Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
Monitoring and early warning for internet worms
Proceedings of the 10th ACM conference on Computer and communications security
Simulating realistic network worm traffic for worm warning system design and testing
Proceedings of the 2003 ACM workshop on Rapid malcode
Worm propagation modeling and analysis under dynamic quarantine defense
Proceedings of the 2003 ACM workshop on Rapid malcode
Modeling the effects of timing parameters on virus propagation
Proceedings of the 2003 ACM workshop on Rapid malcode
ACT: attachment chain tracing scheme for email virus detection and control
Proceedings of the 2004 ACM workshop on Rapid malcode
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Proceedings of the 2004 ACM workshop on Rapid malcode
Modeling Viral Spread by Random Scanning and Its Relationship with the Epidemiological Model
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Distributed Worm Simulation with a Realistic Internet Model
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
On the spread of viruses on the internet
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
The monitoring and early detection of internet worms
IEEE/ACM Transactions on Networking (TON)
Graph mining: Laws, generators, and algorithms
ACM Computing Surveys (CSUR)
Internet instability and disturbance: goal or menace?
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
On the performance of internet worm scanning strategies
Performance Evaluation
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
Journal of Computer and System Sciences
Worm damage minimization in enterprise networks
International Journal of Human-Computer Studies
WitMeMo '06 Proceedings of the second international workshop on Wireless traffic measurements and modeling
Effective worm detection for various scan techniques
Journal of Computer Security
Performance modeling of epidemic routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
IEEE Transactions on Dependable and Secure Computing
Epidemic thresholds in real networks
ACM Transactions on Information and System Security (TISSEC)
International Journal of Security and Networks
On the windfall of friendship: inoculation strategies on social networks
Proceedings of the 9th ACM conference on Electronic commerce
Modeling host-based detection and active worm containment
Proceedings of the 11th communications and networking simulation symposium
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Computer Communications
ACM Transactions on Sensor Networks (TOSN)
Heterogeneous Protection in Regular and Complete Bi-partite Networks
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Towards an analytic model of epidemic spreading in heterogeneous systems
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Orientation accuracy analysis of multiple satellite networks using epidemic model
International Journal of Systems Science
Biologically inspired defenses against computer viruses
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
Towards controlling virus propagation in information systems with point-to-group information sharing
Decision Support Systems
AHP-based measurement and comparison of harms of computer virus
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Worm propagation modeling based on two-factor model
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
ACM Transactions on Management Information Systems (TMIS)
Virus propagation on time-varying networks: theory and immunization algorithms
ECML PKDD'10 Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part III
Limiting the spread of misinformation in social networks
Proceedings of the 20th international conference on World wide web
On detecting active worms with varying scan rate
Computer Communications
Epidemic spread in mobile Ad Hoc networks: determining the tipping point
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I
NGCE – network graphs for computer epidemiologists
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
An anti-worm with balanced tree based spreading strategy
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
Analytic model for network viruses
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Key factors influencing worm infection in enterprise networks
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Winner takes all: competing viruses or ideas on fair-play networks
Proceedings of the 21st international conference on World Wide Web
Push- and pull-based epidemic spreading in networks: Thresholds and deeper insights
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
What you see predicts what you get—lightweight agent-based malware detection
Security and Communication Networks
Maximum damage malware attack in mobile wireless networks
IEEE/ACM Transactions on Networking (TON)
Adaptive Epidemic Dynamics in Networks: Thresholds and Control
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
On the Windfall and price of friendship: Inoculation strategies on social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
In an effort to understand the current extent of the computer virus problem and predict its future course, we have conducted a statistical analysis of computer virus incidents in a large, stable sample population of PCs and developed new epidemiological models of computervirus spread. Only a small fraction of all known viruses have appeared in real incidents, partly because many viruses are below the theoretical epidemic threshold. The observed sub-exponential rate of viral spread can be explained by models of localized software exchange. A surprisingly small fraction of machines in well-protected business environments are infected. This may be explained by a model in which, once a machine is found to be infected, neighboring machines are checked for viruses. This "kill signal" idea could be implemented in networks to greatly reduce the threat of viral spread. A similar principle has been incorporated into a cost- effective anti-virus policy for organizations which works quite well in practice.