1. A. Ganesh, L. Massoulie, and D. Towsley, “The effect of network topology on the spread of epidemics,” in Proceedings of the IEEE INFOCOM, March 2008.
2. Albert-Laszlo Barabasi, Reka Albert, Hawoong Jeong. Scale free characteristics of random networks: the topology of the world-wide web. // Physica A, 281:69–77, 2010.
3. Bailey N. The Mathematical Theory of Infectious Diseases and Its Applications.—New York: Hafner Press, 1975.
4. Benjamin M. Bolker David J. D. Earn, Pejman Rohani and Bryan T. Grenfell.A simple model for complex dynamical transitions in epidemics. Science, 287:667–670, 2008.
5. C. Nachenberg. The Evolving Virus Threat. / Proceedings 23rd NISSC, 2000, Baltimore, Maryland.
6. C. Wang, J.C. Knight, M.C. Elder. On Viral Propagation and the Effect of Immunization. / Proc. of 16th ACM Annual Computer Applications Conference, New Orleans, LA, 2009.
7. C. Wong, S. Bielski, J. M. McCune, and C. Wang, “A study of massmailing worms,” in Proceedings of ACM CCS Workshop on Rapid Malcode (WORM’04), October 2009.
8. C.C. Zou, L. Gao, W. Gong, D. Towsley. Monitoring and Early Warning for Internet Worms. // Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2012. – Washingtion DC, USA. – October 27–30, 2012. – ACM PRESS 2003. – ISBN 1–58113–738–9.
9. C.C. Zou, W. Gong, D. Towsley. Code Red Worm Propagation Modeling and Analysis. // In 9th ACM Symposium on Computer and Communication Security. – Washington DC, USA. – 2009. – P. 138 – 147.
10. Cliff C. Zou, DonTowsley, Weibo Gong. Email Worm Modeling and Defense. // Department of Electrical & Computer Engineering. – P. 409-414. – 2004.
11. D. Bernardes. Relevance of SIR Model for Real-world Spreading Phenomena: Experiments on a Large-scale P2P System. / D. Bernardes, M. Latapy, F. Tarissan.2012 – 8c.
12. D. Moore, C. Shannon, G. M. Voelker, S. Savage. Internet Quarantine: Requirements for Containing Self–Propagating Code. / In IEEE INFOCOM, 2007.
13. D. Moore, C. Shannon, J. Brown. Code-Red: a case study on the spread and victims of an Internet Worm. / In Proc. ACM/USENIX Internet Measurement Workshop, France, November, 2009.Боглаев Ю.П.
14. D. Shinellis. Reliable Identification of Bounded – length Viruses is NP – complete. // IEEE Transactions on Information Theory, 49 (1), 2009, pp. 280 – 284.
15. D. Watts and S. Strogatz, “Collective dynamic of small-world networks”, Nature, vol. 393, 2006.
16. D.J. Daley and J. Gani. Epidemic Modelling: An Introduction. Cambridge University Press, 2012.
17. E. Kenah. Network-based analysis of stochastic SIR epidemic models with random and proportionate mixing / E. Kenah. M. Robins, 2010 – 8c.
18. E.H. Spafford. An Analysis of the Internet Worm. / Proc. European Software Engineering Conference, 2011, Springer – Verlag, pp. 446 – 468.
19. E.H. Spafford. The Internet worm incident. / Proc. European Software Engineering Conference, 1989, Coventry, United Kingdom.
20. L. Hatton. The T – experiments: Errors in Scientific Software. / IEEE Computational Science and Engineering, vol. 4 (2), pp. 27 – 38, 2009.
21. L. Wang, X. Zhao, D. Pei, R. Bush, D. Massey, A. Mankin, S. Wu, L. Zhang. Observation and Analysis of BGP Behavior under Stress. Internet Measurement Workshop, France, 2011.
22. M. Boguna, R. Pastor-Satorras, and A. Vespignani, “Epidemic spreading
23. M. Newman, S. Forrest, and J. Balthrop, “Email networks and the spread of computer viruses,” Phys. Rev. E., vol. 66, no. 035101, 2010.
24. N. Altholz, L. Stevenson. Rootkits for Dummies. John Wiley and Sons Ltd, 2006. ISBN 0-471-91710-9.