W. Yu, S. Chellappan, X. Wang, and D. Xuan, “Peer-to-peer
system-based active worm attacks: modeling, analysis and
defense,” Computer Communications, vol. 31, no. 17, pp.
-4017, 2008.
Y. Zhuo, Y. Peng, C. Liu, Y. Liu, and K. Long, “Improving
the attack tolerance of scale-free networks by adding and
hiding edges,” Physica Scripta, vol. 83, p. 025801, 2011.
G. Yong-Wang, S. Yu-Rong, and J. Guo-Ping, “Epidemic
spreading in scale-free networks including the effect of
individual vigilance,” Chinese Physics B, vol. 21, p. 010205,
E. G. Im, J. S. Kim, I. W. Noh, and H. J. Jang, “A hybrid
model for worm simulations in a large network,” In
Proceedings of the Intelligence and Security Informatics,
Springer, pp. 301-306, 2007.
A.-L. Barabasi and R. Albert, “Emergence of scaling in
random networks,” Science, vol. 286, pp. 509-512, 1999.
R. Harrison, the Bitdefender, 2004. Website. [Online].
http://www.bitdefender.com/files/KnowledgeBase/file/Antiv
irus_Defense-in-Depth_Guide
M. Boguna, R. Pastor-Satorras, and A. Vespignani,
“Absence of epidemic threshold in scale-free networks with
degree correlations,” Physical Review Letters, vol. 90, p.
, 2003.
H. Trottier and P. Philippe, “Deterministic modeling of
infectious diseases: theory and methods,” The Internet
Journal of Infectious Diseases, vol. 1, p. 3, 2001.
S. Meloni, A. Arenas, and Y. Moreno, “Traffic-driven
epidemic spreading in finite-size scale-free networks,” In
Proceedings of the National Academy of Sciences, vol. 106,
pp. 16897-16902, 2009.
C. M. Macal and M. J. North, “Tutorial on Agent-based
Modelling and Simulat ion,” Journal of Simulation, vol. 4,
no. 3, pp. 151-162, 2010.
E. G. Im, J. S. Kim, I. W. Noh, and H. J. Jang, “A hybrid
model for worm simulations in a large network,” In
Proceedings of the Intelligence and Security Informatics,
Springer, pp. 301-306, 2007.
S. Hosseini, M. Abdollahi Azgomi, and A. Torkaman
Rahmani, “Malware propagation modeling considering
software diversity and immunization,” Journal of
Computational Science, vol. 13, Elsevier, pp. 49-67, March
S. Hosseini, M. Abdollahi Azgomi, and A. Torkaman
Rahmani, “Agent-based simulation of the dynamics of
malware propagation in scale-free networks,” Simulation:
Transactions of the Society for Modeling and Simulation
International, vol. 92, no. 7, SAGE, pp. 709-722, July 2016.
S. Hosseini and M. Abdollahi Azgomi, “A model for
malware propagation in scale-free networks based on rumor
spreading process,” Computer Networks, vol. 108, Elsevier,
pp. 97-107, Oct. 2016.
A. Barabasi and E. Bonabeau, Scale-Free Networks.
Scientific American, 2003.
E. G. Im, J. T. Seo, D.-S. Kim, Y. H. Song, and Y. Park,
“Hybrid modeling for large-scale worm propagation
simulations,” In Proceedings of the Conference on
Intelligence and Security Informatics, Springer, pp. 572-577,
C. C. Zou, W. Gong, and D. Towsley, “Code red worm
propagation modeling and analysis,” In Proceedings of the
th ACM Conference on Computer and Communications
Security, pp. 138-147, 2002.
C. M. Macal and M. J. North, “Tutorial on Agent-based
Modelling and Simulat ion,” Journal of Simulation, vol. 4,
no. 3, pp. 151-162, 2010.