-
2
-
-
84862209017
-
Address obfuscation: An efficient approach to combat a broad range of memory error exploits
-
S. Bhatkar, D. C. DuVarney, and R. Sekar. Address obfuscation: an efficient approach to combat a broad range of memory error exploits. In USENIX Security Symposium, 2003.
-
(2003)
USENIX Security Symposium
-
-
Bhatkar, S.1
DuVarney, D.C.2
Sekar, R.3
-
5
-
-
84860957337
-
-
Cert advisory ca-2001-22 w32/sircam malicious code
-
Cert advisory ca-2001-22 w32/sircam malicious code. http://www.cert.org/advisories/ca-2001-22.html.
-
-
-
-
16
-
-
21644451801
-
A predator prey approach to the network structure of cyberspace
-
Trinity College Dublin
-
S. P. Gorman, R. G. Kulkarni, L. A. Schintler, and R. R. Stough. A predator prey approach to the network structure of cyberspace. In Proceedings of the winter international synposium on Information and communication technologies, pages 1-6. Trinity College Dublin, 2004.
-
(2004)
Proceedings of the Winter International Synposium on Information and Communication Technologies
, pp. 1-6
-
-
Gorman, S.P.1
Kulkarni, R.G.2
Schintler, L.A.3
Stough, R.R.4
-
17
-
-
21644479268
-
-
O'Reilly and Associates
-
R. Grimes. Malicious Code. O'Reilly and Associates, 2001.
-
(2001)
Malicious Code
-
-
Grimes, R.1
-
18
-
-
29244471799
-
An approach for detecting self-propagating email using anomaly detection
-
A. Gupta and R. Sekar. An approach for detecting self-propagating email using anomaly detection. In Recent Advances in Intrusion Detection, 2003.
-
(2003)
Recent Advances in Intrusion Detection
-
-
Gupta, A.1
Sekar, R.2
-
20
-
-
4243480214
-
On the use of intrusion technologies to distribute non-malicious programs to vulnerable computers
-
University of Aizu
-
A. Kara. On the use of intrusion technologies to distribute non-malicious programs to vulnerable computers. Technical report, University of Aizu, 2001.
-
(2001)
Technical Report
-
-
Kara, A.1
-
22
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
ACM Press
-
M. Liljenstam, D. M. Nicol, V. H. Berk, and R. S. Gray. Simulating realistic network worm traffic for worm warning system design and testing. In Proceedings of the 2003 ACM workshop on Rapid Malcode, pages 24-33. ACM Press, 2003.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 24-33
-
-
Liljenstam, M.1
Nicol, D.M.2
Berk, V.H.3
Gray, R.S.4
-
24
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou. Specification-based anomaly detection: a new approach for detecting network intrusions. In ACM Computer and Communication Security Conference, 2002.
-
(2002)
ACM Computer and Communication Security Conference
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
25
-
-
26444511823
-
Countering network worms through automatch patch generation
-
Columbia University Department of Computer Science
-
S. Sidiroglu and A. D. Keromytis. Countering network worms through automatch patch generation. Technical Report 029-03, Columbia University Department of Computer Science, 2003.
-
(2003)
Technical Report
, vol.29
, Issue.3
-
-
Sidiroglu, S.1
Keromytis, A.D.2
-
28
-
-
0242456135
-
Predators: Good will mobile codes combat against computer viruses
-
H. Toyoizumi and A. Kara. Predators: Good will mobile codes combat against computer viruses. In New Security Paradigms Workshop, 2002.
-
(2002)
New Security Paradigms Workshop
-
-
Toyoizumi, H.1
Kara, A.2
-
29
-
-
4544275741
-
Modeling the effects of timing parameters on virus propagation
-
Y. Wang and C. Wang. Modeling the effects of timing parameters on virus propagation. In ACM Workshop on Rapid Malcode, 2003.
-
(2003)
ACM Workshop on Rapid Malcode
-
-
Wang, Y.1
Wang, C.2
|