Cited By
View all- Rrushi JGhorbani A(2013)A mathematical exploitation of simulated uniform scanning botnet propagation dynamics for early stage detection and managementJournal of Computer Virology and Hacking Techniques10.1007/s11416-013-0190-710:1(29-51)Online publication date: 27-Aug-2013
- TANG YLUO JXIAO BWEI G(2009)Concept, Characteristics and Defending Mechanism of WormsIEICE Transactions on Information and Systems10.1587/transinf.E92.D.799E92-D:5(799-809)Online publication date: 2009
- Dunlop MGates CWong CWang C(2007)SWorDProceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II10.5555/1784707.1784767(1752-1769)Online publication date: 25-Nov-2007
- Show More Cited By