{"title":"恶意软件的传播研究与防范","authors":"Y. Jiang, Wang Li","doi":"10.1109/ETCS.2010.96","DOIUrl":null,"url":null,"abstract":"Internet security issues increasingly prominent, the spread of malicious software and is particularly serious outbreak. Paper analyzed the malicious software brought about by the danger of malicious software, introduced the definition and classification, describes the characteristics of their behavior, focused on the spread of malicious software models, including the SI model, SIS model and the SIR model, the model adopted by the master The spread of malicious software and route of transmission, and then studied the response to stop the malicious software, including the pre-defense, and defense in the matter after the repair, and Practice has proved that this method is very effective to guard against malicious software.","PeriodicalId":193276,"journal":{"name":"2010 Second International Workshop on Education Technology and Computer Science","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"The Spread of Malicious Software Research and Prevention\",\"authors\":\"Y. Jiang, Wang Li\",\"doi\":\"10.1109/ETCS.2010.96\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet security issues increasingly prominent, the spread of malicious software and is particularly serious outbreak. Paper analyzed the malicious software brought about by the danger of malicious software, introduced the definition and classification, describes the characteristics of their behavior, focused on the spread of malicious software models, including the SI model, SIS model and the SIR model, the model adopted by the master The spread of malicious software and route of transmission, and then studied the response to stop the malicious software, including the pre-defense, and defense in the matter after the repair, and Practice has proved that this method is very effective to guard against malicious software.\",\"PeriodicalId\":193276,\"journal\":{\"name\":\"2010 Second International Workshop on Education Technology and Computer Science\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Workshop on Education Technology and Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ETCS.2010.96\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Workshop on Education Technology and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ETCS.2010.96","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The Spread of Malicious Software Research and Prevention
Internet security issues increasingly prominent, the spread of malicious software and is particularly serious outbreak. Paper analyzed the malicious software brought about by the danger of malicious software, introduced the definition and classification, describes the characteristics of their behavior, focused on the spread of malicious software models, including the SI model, SIS model and the SIR model, the model adopted by the master The spread of malicious software and route of transmission, and then studied the response to stop the malicious software, including the pre-defense, and defense in the matter after the repair, and Practice has proved that this method is very effective to guard against malicious software.