: an experimental system for Malicious Email Tracking
Proceedings of the 2002 workshop on New security paradigms
Predators: good will mobile codes combat against computer viruses
Proceedings of the 2002 workshop on New security paradigms
Monitoring and early warning for internet worms
Proceedings of the 10th ACM conference on Computer and communications security
Proceedings of the 2003 ACM workshop on Rapid malcode
Worm propagation modeling and analysis under dynamic quarantine defense
Proceedings of the 2003 ACM workshop on Rapid malcode
Security applications of peer-to-peer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Proceedings of the 2004 ACM workshop on Rapid malcode
Worm propagation modeling and analysis based on quarantine
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
The monitoring and early detection of internet worms
IEEE/ACM Transactions on Networking (TON)
On the performance of internet worm scanning strategies
Performance Evaluation
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
Journal of Computer and System Sciences
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
IEEE Transactions on Dependable and Secure Computing
Detecting diseases in farm animals with embedded system
CEA'07 Proceedings of the 2007 annual Conference on International Conference on Computer Engineering and Applications
On the windfall of friendship: inoculation strategies on social networks
Proceedings of the 9th ACM conference on Electronic commerce
ACM Transactions on Sensor Networks (TOSN)
EpiNet: a simulation framework to study the spread of malware in wireless networks
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
Proceedings of the 2008 workshop on New security paradigms
Biologically inspired defenses against computer viruses
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
Towards controlling virus propagation in information systems with point-to-group information sharing
Decision Support Systems
Worm propagation modeling based on two-factor model
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Control strategy based on worms spread in complex network
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
The spread of interacting agents in scale-free networks
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Journal of Intelligent Information Systems
A mobile web service middleware and its performance study
Transactions on large-scale data- and knowledge-centered systems III
NGCE – network graphs for computer epidemiologists
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
An anti-worm with balanced tree based spreading strategy
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
International Journal of Information Management: The Journal for Information Professionals
Analysis and control stratagems of flash disk virus dynamic propagation model
Security and Communication Networks
Pulse quarantine strategy of internet worm propagation: Modeling and analysis
Computers and Electrical Engineering
What you see predicts what you get—lightweight agent-based malware detection
Security and Communication Networks
Incident-centered information security: Managing a strategic balance between prevention and response
Information and Management
On the Windfall and price of friendship: Inoculation strategies on social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.10 |
Analogies with biological disease with topological considerations added, which show that the spread of computer viruses can be contained, and the resulting epidemiological model are examined. The findings of computer virus epidemiology show that computer viruses are far less rife than many have claimed, that many fail to thrive, that even successful viruses spread at nowhere near the exponential rate that some have claimed, and that centralized reporting and response within an organization is an extremely effective defense. A case study is presented, and some steps for companies to take are suggested