

Fiore, Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies, Computers & Security, 27 (2008), 48-62. Zamboni, A Data Mining Approach for Analysis of Worm Activity Through Automatic Signature Generation, AISec’08 Proceedings of the 1st ACM workshop on Workshop on AISec, (2008), 61-70. Park, Stability analysis of VEISV propagation modeling for network worm attack, Applied Mathematical Modelling, 36 (2012), 2751-2761. Weaver, Inside the slammer worm, IEEE Magaz. Moore, The Spread of the Code-Red Worm, analysis. Banks, Growth and Diffusion Phenomena: Mathematical Frameworks and Applications, Springer Verlag, Berlin (1991). Hausdorff, Set theory (2 ed.), Chelsea Publ., New York (1962) Iliev, A note on the power law logistic model, Proc. Markov, Sigmoid functions: Some Approximation and Modelling Aspects, LAP LAMBERT Academic Publishing, Saarbrucken (2015), ISBN 978-5-7. Markov, Some Techniques for Recurrence Generating of Activation Functions: Some Modeling and Approximation Aspects, LAP LAMBERT Academic Publishing (2017), ISBN: 978-3-33033143-3. Iliev, Extension of Gompertz-type Equation in Modern Science: 240 Anniversary of the birth of B. Rahnev, Some Families of Sigmoid Functions: Applications to Growth Theory, LAP LAMBERT Academic Publishing (2019), ISBN: 978-613-9-45608-6. Kyurkchiev, Some software reliability models: Approximation and modeling aspects, LAP LAMBERT Academic Publishing (2018), ISBN: 978-613-9-82805-0. Kyurkchiev, Nontrivial Models in Debugging Theory: Part 2, LAP LAMBERT Academic Publishing (2018), ISBN: 978-613-9-87794-2.

Brown, Code-Red: a case study on the spread and victims of an Internet worm, Internet Measurement Workshop (IMW), (2002), 273-284. Towsley, Code red worm propagation modeling and analysis, CCS ’02 Proceedings of the 9th ACM conference on Computer and communications security, (2002), 138-147.

Towsley, Worm propagation modeling and analysis under dynamic quarantine defense, Proceedings of the 2003 ACM workshop on Rapid malcode, October 27-27, (2003), Washington, DC, USA. Gong, On the performance of internet worm scanning strategies, Performance Evaluation, 63, No. Gao, The monitoring and early detection of internet worms, IEEE/ACM Transactions on Networking (TON), 13, No. Zou, Honeypot detection in advanced botnet attacks, International Journal of Information and Computer Security, 4, No.
