-
2
-
-
2642584593
-
Code red' worm exploiting buffer overflow in IIS indexing service DLL
-
19 July
-
CERT Incident Note IN-2001-08, "'Code Red' Worm Exploiting Buffer Overflow in IIS Indexing Service DLL," 19 July 2001; www.cert.org/incident_notes/IN-2001-08.html.
-
(2001)
-
-
-
3
-
-
3042639814
-
Code red II': Another worm exploiting buffer overflow in IIS indexing service DLL
-
6 Aug.
-
CERT Incident Note IN-2001-09, "'Code Red II': Another Worm Exploiting Buffer Overflow in IIS Indexing Service DLL," 6 Aug. 2001; www.cert.org/incident_notes/IN-2001-09.html.
-
(2001)
-
-
-
4
-
-
2642519394
-
MS-SQL server worm
-
27 Jan.
-
CERT Advisory CA-2003-04, "MS-SQL Server Worm," 27 Jan. 2003; www.cert.org/advisories/CA-2003-04.html.
-
(2003)
-
-
-
5
-
-
0742276097
-
Inside the slammer worm
-
D. Moore et al., "Inside the Slammer Worm," IEEE Security & Privacy, vol. 1, no. 4, 2003, pp. 33-39.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
-
6
-
-
85084162258
-
How to own the internet in your spare time
-
Usenix Assoc.
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in Your Spare Time," Proc. 11th Usenix Security Symp., Usenix Assoc., 2002, pp. 149-167.
-
(2002)
Proc. 11th Usenix Security Symp.
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
7
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
IEEE Press
-
D. Moore et al., "Internet Quarantine: Requirements for Containing Self-Propagating Code," Proc. IEEE Infocom 2003, 22nd Ann. Joint Conf. IEEE Computer and Comm. Societies, vol. 3, IEEE Press, 2003, pp. 1901-1910.
-
(2003)
Proc. IEEE Infocom 2003, 22nd Ann. Joint Conf. IEEE Computer and Comm. Societies
, vol.3
, pp. 1901-1910
-
-
Moore, D.1
-
8
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
tech. report, James P. Anderson Co., Fort Washington, Pa.
-
J.P. Anderson, "Computer Security Threat Monitoring and Surveillance," tech. report, James P. Anderson Co., Fort Washington, Pa., 1980.
-
(1980)
-
-
Anderson, J.P.1
-
9
-
-
0023294428
-
An intrusion detection model
-
D.E. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, 1987, pp. 222-232.
-
(1987)
IEEE Trans. Software Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
10
-
-
3042555397
-
Tools & techniques: Virus verification and removal
-
Nov.
-
D.M. Chess, "Tools & Techniques: Virus Verification and Removal," Virus Bull., Nov. 1991, pp. 7-11; www.virusbtn.com/magazine/archives/pdf/1991/199111.PDF.
-
(1991)
Virus Bull.
, pp. 7-11
-
-
Chess, D.M.1
-
12
-
-
0031258214
-
Computer immunology
-
S. Forrest, S.A. Hofmeyr, and A. Somayaji, "Computer Immunology," Comm. ACM, vol. 40, no. 10, 1997, pp. 88-96.
-
(1997)
Comm. ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
|