Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
MET: an experimental system for Malicious Email Tracking
Proceedings of the 2002 workshop on New security paradigms
A Network Worm Vaccine Architecture
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Proceedings of the 2003 ACM workshop on Rapid malcode
Modeling the effects of timing parameters on virus propagation
Proceedings of the 2003 ACM workshop on Rapid malcode
Security applications of peer-to-peer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
ACT: attachment chain tracing scheme for email virus detection and control
Proceedings of the 2004 ACM workshop on Rapid malcode
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
Journal of Computer and System Sciences
Worm damage minimization in enterprise networks
International Journal of Human-Computer Studies
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
IEEE Transactions on Dependable and Secure Computing
Epidemic thresholds in real networks
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the 1st international conference on Bio inspired models of network, information and computing systems
International Journal of Wireless and Mobile Computing
On the windfall of friendship: inoculation strategies on social networks
Proceedings of the 9th ACM conference on Electronic commerce
Vigilante: End-to-end containment of Internet worm epidemics
ACM Transactions on Computer Systems (TOCS)
Detecting and blocking P2P botnets through contact tracing chains
International Journal of Internet Protocol Technology
Orion: shortest path estimation for large social graphs
WOSN'10 Proceedings of the 3rd conference on Online social networks
Limiting the spread of misinformation in social networks
Proceedings of the 20th international conference on World wide web
A worm propagation model based on people's email acquaintance profiles
WINE'06 Proceedings of the Second international conference on Internet and Network Economics
NGCE – network graphs for computer epidemiologists
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Analytic model for network viruses
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Key factors influencing worm infection in enterprise networks
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Toward early warning against Internet worms based on critical-sized networks
Security and Communication Networks
Effective immunization of online networks: a self-similar selection approach
Information Technology and Management
On the Windfall and price of friendship: Inoculation strategies on social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Viruses remain a significant threat to modern networked computer systems. Despite the best efforts of those who develop anti-virus systems, new viruses and new types of virus that are not dealt with by existing protection schemes appear regularly. In addition, the rate at which a virus can spread has risen dramatically with the increase in connectivity. Defenses against infections by known viruses rely at present on immunization yet, for a variety of reasons, immunization is often only effective on a subset of the nodes in a network and many nodes remain unprotected. Little is known about either the way in which a viral infection proceeds in general or the way that immunization affects the infection process. We present the results of a simulation study of the way in which virus infections propagate through certain types of network and of the effect that partial immunization has on the infection. The key result is that relatively low levels of immunization can slow an infection significantly.