参考文献/References:
[ 1] HypponenM. Malware goesmobile[ J]. ScientificA-merican, 2006, 295( 5): 70-77.
[ 2] Kleinberg J. Thewireless epidemic[ J]. Nature, 2007, 449( 20): 287-288.
[ 3] NekoveeM. Wormepidemics inad-hocnetworks[ J]. NewJournal of Physics, 2007, 9( a): 189- 202.
[ 4] ZhengHu,i Li Dong, Gao Zhuo. Anepidemicmodel ofmobilephone virus[ A]. 1st International Sympos-i umonPervasiveComputing andApplicationsProceed-ings( SPCA2006) [ C]. Urumch,i Xinjiang, China: XIFE, 534- 538.
[ 5] 夏玮, 李朝晖,陈增强, 等. 带有预防接种的手机蓝牙病毒传播模型[ J]. 天津大学学报, 2007, 40 ( 12): 1426-1430.
[ 6] RhodesCJ, NekoveeM. The opportunistic transmis-sionof wirelessworms betweenmobile devices[ J]. PhysicaA, StatisticalMechanicsandItsApplications, 2008, 387( 27): 6837- 6844.
[ 7] RFC4861-2007, Neighbor discovery for IP version6 ( IPv6) [ S].
[ 8] RFC4862-2007, IPv6 stateless address autoconfigura-tion[ S].
[ 9] RhodesCJ, AndersonRM. Contact rate calculation for a basic epidemicmodel[ J]. Mathematical Biosc-i ences, 2008, 216( 1): 56-62.
[ 10] ZouCC, GongW, TowsleyD. Code redwormpropa-gationmodeling and analysis[ A]. Proc of the 9th ACMSymponComputer andCommunicationSecurity [C]. Washington, USA: ACM, 2002. 138- 147.