메뉴 건너뛰기




Volumn , Issue , 2003, Pages 42-50

Worm anatomy and model

Author keywords

Network Modeling; Network Security; Turing Machine; Worm

Indexed keywords

ALGORITHMS; BANDWIDTH; COMPUTER NETWORKS; COMPUTER SIMULATION; COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; INTERNET; LIFE CYCLE; MATHEMATICAL MODELS; SECURITY OF DATA; TURING MACHINES;

EID: 18844371168     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/948187.948196     Document Type: Conference Paper
Times cited : (42)

References (15)
  • 1
    • 84860932432 scopus 로고    scopus 로고
    • http://www.cert.org/body/advisories/CA200126_FA200126.ht ml
  • 2
    • 0023294949 scopus 로고
    • Computer viruses: Theory and experiments
    • January
    • Fred Cohen, "Computer Viruses: Theory and Experiments", Computers and Security, Volume 6, Number 1, January, 1987, pp 22-35.
    • (1987) Computers and Security , vol.6 , Issue.1 , pp. 22-35
    • Cohen, F.1
  • 3
    • 18844395284 scopus 로고
    • A formal definition of computer worms and some related results
    • November
    • Fred Cohen, "A Formal Definition of Computer Worms and Some Related Results", Computers and Security, Volume 11, Number 7, November, 1992, pp 641-652.
    • (1992) Computers and Security , vol.11 , Issue.7 , pp. 641-652
    • Cohen, F.1
  • 6
    • 85084161252 scopus 로고    scopus 로고
    • NetKuang - A multi-host configuration vulnerability checker
    • San Jose, California, July
    • Dan Zerkle, Karl Levitt, "NetKuang - A Multi-Host Configuration Vulnerability Checker", In 6th USENIX Security Symposium, San Jose, California, July 1996.
    • (1996) 6th USENIX Security Symposium
    • Zerkle, D.1    Levitt, K.2
  • 7
    • 0038687692 scopus 로고    scopus 로고
    • Scalable, graph-based network vulnerability analysis
    • November 18-22, Washington, DC
    • Paul Ammann, Duminda Wijesekera, Saket Kaushik, "Scalable, Graph-based Network Vulnerability Analysis", ACM CCS 2002, November 18-22, 2002, Washington, DC.
    • (2002) ACM CCS 2002
    • Ammann, P.1    Wijesekera, D.2    Kaushik, S.3
  • 12
    • 0038349210 scopus 로고    scopus 로고
    • Code red worm propagation modeling and analysis
    • November 18-22, Washington, DC
    • Cliff Changchun Zou, Weibo Gong, Don Towsley, "Code Red Worm Propagation Modeling and Analysis", ACM CCS 2002, November 18-22, 2002, Washington, DC.
    • (2002) ACM CCS 2002
    • Cliff Changchun Zou1    Gong, W.2    Towsley, D.3
  • 13
    • 84949487368 scopus 로고    scopus 로고
    • On computer viral infection and the effect of immunization
    • Chenxi Wang, John Knight, Matthew Elder, "On Computer Viral Infection and the Effect of Immunization", ACSAC 2000, pp 246-25.
    • ACSAC 2000 , pp. 246-325
    • Wang, C.1    Knight, J.2    Elder, M.3
  • 14
    • 84860936497 scopus 로고    scopus 로고
    • http://www.sophos.com/virusinfo/analyses/w32nachia.html
  • 15
    • 84860939587 scopus 로고    scopus 로고
    • http://www.whitehats.com/library/worms/lion/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.