Based on the network communication model and the characters of the worm's propagation, this article gives the attack-tree model of worm.
在网络通信模型的基础上,进一步结合蠕虫传播的特征,本文提出了蠕虫的攻击树模型。
In order to describe Internet worm propagation, a novel subsection model of network worm propagation was put forward.
为了更好地表达网络蠕虫传播情况,提出了一种新的蠕虫传播分段模型。
In order to better characterize the propagation of benign worm, this paper adopted a discrete-time model.
为了更好地刻画良性蠕虫的传播过程,采用了离散时间模型。
This paper points out the error of worm-anti-worm model and provides the revising model based on the law of worm propagation.
指出蠕虫对抗蠕虫模型中存在的错误,通过分析蠕虫传播规律,提出修正模型。
An Email flow anomaly detection method based on leaky integrate-and-fire model was presented for detecting flow anomaly in the process of mail worm propagation.
提出了一种基于带泄漏的积分触发测量方法的电予邮件蠕虫异常检测方法,用来检测邮件蠕虫在传播过程中的流量异常。
An Email flow anomaly detection method based on leaky integrate-and-fire model was presented for detecting flow anomaly in the process of mail worm propagation.
提出了一种基于带泄漏的积分触发测量方法的电予邮件蠕虫异常检测方法,用来检测邮件蠕虫在传播过程中的流量异常。
应用推荐