-
1
-
-
84890863223
-
A cooperative immunization system for an untrusting internet
-
Sydney, Australia, September
-
K. Anagnostakis, M. Greenwald, S. Ioannidis, A. Keromytis, and D. Li, "A Cooperative Immunization System for an Untrusting Internet, " in Proceedings of the 11th IEEE International Conference on Networks (ICON), Sydney, Australia, September 2003.
-
(2003)
Proceedings of the 11th IEEE International Conference on Networks (ICON)
-
-
Anagnostakis, K.1
Greenwald, M.2
Ioannidis, S.3
Keromytis, A.4
Li, D.5
-
2
-
-
4243137229
-
Cyber defense technology networking and evaluation
-
R. Bajcsy and T. Benzel et. al, "Cyber defense technology networking and evaluation," Communications of the ACM, Vol 4, No 3, 2004.
-
(2004)
Communications of the ACM
, vol.4
, Issue.3
-
-
Bajcsy, R.1
Benzel, T.2
-
3
-
-
18844462726
-
Epidemic profiles and defense of scale-free networks
-
Washington, DC, October
-
L. Briesemeister, P. Lincoln, and P. Porras, "Epidemic Profiles and Defense of Scale-Free Networks," in Proceedings of the ACM Workshop on Rapid Malcode, Washington, DC, October 2003.
-
(2003)
Proceedings of the ACM Workshop on Rapid Malcode
-
-
Briesemeister, L.1
Lincoln, P.2
Porras, P.3
-
4
-
-
4544245846
-
Self-securing network interfaces: What, why, and how
-
CMU-CS-02-144, August
-
G. Ganger, G. Economou, and S. Bielski, "Self-Securing Network Interfaces: What, Why, and How," Carnegie Mellon University Technical Report, CMU-CS-02-144, August 2002.
-
(2002)
Carnegie Mellon University Technical Report
-
-
Ganger, G.1
Economou, G.2
Bielski, S.3
-
5
-
-
14944386248
-
-
George Mason University
-
S. Gorman, R. Kulkarni, L. Schintler, and R. Stough, "Least Effort Strategies for Cybersecurity," George Mason University, 2003.
-
(2003)
Least Effort Strategies for Cybersecurity
-
-
Gorman, S.1
Kulkarni, R.2
Schintler, L.3
Stough, R.4
-
7
-
-
0141762461
-
Code red: A case study on the spread and victims of an internet worm
-
Marseille, France, November
-
D. Moore, C. Shannon, and J. Brown, "Code Red: A Case Study on the Spread and Victims of an Internet Worm," in Proceedings of the Internet Measures Workshop, Marseille, France, November 2002.
-
(2002)
Proceedings of the Internet Measures Workshop
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
9
-
-
14944366145
-
Models of active worm defense
-
Urbana-Champaign, Illinois, January
-
D. Nicol, "Models of Active Worm Defense," in Proceedings of the Measurement, Modeling and Analysis of the Internet (IMA Workshop'04), Urbana-Champaign, Illinois, January 2004.
-
(2004)
Proceedings of the Measurement, Modeling and Analysis of the Internet (IMA Workshop'04)
-
-
Nicol, D.1
-
12
-
-
14944384392
-
Containment of scanning worms in enterprise networks
-
S. Staniford, "Containment of Scanning Worms in Enterprise Networks," in Journal of Computer Security, 2003.
-
(2003)
Journal of Computer Security
-
-
Staniford, S.1
-
13
-
-
0242456135
-
Predators: Good mobile code combat against computer viruses
-
Virginia Beach, Virginia, September
-
H. Toyozumi and A. Kara, "Predators: Good Mobile Code Combat against Computer Viruses", New Security Paradigms Workshop, Virginia Beach, Virginia, September 2002.
-
(2002)
New Security Paradigms Workshop
-
-
Toyozumi, H.1
Kara, A.2
-
14
-
-
14944378230
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
February
-
H. Wang, C. Guo, D. Simon, and A. Zugenmaier, "Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits," Microsoft Research, Technical Report MSR-TR-2003-81, February 2004.
-
(2004)
Microsoft Research, Technical Report
, vol.MSR-TR-2003-81
-
-
Wang, H.1
Guo, C.2
Simon, D.3
Zugenmaier, A.4
-
15
-
-
12244311689
-
A taxonomy of computer worms
-
Washington, DC, October
-
N. Weaver, Vern Paxon, S. Staniford, and R. Cunningham, "A Taxonomy of Computer Worms," in Proceedings of the Workshop on Rapid Malcode, Washington, DC, October 2003.
-
(2003)
Proceedings of the Workshop on Rapid Malcode
-
-
Weaver, N.1
Paxon, V.2
Staniford, S.3
Cunningham, R.4
-
17
-
-
4544303625
-
Dynamic quarantine of internet worms
-
Florence, Italy, June
-
C. Wong, C. Wang, D. Song, S. Bielski, G.R. Granger, "Dynamic Quarantine of Internet Worms," in Proceedings of the International Conference on Dependable Systems and Networks (DSN-2004), Florence, Italy, June 2004.
-
(2004)
Proceedings of the International Conference on Dependable Systems and Networks (DSN-2004)
-
-
Wong, C.1
Wang, C.2
Song, D.3
Bielski, S.4
Granger, G.R.5
-
18
-
-
14344250902
-
A firewall network system for worm defense in enterprise networks
-
University of Massachusetts, Amherst, February
-
C.C. Zou, D. Towsley, and W. Gong, "A Firewall Network System for Worm Defense in Enterprise Networks," University of Massachusetts, Amherst, Technical Report TR-04-CSE-01, February, 2004.
-
(2004)
Technical Report
, vol.TR-04-CSE-01
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
|