..............page:1077-1081
..............page:1082-1086
..............page:1087-1090
..............page:1091-1097
..............page:1098-1103+1109
Defensemodel for the P2P botnet based on fuzzy logic
LI Ya;WANG Feng;ZHU Hai;Institute of Information Systems;BeijingJiaotong University;School of Computer Science and Technology;Zhoukou Normal University;Key Laboratory for Process Control & Efficiency of Ministry of Education;Xi’an Jiaotong University;
..............page:1104-1109
..............page:1110-1113
..............page:1114-1118+1127
..............page:1119-1127
..............page:1128-1131
..............page:1132-1138
..............page:1139-1144+1154
..............page:1145-1149
..............page:1150-1154
..............page:1155-1159+1165
..............page:1160-1165
..............page:1166-1171
..............page:1172-1177
..............page:1178-1183
..............page:1184-1191
..............page:1192-1201
..............page:1202-1218
..............page:1219-1220