Xu X L, Wang R C, Xiao F. Malicious code passive propagation model and vaccine distribution model of P2P networks[J]. Journal of Systems Engineering and Electronics, 2010, 21(1):161-167.
徐小龙, 王汝传.一种基于多移动Agent的对等计算动态协作模型[J].计算机学报, 2008, 31(7):1261-1266. Xu Xiaolong, Wang Ruchuan. Dynamic mobile multi-Agent-based collaboration model of peer-to-peer (P2P) computing[J]. Chinese Journal of Computers, 2008, 31(7):1261-1266.(in Chinese)
[6]
张云勇, 刘锦德.移动Agent 技术[M].北京:清华大学出版社, 2003. Zhang Yunyong, Liu Jinde. Mobile Agent technology[M]. Beijing: Tsinghua University Press, 2003.(in Chinese)
[7]
徐小龙, 程春玲, 熊婧夷.基于multi-Agent的云-端计算融合模型的研究[J].通信学报, 2010, 31(10):203-211. Xu Xiaolong, Cheng Chunling, Xiong Jingyi. Conjunct model of cloud & client computing based on multi-Agent[J]. Journal on Communications, 2010, 31 (10):203-211.(in Chinese)
[8]
陈康,郑纬民.云计算:系统实例与研究现状[J].软件学报,2009,20(5):1337-1348. Chen Kang,Zheng Weimin. Cloud computing: system instances and current research[J]. Journal of Software,2009,20(5):1337-1348.(in Chinese)
[9]
Dean J, Ghemawat S. Distributed programming with mapreduce[M]. Sebastopol: O\'Reilly Media, Inc., 2007.
[10]
Kondakci S. Epidemic state analysis of computers under malware attacks[J]. Simulation Modelling Practice and Theory, 2008, 16(5):571-584.
[11]
Rohloff K, Baar T. Deterministic and stochastic models for the detection of random constant scanning worms[J]. ACM Transactions on Modeling and Computer Simulation, 2008, 18(2):1-24.