메뉴 건너뛰기




Volumn , Issue , 2004, Pages 501-506

Analyzing the performance of internet worm attack approaches

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET WORMS; PEER-TO-PEER (P2P); SYSTEM MODELS; WORM PROPAGATION;

EID: 17444377569     PISSN: 10952055     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCCN.2004.1401717     Document Type: Conference Paper
Times cited : (10)

References (18)
  • 3
    • 17444423889 scopus 로고    scopus 로고
    • T. Liston http://www.hackbusters.net/LaBrea.
    • Liston, T.1
  • 4
    • 14844308379 scopus 로고    scopus 로고
    • Containment of scanning worms in enterprise Networks
    • S. Staniford, Containment of Scanning Worms in Enterprise Networks. in the Journal of Computer Security, 2004.
    • (2004) Journal of Computer Security
    • Staniford, S.1
  • 5
    • 17444391128 scopus 로고    scopus 로고
    • Slyck news, http://www.slyck.com.
    • Slyck News
  • 6
    • 17444432086 scopus 로고    scopus 로고
    • F-Secure Inc. http://www.f-secure.com/v-descs.
  • 11
    • 0742303980 scopus 로고    scopus 로고
    • On the fundamental tradeoffs between routing table size and network diameter in peer-to-peer networks
    • January
    • J. Xu, J., Kumar, A., and X. Yu, On the Fundamental Tradeoffs between Routing Table Size and Network Diameter in Peer-to-Peer Networks. IEEE Journal on Selected Areas in Communications, vol 22, no 1, pp. 151-163, January 2004.
    • (2004) IEEE Journal on Selected Areas in Communications , vol.22 , Issue.1 , pp. 151-163
    • Xu, J.1    Kumar, A.2    Yu, X.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.