-
2
-
-
0242314805
-
The spread of the Sapphire/Slammer worm
-
CAIDA
-
D. Moore, V. Paxon, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The spread of the Sapphire/Slammer worm," technical report, CAIDA, 2003.
-
(2003)
Technical Report
-
-
Moore, D.1
Paxon, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
4
-
-
84862042746
-
Microsoft SQL Sapphire worm analysis
-
eEye Digital Security
-
"Microsoft SQL Sapphire worm analysis," technical report, eEye Digital Security, 2003. Available at http://www.eeye.com/html/Research/Flash/AL20030125.html.
-
(2003)
Technical Report
-
-
-
5
-
-
0003232377
-
RFC 792: Internet Control Message Protocol
-
J. Postel, "RFC 792: Internet Control Message Protocol," Request for Comments 792, 1981.
-
(1981)
Request for Comments
, vol.792
-
-
Postel, J.1
-
6
-
-
1642498572
-
RFC 1812: Requirements for IP version 4 routers
-
F. Baker, "RFC 1812: Requirements for IP version 4 routers," Request for Comments 1812, 1995.
-
(1995)
Request for Comments
, vol.1812
-
-
Baker, F.1
-
7
-
-
0018689571
-
An algorithm for tracking multiple targets
-
December
-
D. B. Reid, "An algorithm for tracking multiple targets," IEEE Transactions on Automatic Control AC-24, pp. 843-854, December 1979.
-
(1979)
IEEE Transactions on Automatic Control
, vol.AC-24
, pp. 843-854
-
-
Reid, D.B.1
-
9
-
-
84880028758
-
A mixed abstraction level simulation model of large-scale Internet worm infestations
-
October
-
M. Liljenstam, Y. Yuan, B. Premore, and D. Nicol, "A mixed abstraction level simulation model of large-scale Internet worm infestations," in Proceedings of Tenth IEEE/ACM International Conference on Modeling, Analysis and Simulation of Computer and Communications Systems (MASCOTS 2002), October 2002.
-
(2002)
Proceedings of Tenth IEEE/ACM International Conference on Modeling, Analysis and Simulation of Computer and Communications Systems (MASCOTS 2002)
-
-
Liljenstam, M.1
Yuan, Y.2
Premore, B.3
Nicol, D.4
-
11
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
April To appear
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), April 2003. To appear.
-
(2003)
Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003)
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
12
-
-
0142095474
-
Using artificial anomalies to detect known and unknown network intrusions
-
November
-
W. Fan, M. Miller, S. Stolfo, W. Lee, and P. Chan, "Using artificial anomalies to detect known and unknown network intrusions," in Proceedings of the First International Conference on Data Mining, November 2001.
-
(2001)
Proceedings of the First International Conference on Data Mining
-
-
Fan, W.1
Miller, M.2
Stolfo, S.3
Lee, W.4
Chan, P.5
-
13
-
-
0036088611
-
Analysis of distributed intrusion detection systems using Bayesian methods
-
April
-
D. J. Burroughs, L. F. Wilson, and G. V. Cybenko, "Analysis of distributed intrusion detection systems using Bayesian methods," in Proceedings of the 21st IEEE International Performance, Computing and Communications Conference (IPCCC 2002), April 2002.
-
(2002)
Proceedings of the 21st IEEE International Performance, Computing and Communications Conference (IPCCC 2002)
-
-
Burroughs, D.J.1
Wilson, L.F.2
Cybenko, G.V.3
-
14
-
-
0013264090
-
Proactive intrusion detection and distributed denial of service attacks - A case study in security management
-
June
-
J. B. D. Cabrera, L. Lewis, X. Qin, W. Lee, and R. K. Mehra, "Proactive intrusion detection and distributed denial of service attacks - a case study in security management," Journal of Network and Systems Management 10, June 2002.
-
(2002)
Journal of Network and Systems Management
, vol.10
-
-
Cabrera, J.B.D.1
Lewis, L.2
Qin, X.3
Lee, W.4
Mehra, R.K.5
-
16
-
-
84944028123
-
The Internet worm incident
-
Springer-Verlag, September
-
E. Spafford, "The Internet worm incident," in Proceedings of the Second European Software Engineering Conference (ESEC '89), Lecture Notes in Computer Science 87, pp. 446-468, Springer-Verlag, September 1989.
-
(1989)
Proceedings of the Second European Software Engineering Conference (ESEC '89), Lecture Notes in Computer Science
, vol.87
, pp. 446-468
-
-
Spafford, E.1
-
17
-
-
0004204717
-
The design of GrIDS: A graph-based intrusion detection system
-
Department of Computer Science at UC Davis
-
S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, J. Rowe, S. Staniford-Chen, R. Yip, and D. Zerkle, "The design of GrIDS: A graph-based intrusion detection system," Technical Report CSE-99-2, Department of Computer Science at UC Davis, 1999.
-
(1999)
Technical Report
, vol.CSE-99-2
-
-
Cheung, S.1
Crawford, R.2
Dilger, M.3
Frank, J.4
Hoagland, J.5
Levitt, K.6
Rowe, J.7
Staniford-Chen, S.8
Yip, R.9
Zerkle, D.10
-
18
-
-
16244379346
-
Analysis of the spread of the July infestation of the Code Red worm
-
Silicon Defense
-
S. Staniford, "Analysis of the spread of the July infestation of the Code Red worm," technical report, Silicon Defense, 2001.
-
(2001)
Technical Report
-
-
Staniford, S.1
-
20
-
-
0002606747
-
A biologically inspired immune system for computers
-
J. O. Kephart, "A biologically inspired immune system for computers," Artificial Life IV, 1994.
-
(1994)
Artificial Life IV
-
-
Kephart, J.O.1
|