메뉴 건너뛰기




Volumn 37, Issue 6, 2004, Pages

Worm epidemics in high-speed networks

Author keywords

[No Author keywords available]

Indexed keywords

BROADBAND NETWORKS; COMPUTER SOFTWARE; DATA PRIVACY; INTERNET; ONLINE SYSTEMS; QUERY LANGUAGES; SECURITY OF DATA;

EID: 17544396801     PISSN: 00189162     EISSN: None     Source Type: Trade Journal    
DOI: 10.1109/mc.2004.36     Document Type: Article
Times cited : (39)

References (12)
  • 2
    • 2642584593 scopus 로고    scopus 로고
    • Code red' worm exploiting buffer overflow in IIS indexing service DLL
    • 19 July
    • CERT Incident Note IN-2001-08, "'Code Red' Worm Exploiting Buffer Overflow in IIS Indexing Service DLL," 19 July 2001; www.cert.org/incident_notes/IN-2001-08.html.
    • (2001)
  • 3
    • 3042639814 scopus 로고    scopus 로고
    • Code red II': Another worm exploiting buffer overflow in IIS indexing service DLL
    • 6 Aug.
    • CERT Incident Note IN-2001-09, "'Code Red II': Another Worm Exploiting Buffer Overflow in IIS Indexing Service DLL," 6 Aug. 2001; www.cert.org/incident_notes/IN-2001-09.html.
    • (2001)
  • 4
    • 2642519394 scopus 로고    scopus 로고
    • MS-SQL server worm
    • 27 Jan.
    • CERT Advisory CA-2003-04, "MS-SQL Server Worm," 27 Jan. 2003; www.cert.org/advisories/CA-2003-04.html.
    • (2003)
  • 5
    • 0742276097 scopus 로고    scopus 로고
    • Inside the slammer worm
    • D. Moore et al., "Inside the Slammer Worm," IEEE Security & Privacy, vol. 1, no. 4, 2003, pp. 33-39.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.4 , pp. 33-39
    • Moore, D.1
  • 8
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • tech. report, James P. Anderson Co., Fort Washington, Pa.
    • J.P. Anderson, "Computer Security Threat Monitoring and Surveillance," tech. report, James P. Anderson Co., Fort Washington, Pa., 1980.
    • (1980)
    • Anderson, J.P.1
  • 9
    • 0023294428 scopus 로고
    • An intrusion detection model
    • D.E. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng., vol. 13, no. 2, 1987, pp. 222-232.
    • (1987) IEEE Trans. Software Eng. , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 10
    • 3042555397 scopus 로고
    • Tools & techniques: Virus verification and removal
    • Nov.
    • D.M. Chess, "Tools & Techniques: Virus Verification and Removal," Virus Bull., Nov. 1991, pp. 7-11; www.virusbtn.com/magazine/archives/pdf/1991/199111.PDF.
    • (1991) Virus Bull. , pp. 7-11
    • Chess, D.M.1
  • 12
    • 0031258214 scopus 로고    scopus 로고
    • Computer immunology
    • S. Forrest, S.A. Hofmeyr, and A. Somayaji, "Computer Immunology," Comm. ACM, vol. 40, no. 10, 1997, pp. 88-96.
    • (1997) Comm. ACM , vol.40 , Issue.10 , pp. 88-96
    • Forrest, S.1    Hofmeyr, S.A.2    Somayaji, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.