-
2
-
-
0242314805
-
The spread of the sapphire/slammer worm
-
CAIDA, ICSI, Silicon Defense, UC Berkeley EECS and UC San Diego CSE
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The spread of the sapphire/slammer worm," CAIDA, ICSI, Silicon Defense, UC Berkeley EECS and UC San Diego CSE, Tech. Rep., 2003.
-
(2003)
Tech. Rep.
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
4
-
-
14944380936
-
The top speed of flash worms
-
ACM Press
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver, "The top speed of flash worms," in WORM'04: Proceedings of the 2004 ACM workshop on Rapid malcode. ACM Press, 2004, pp. 33-42.
-
(2004)
WORM'04: Proceedings of the 2004 ACM Workshop on Rapid Malcode
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
5
-
-
0033651715
-
A protocol-independent technique for eliminating redundant network traffic
-
ACM Press
-
N. T. Spring and D. Wetherall, "A protocol-independent technique for eliminating redundant network traffic," in Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. ACM Press, 2000, pp. 87-95.
-
(2000)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 87-95
-
-
Spring, N.T.1
Wetherall, D.2
-
6
-
-
0003676885
-
Fingerprinting by random polynomials
-
Center for Research in Computing Technology - Harvard University
-
M. Rabin, "Fingerprinting by random polynomials," Center for Research in Computing Technology - Harvard University, Tech. Rep. 15-81, 1981.
-
(1981)
Tech. Rep.
, vol.15
, Issue.81
-
-
Rabin, M.1
-
7
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
November software available from
-
M. Roesch, "Snort: Lightweight intrusion detection for networks," in Proceedings of USENIX LISA'99, November 1999, (software available from http://www.snort.org/).
-
(1999)
Proceedings of USENIX LISA'99
-
-
Roesch, M.1
-
8
-
-
85043988965
-
Finding similar files in a large file system
-
San Fransisco, CA, USA, Jan.
-
U. Manber, "Finding similar files in a large file system," in Proceedings of the USENIX Winter 1994 Technical Conference, San Fransisco, CA, USA, Jan. 1994, pp. 1-10.
-
(1994)
Proceedings of the USENIX Winter 1994 Technical Conference
, pp. 1-10
-
-
Manber, U.1
-
9
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
10
-
-
84991765629
-
Automated worm fingerprinting
-
Dec.
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting," in Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation, Dec. 2004.
-
(2004)
Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
12
-
-
0036917419
-
Early detection of internet worm activity by metering icmp destination unreachable messages
-
G. Bakos and V. Berk, "Early detection of internet worm activity by metering icmp destination unreachable messages," in Proceedings of the SPIE Aerosense 2002, 2002.
-
(2002)
Proceedings of the SPIE Aerosense 2002
-
-
Bakos, G.1
Berk, V.2
-
16
-
-
85137546697
-
Global intrusion detection in the DOMINO overlay system
-
San Diego, CA, Feb.
-
V. Yegneswaran, P. Barford, and S. Jha, "Global intrusion detection in the DOMINO overlay system," in Proceedings of the 11th Annual Network and Distributed System Security Symposium, San Diego, CA, Feb. 2004.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
|