-
3
-
-
2142654522
-
-
Groove Networks, 2002. http://www.groove.net.
-
(2002)
Groove Networks
-
-
-
6
-
-
2142815286
-
CERT Advisory CA-2001-19 "Code Red" Worm Exploiting Buffer Overflow
-
July
-
CERT. CERT Advisory CA-2001-19 "Code Red" Worm Exploiting Buffer Overflow In: IIS Indexing Service DLL, July 2001. Available at http://www.cert.org/ advisories/CA-2001-19.html.
-
(2001)
IIS Indexing Service DLL
-
-
-
10
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
Las Vegas, Nevada, December
-
Williamson, M.M. Throttling viruses: Restricting propagation to defeat malicious mobile code. In: Proceedings of ACSAC Security Conference, Las Vegas, Nevada, December 2002; pp 61-68. Available from http://www.hpl.hp.com/ techreports/2002/HPL-2002-172.html.
-
(2002)
Proceedings of ACSAC Security Conference
, pp. 61-68
-
-
Williamson, M.M.1
-
11
-
-
84944731126
-
Design, implementation and test of an email virus throttle
-
Las Vegas, Nevada, December
-
Williamson, M.M. Design, implementation and test of an email virus throttle. In: Proceedings of ACSAC Security Conference, Las Vegas, Nevada, December 2003. Available from http://www.hpl.hp.com/techreports/2003/HPL-2003- 118.html.
-
(2003)
Proceedings of ACSAC Security Conference
-
-
Williamson, M.M.1
-
12
-
-
0024984013
-
A network security monitor
-
IEEE Press, May
-
Heberlein, L.; Dias, G.; Levitt, K.; Mukherjee, B.; Wood, J.; Wolber, D. A network security monitor. In: Proceedings of the IEEE Symposium on Security and Privacy, IEEE Press, May 1990; pp 296-304. http://seclab.cs.ucdavis.edu/ papers/pdfs/th-gd-90.pdf.
-
(1990)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 296-304
-
-
Heberlein, L.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
14
-
-
84860603040
-
Implementing and testing a virus throttle
-
Washington DC, August 2003. USENIX
-
Twycross, J.; Williamson, M.M. Implementing and testing a virus throttle. In: Proceedings 12th USENIX Security Symposium, 2003; pages 285-294, Washington DC, August 2003. USENIX. Available from http://www.hpl.hp.com/techreports/2003/ HPL-2003-103.html.
-
(2003)
Proceedings 12th USENIX Security Symposium
, pp. 285-294
-
-
Twycross, J.1
Williamson, M.M.2
-
15
-
-
0042536297
-
-
September
-
CERT. CERT Advisory CA-2001-26 Nimda Worm, September 2001. Available at http://www.cert.org/advisories/CA-2001-26.html.
-
(2001)
CERT Advisory CA-2001-26 Nimda Worm
-
-
-
16
-
-
2142825223
-
Behavior blocking repels new viruses
-
Messmer, E. Behavior blocking repels new viruses. Network World Fusion News January 2002. Available from http://www.nwfusion.com/news/2002/ 0128antivirus.html.
-
Network World Fusion News January 2002
-
-
Messmer, E.1
-
19
-
-
84904888755
-
Attacking DDoS at the source
-
Paris, France, November
-
Mirković, J.; Prier, G.; Reiher, P. Attacking DDoS at the source. In: Proceedings of International Conference on Network Protocols (ICNP), Paris, France, November 2002; pp 312-321.
-
(2002)
Proceedings of International Conference on Network Protocols (ICNP)
, pp. 312-321
-
-
Mirković, J.1
Prier, G.2
Reiher, P.3
-
20
-
-
85084164032
-
Automated response using system-call delays
-
Denver, CO, August
-
Somayaji, A.; Forrest, S. Automated response using system-call delays. In: Proceedings of the 9th USENIX Security Symposium, Denver, CO, August 2000; pp 185-197.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 185-197
-
-
Somayaji, A.1
Forrest, S.2
-
22
-
-
35048898955
-
An epidemiological model of virus spreading and cleanup
-
Toronto, Canada, September Virus Bulletin
-
Williamson, M.M.; Léveillé, J. An epidemiological model of virus spreading and cleanup. In: Proceedings Virus Bulletin Conference, Toronto, Canada, September 2003. Virus Bulletin.
-
(2003)
Proceedings Virus Bulletin Conference
-
-
Williamson, M.M.1
Léveillé, J.2
|