Introduction - If you have any usage issues, please Google them yourself
Detecting Network Intrusions via Sampling_A Game Theoretic Approach
Internet Quarantine_Requirements for Containing Self-Propagating Code
Modeling Malware Spreading Dynamics
Modeling the Spread of Active Worms