-
1
-
-
0033281215
-
The base-rate fallacy and its implications for the difficulty of intrusion detection
-
November
-
S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of ACM CCS'1999, November 1999.
-
(1999)
Proceedings of ACM CCS'1999
-
-
Axelsson, S.1
-
2
-
-
84860964239
-
-
Bittorrent
-
Bittorrent. http://bitconjurer.org/BitTorrent/.
-
-
-
-
3
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
13, July
-
B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of ACM, 13, July 1970.
-
(1970)
Communications of ACM
-
-
Bloom, B.1
-
5
-
-
28044442580
-
Honeystat: Localworm detection using honeypots
-
September
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, and H. Owen. Honeystat: Localworm detection using honeypots. In Proceedings of RAID'2004, September 2004.
-
(2004)
Proceedings of RAID'2004
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
8
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
Oct
-
M. Liljenstam, D. Nicol, V. Berk, and R. Gray. Simulating realistic network worm traffic for worm warning system design and testing. In Proceedings of ACM WORM'2003, Oct 2003.
-
(2003)
Proceedings of ACM WORM'2003
-
-
Liljenstam, M.1
Nicol, D.2
Berk, V.3
Gray, R.4
-
9
-
-
14944381614
-
-
D. Moore. Network telescopes. http://www.caida.org/outreach/presentations/2002/usenix_sec/, 2002.
-
(2002)
Network Telescopes
-
-
Moore, D.1
-
12
-
-
21644468510
-
Worm detection using local networks
-
College of Computing, Georgia Tech, Feb
-
X. Qin, D. Dagon, G. Gu, W. Lee, M. Warfield, and P. Allor. Worm detection using local networks. Technical report, College of Computing, Georgia Tech, Feb 2004.
-
(2004)
Technical Report
-
-
Qin, X.1
Dagon, D.2
Gu, G.3
Lee, W.4
Warfield, M.5
Allor, P.6
-
19
-
-
4243483478
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
HP Laboratories Bristol, June
-
M. M. Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. Technical Report HPL-2002-172, HP Laboratories Bristol, June 2002.
-
(2002)
Technical Report
, vol.HPL-2002-172
-
-
Williamson, M.M.1
-
20
-
-
84892612179
-
An efficient architecture and algorithm for detecting worms with various scan techniques
-
February
-
J. Wu, S. Vangala, L. Gao, and K. Kwiat. An efficient architecture and algorithm for detecting worms with various scan techniques. In Proceedings of NDSS'2004, February 2004.
-
(2004)
Proceedings of NDSS'2004
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
-
21
-
-
8644236108
-
Routing worm: A fast, slective attack worm based on ip address information
-
Umass ECE Dept., Novemeber
-
C. Zou, D. Towsley, W. Gong, and S. Cai. Routing worm: A fast, slective attack worm based on ip address information. Technical Report TR-03-CSE-06, Umass ECE Dept., Novemeber 2004.
-
(2004)
Technical Report
, vol.TR-03-CSE-06
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
24
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defence
-
October
-
C. C. Zou, W. Gong, and D. Towsley. Worm propagation modeling and analysis under dynamic quarantine defence. In Proceedings of ACM WORM'2003, October 2003.
-
(2003)
Proceedings of ACM WORM'2003
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
|