[1] Kephart J O, White S R. Directed Graph Epidemiological Model of Computer Viruses[C]//Proceedings of IEEE Symposium on Security and Privacy. [S. l.]: IEEE Press, 1991: 343-359. [2] Hethcote H W. The Mathematics of Infectious Diseases[J]. SIAM Review, 2000, 42(4): 599-653.[3] Xia Chengyi, Liu Zhongxin, Chen Zengqiang, et al. Epidemic Spreading Behavior in Local-world Evolving Network[J]. Progress in Natural Science, 2008, 18(6): 763-768.[4] Zou C C, Towsley D, Gong Weibo. E-mail Worm Modeling and Defense[C]//Proceedings of the 13th International Conference on Computer Communications and Networks. Chicago, USA: [s. n.], 2004: 11-13.[5] Zou C C, Towsley D, Gong Weibo. Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms[J]. IEEE Trans. on Dependable Secure and Computing, 2007, 5(2): 105-118.[6] 邓清华, 金 聪, 刘 俊. 邮件病毒传播模型及其分析[J]. 计算机工程与设计, 2009, 30(12): 2865-2867.[7] Fan W, Yeung K H. Online Social Networks——Paradise of Computer Viruses[J]. Physica A, 2011, 390(2): 189-197.[8] Mislove A, Marcon M, Gummadi K P, et al. Measurement and Analysis of Online Social Networks[C]//Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement. [S. l.]: ACM Press, 2007.[9] Fu Feng, Liu Lianghuan, Wang Long. Empirical Analysis of Online Social Networks in the Age of Web 2.0[J]. Physica A, 2008, 387(2/3): 675-684.[10] Shioda S, Nakamura K. Scale-free Property of Directed Networks with Two Intrinsic Node Weights[J]. Physica A, 2009, 388(15): 3249-3260. |