메뉴 건너뛰기




Volumn , Issue , 2003, Pages 19-23

Access for sale: A new class of worm

Author keywords

Cryptography; Economics; Incentives; Security; Threat Modelling; Virus; Worm

Indexed keywords

INCENTIVES; INFECTED SYSTEMS; THREAT MODELLINGS; UNIQUE SYSTEM IDENTIFIER (USID);

EID: 10444238850     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (14)
  • 1
    • 84860927203 scopus 로고    scopus 로고
    • CodeRed II. http://securityresponse.symantec. com/avcenter/venc/data/codered.ii.html.
  • 4
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Butler W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 7
    • 0012054514 scopus 로고    scopus 로고
    • Covert channels in the TCP/IP protocol suite
    • May 5
    • Craig H. Rowland. Covert channels in the TCP/IP protocol suite. First Monday, 2(5), May 5, 1997.
    • (1997) First Monday , vol.2 , Issue.5
    • Rowland, C.H.1
  • 8
    • 30344453851 scopus 로고    scopus 로고
    • How much security is enough to stop a thief? the economics of outsider theft via computer systems and networks
    • January 27-30
    • Stuart E. Schechter and Michael D. Smith. How much security is enough to stop a thief? The economics of outsider theft via computer systems and networks. In Proceedings of the Seventh Financial Cryptography Conference, January 27-30, 2003.
    • (2003) Proceedings of the Seventh Financial Cryptography Conference
    • Schechter, S.E.1    Smith, M.D.2
  • 10
    • 84860936738 scopus 로고    scopus 로고
    • Tanatos.a (bugbear.a). http://www.viruslibrary.com/virusinfo/I-Worm. Tanatos.a(akaBugBear.a).htm.
  • 11
    • 84860936739 scopus 로고    scopus 로고
    • Tanatos.b (bugbear.b). http://www.viruslibrary.com/virusinfo/I-Worm. Tanatos.b(akaBugBear.b).htm.
  • 12
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • August
    • Ken Thompson. Reflections on trusting trust. Communication of the ACM, 27(8):761-763, August 1984.
    • (1984) Communication of the ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1
  • 13


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.