-
1
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Washington DC, November
-
C. C. Zou, W. Gong, and D.Towsley, "Code Red Worm Propagation Modeling and Analysis", In Proceedings of 9-th ACM Conference on Computer and Communication Security (CCS), Washington DC, November 2002.
-
(2002)
Proceedings of 9-th ACM Conference on Computer and Communication Security (CCS)
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
2
-
-
84861252612
-
-
Slyck news, "http://www.slyck.com".
-
Slyck News
-
-
-
3
-
-
84861238825
-
-
Mydoom, "http//www.f-secure.com/tools".
-
Mydoom
-
-
-
4
-
-
0742303980
-
On the fundamental tradeoffs between routing table size and network diameter in peer-to-peer networks
-
January
-
J. Xu, J., Kumar, A., and X. Yu, "On the Fundamental Tradeoffs between Routing Table Size and Network Diameter in Peer-to-Peer Networks", IEEE Journal on Selected Areas in Communications, vol 22, no 1, pp. 151-163, January 2004.
-
(2004)
IEEE Journal on Selected Areas in Communications
, vol.22
, Issue.1
, pp. 151-163
-
-
Xu, J.1
Kumar, A.2
Yu, X.3
-
5
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Boston, Massachusetts, December
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, "Secure Routing for Structured Peer-to-Peer Overlay Networks", In Proceedings of the 5-th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Boston, Massachusetts, December 2002.
-
(2002)
Proceedings of the 5-th USENIX Symposium on Operating Systems Design and Implementation (OSDI)
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
8
-
-
0042474227
-
Modeling the spread of active worms
-
a Technical Reported K. Kwiat, San Francisco, CA, March
-
Z. S. Chen, L.X. Gao, a Technical Reported K. Kwiat, "Modeling the Spread of Active Worms", to Proceedings of IEEE INFOCOM, San Francisco, CA, March 2003.
-
(2003)
Proceedings of IEEE INFOCOM
-
-
Chen, Z.S.1
Gao, L.X.2
-
9
-
-
14944384392
-
Containment of scanning worms in enterprise networks
-
S. Staniford, "Containment of Scanning Worms in Enterprise Networks", Journal of Computer Security, 2003.
-
(2003)
Journal of Computer Security
-
-
Staniford, S.1
-
10
-
-
85084162258
-
How to own the internet in your spare time
-
San Francisco, CA, August
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in Your Spare Time", In Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, August 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
11
-
-
0001983901
-
A scalable content addressable network
-
San Diego
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A Scalable Content Addressable Network", In Proceedings of ACM SigComm., San Diego, 2001.
-
(2001)
Proceedings of ACM SigComm.
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
12
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Deigo, CA, August
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, "Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications", to Proceedings of ACM SIGCOMM 2001, San Deigo, CA, August 2001.
-
(2001)
Proceedings of ACM SIGCOMM 2001
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
13
-
-
0035474003
-
Search in power-law networks
-
L. A. Adamic, R. M. Lukose, A. R. Puniyani, and B. A. Huberman, "Search in Power-law Networks", Physical Review E, Vol. 64, 2001.
-
(2001)
Physical Review e
, vol.64
-
-
Adamic, L.A.1
Lukose, R.M.2
Puniyani, A.R.3
Huberman, B.A.4
-
15
-
-
0742276097
-
Inside the slammer worm
-
August
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm", IEEE Magazine of Security and Privacy, August 2003.
-
(2003)
IEEE Magazine of Security and Privacy
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
18
-
-
24344475143
-
Analyzing impacts of Peer-to-Peer systems on propagation of active worm attacks
-
The Dept. of Computer Science and Engineering, The Ohio State University
-
W. Yu, C. Boyer, and D. Xuan, "Analyzing Impacts of Peer-to-Peer Systems on Propagation of Active Worm attacks", Technical Report, The Dept. of Computer Science and Engineering, The Ohio State University, 2004.
-
(2004)
Technical Report
-
-
Yu, W.1
Boyer, C.2
Xuan, D.3
|