[1] Hanson D, Kostanecki B, Jagodzinski R, et al. A comparison study of three worm families and their propagation in a network. (2003-12). http://www.securityfocus.com/infocus/1752. [2] 文伟平, 卿斯汉, 蒋建春, 等. 网络蠕虫研究与进展[J]. 软件学报, 2004, 15(8): 1208-1218. Wen Weiping, Qing Sihan, Jiang Jianchun, et al. Research and development of Internet worms[J]. Journal of Software, 2004, 15(8): 1208-1218. [3] Vogt T. Simulating and optimising worm propagation algorithms. (2004-02) . http://web.lemuria.org/security/WormPropagation.pdf. [4] Gordon J. Lessons learned from virus infections .(2004-10). http://www.securityfocus.com/infocus/1804. [5] 丁睿, 云晓春, 包秀国, 等. 主动式网络病毒防治模型[J]. 计算机工程与应用, 2003, 39(27): 174-176. Ding Rui, Yun Xiaochun, Bao Xiuguo, et al. An active network virus immune model[J]. Computer Engineering and Application, 2003, 39(27): 174-176. [6] 彭国军, 张焕国, 傅建明, 等. 以"毒"攻毒不是异想天开[J]. 计算机工程与应用, 2003, 39(29): 159-160. Peng Guojun, Zhang Huanguo, Fu Jianming, et al. About combating virus with "virus"[J]. Computer Engineering and Application, 2003, 39(29): 159-160. [7] 郑辉. 主动Internet蠕虫防治技术——接种疫苗[J]. 计算机工程与应用, 2004, 40(25): 5-8. Zheng Hui. Vaccination: an initiative approach for throttling Internet worm propagation[J]. Computer Engine-ering and Application, 2004, 40(25): 5-8. [8] Rudiger S. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications//1st International Conference on Peer-to-Peer Computing Department of Computer and Information Science Linko Pings Universitet. Sweden: IEEE Press, 2002: 101-102. [9] 谢东亮, 程时端, 阙喜戎. 对等网络的研究与进展[J]. 中兴通讯技术, 2005, 11(2): 58-60. Xie Dongliang, Cheng Shiduan, Que Xirong. Research and development of P2P[J]. ZTE Communications, 2005,11(2):58-60. [10] 黄维雄, 黄铭钧, 陈建利, 等. 一种基于自配置策略的新型peer-to-peer平台系统[J]. 软件学报, 2003, 14(2): 237-246. Huang Weixiong, Huang Mingjun, Chen Jianli, et al. A novel peer-to-peer system based on self-configuration[J]. Journal of Software, 2003, 14(2): 237-246. |