[1] 文伟平,卿斯汉,蒋建春,王业君.网络蠕虫研究与进展[J].软件学报,2004,15(8):1208-1219. [2] Gao S, Ma J, Chen Z, et al. Ranking the spreading ability of nodes in complex networks based on local structure[J]. Physica A Statistical Mechanics & Its Applications, 2014, 403(6): 130-147. [3] 宋明秋,王琳,邵双.基于攻击传播性的分布式网络信任模型[J].运筹与管理,2017,26(7):125-131. [4] Moreno Y, Gomez J B, Pacheco A F. Epidemic incidence in correlated complex networks[J]. Physical Review E, 2003, 68(3): 035101. [5] 张发,李璐,宣慧玉.传染病传播模型综述[J].系统工程理论与实践,2011,31(9):1736-1744. [6] 钱权,萧超杰,张瑞.结构化对等网络中P2P僵尸网络传播模型[J].软件学报,2012,23(12):3161-3174. [7] Peng M, He X, Huang J, Dong T, Modeling computer virus and its dynamics[J]. Mathematical Problems in Engineering, 2013, Article ID 842614, 5 pages. [8] 吉敏. IPv6环境下的蠕虫传播研究[D].北京邮电大学,2015. [9] Strogatz S H. Exploring complex networks[J]. Nature, 2001, 410: 268-276. [10] Pastor-Satorras R, Vespignani A. Epidemic spreading in scale-free networks[J]. Physical Review Letters, 2001, 86(14): 3200-3203. [11] 张灿.异构网络蠕虫传播机制研究[D].华北电力大学,2015. [12] Guerra B, Gómez-Gardees J. Annealed and mean-field formulations of disease dynamics on static and adaptive networks[J]. Physical review. E, Statistical, nonlinear, and soft matter physics, 2010, 82(3 Pt 2):035101. [13] 张伟,王汝传,李鹏.基于云安全环境的蠕虫传播模型[J].通信学报,2012,33(4):17-24. [14] 顾海俊,蒋国平,夏玲玲.基于状态概率转移的SIRS病毒传播模型及其临界值分析[J].计算机科学,2016,43(S1):64-67. [15] Zhou T, Liu J G, Bai W J, et al. Behaviors of susceptible-infected epidemics on scale free networks with identical infectivity[J]. Physical Review E, 2006, 74(5):056109. [16] Chakrabarti D, Wang Y, Wang C, et al. Epidemic thresholds in real networks[J]. ACM Transactions on Information and System Security(TISSEC), 2008, 10(4): 1. [17] Smilkov D, Kocarev L. Influence of transition probabilities in the birth and death Markov process in the epidemic model[J]. Mathematical and Computer Modelling, 2012, 55(3): 810-815. [18] 宋玉蓉,蒋国平.具有非均匀传输和抗攻击差异的网络病毒传播模型[J].物理学报,2010,59(11):7546-7551. [19] Li X, Cao L, Cao G. Epidemic prevalence on random mobile dynamical networks: individual heterogeneity and correlation[J]. The European Physical Journal B, 2010, 75(3): 319-326. [20] 叶云,徐锡山,贾焰,齐治昌.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996. [21] 罗宁.基于因果关联攻击场景重构的方法研究[D].华中科技大学,2005. [22] 经小川,胡昌振,谭惠民.基于关联序列分析的协同攻击检测方法研究[J].武汉理工大学学报,2004(6):78-81. [23] 邢栩嘉,林闯,蒋屹新.计算机系统脆弱性评估研究[J].计算机学报,2004(1):1-11. [24] Jafarabadi A, Azgomi M A. A stochastic epidemiological model for the propagation of active worms considering the dynamicity of network topology[J]. Peer-to-Peer Networking and Applications, 2015, 8(6): 1008-1022. |