1. W. Yu, S. Chellappan, X. Wang, and D. Xuan, “Peer-to-peer
  2. system-based active worm attacks: modeling, analysis and
  3. defense,” Computer Communications, vol. 31, no. 17, pp.
  4. -4017, 2008.
  5. Y. Zhuo, Y. Peng, C. Liu, Y. Liu, and K. Long, “Improving
  6. the attack tolerance of scale-free networks by adding and
  7. hiding edges,” Physica Scripta, vol. 83, p. 025801, 2011.
  8. G. Yong-Wang, S. Yu-Rong, and J. Guo-Ping, “Epidemic
  9. spreading in scale-free networks including the effect of
  10. individual vigilance,” Chinese Physics B, vol. 21, p. 010205,
  11. E. G. Im, J. S. Kim, I. W. Noh, and H. J. Jang, “A hybrid
  12. model for worm simulations in a large network,” In
  13. Proceedings of the Intelligence and Security Informatics,
  14. Springer, pp. 301-306, 2007.
  15. A.-L. Barabasi and R. Albert, “Emergence of scaling in
  16. random networks,” Science, vol. 286, pp. 509-512, 1999.
  17. R. Harrison, the Bitdefender, 2004. Website. [Online].
  18. http://www.bitdefender.com/files/KnowledgeBase/file/Antiv
  19. irus_Defense-in-Depth_Guide
  20. M. Boguna, R. Pastor-Satorras, and A. Vespignani,
  21. “Absence of epidemic threshold in scale-free networks with
  22. degree correlations,” Physical Review Letters, vol. 90, p.
  23. , 2003.
  24. H. Trottier and P. Philippe, “Deterministic modeling of
  25. infectious diseases: theory and methods,” The Internet
  26. Journal of Infectious Diseases, vol. 1, p. 3, 2001.
  27. S. Meloni, A. Arenas, and Y. Moreno, “Traffic-driven
  28. epidemic spreading in finite-size scale-free networks,” In
  29. Proceedings of the National Academy of Sciences, vol. 106,
  30. pp. 16897-16902, 2009.
  31. C. M. Macal and M. J. North, “Tutorial on Agent-based
  32. Modelling and Simulat ion,” Journal of Simulation, vol. 4,
  33. no. 3, pp. 151-162, 2010.
  34. E. G. Im, J. S. Kim, I. W. Noh, and H. J. Jang, “A hybrid
  35. model for worm simulations in a large network,” In
  36. Proceedings of the Intelligence and Security Informatics,
  37. Springer, pp. 301-306, 2007.
  38. S. Hosseini, M. Abdollahi Azgomi, and A. Torkaman
  39. Rahmani, “Malware propagation modeling considering
  40. software diversity and immunization,” Journal of
  41. Computational Science, vol. 13, Elsevier, pp. 49-67, March
  42. S. Hosseini, M. Abdollahi Azgomi, and A. Torkaman
  43. Rahmani, “Agent-based simulation of the dynamics of
  44. malware propagation in scale-free networks,” Simulation:
  45. Transactions of the Society for Modeling and Simulation
  46. International, vol. 92, no. 7, SAGE, pp. 709-722, July 2016.
  47. S. Hosseini and M. Abdollahi Azgomi, “A model for
  48. malware propagation in scale-free networks based on rumor
  49. spreading process,” Computer Networks, vol. 108, Elsevier,
  50. pp. 97-107, Oct. 2016.
  51. A. Barabasi and E. Bonabeau, Scale-Free Networks.
  52. Scientific American, 2003.
  53. E. G. Im, J. T. Seo, D.-S. Kim, Y. H. Song, and Y. Park,
  54. “Hybrid modeling for large-scale worm propagation
  55. simulations,” In Proceedings of the Conference on
  56. Intelligence and Security Informatics, Springer, pp. 572-577,
  57. C. C. Zou, W. Gong, and D. Towsley, “Code red worm
  58. propagation modeling and analysis,” In Proceedings of the
  59. th ACM Conference on Computer and Communications
  60. Security, pp. 138-147, 2002.
  61. C. M. Macal and M. J. North, “Tutorial on Agent-based
  62. Modelling and Simulat ion,” Journal of Simulation, vol. 4,
  63. no. 3, pp. 151-162, 2010.