-
1
-
-
84055170041
-
Helminthiasis of the Internet
-
Internet Engineering Task Force, Dec.
-
J. F. Reynolds, "Helminthiasis of the Internet," RFC 1135, Internet Engineering Task Force, Dec. 1989.
-
(1989)
RFC
, vol.1135
-
-
Reynolds, J.F.1
-
6
-
-
4344627335
-
The spread of the witty worm
-
July/August
-
Colleen Shannon and David Moore, "The Spread of the Witty Worm," IEEE Security & Privacy, vol. 2, no. 4, pp. 46-50, July/August 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
7
-
-
0003216023
-
Internet protocol, version 6 (IPv6) specification
-
Internet Engineering Task Force, Dec.
-
S. E. Deering and R. Binden, "Internet Protocol, Version 6 (IPv6) Specification," RFC 2460, Internet Engineering Task Force, Dec. 1998.
-
(1998)
RFC
, vol.2460
-
-
Deering, S.E.1
Binden, R.2
-
8
-
-
0003545819
-
The internet worm program: An analysis
-
Purdue University
-
Eugene H. Spafford, "The Internet Worm Program: An Analysis," Tech. Rep. CSD-TR-823, Purdue University, 1988.
-
(1988)
Tech. Rep. CSD-TR-823
-
-
Spafford, E.H.1
-
13
-
-
0023294949
-
Computer viruses: Theory and practice
-
February
-
F. Cohen, "Computer Viruses: Theory and Practice," Computers & Security, vol. 6, pp. 22-35, February 1987.
-
(1987)
Computers & Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
15
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
January
-
th USENIX Security Symposium, January 1998.
-
(1998)
th USENIX Security Symposium
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Hinton, H.4
Walpole, J.5
Bakke, P.6
Beattie, S.7
Grier, A.8
Wagle, P.9
Zhang, Q.10
-
16
-
-
25644452721
-
Model cehcking one million lines of C code
-
February
-
Hao Chen, Drew Dean, and David Wagner, "Model Cehcking One Million Lines of C Code," in Proceedings of the Network and Distributed System Security (NDSS) Symposium, February 2004, pp. 171-185.
-
(2004)
Proceedings of the Network and Distributed System Security (NDSS) Symposium
, pp. 171-185
-
-
Chen, H.1
Dean, D.2
Wagner, D.3
-
20
-
-
0041534274
-
A snapshot of global internet worm activity
-
Arbor Networks, November
-
D. Song, R. Malan, and R. Stone, "A Snapshot of Global Internet Worm Activity," Tech. Rep., Arbor Networks, November 2001.
-
(2001)
Tech. Rep.
-
-
Song, D.1
Malan, R.2
Stone, R.3
-
23
-
-
4243483478
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
HP Laboratories Bristol
-
M. Williamson, "Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code," Tech. Rep. HPL-2002-172, HP Laboratories Bristol, 2002.
-
(2002)
Tech. Rep.
, vol.HPL-2002-172
-
-
Williamson, M.1
-
25
-
-
14944376454
-
A study of mass-mailing worms
-
October
-
C. Wong, S. Bielski, J. M. McCune, and C. Wang, "A Study of Mass-Mailing Worms," in Proceedings of the ACM Workshop on Rapid Malcode (WORM), October 2004, pp. 1-10.
-
(2004)
Proceedings of the ACM Workshop on Rapid Malcode (WORM)
, pp. 1-10
-
-
Wong, C.1
Bielski, S.2
McCune, J.M.3
Wang, C.4
-
26
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
April
-
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code," in Proceedings of the IEEE Infocom Conference, April 2003.
-
(2003)
Proceedings of the IEEE Infocom Conference
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
28
-
-
0030736223
-
Computer virus - Coevolution
-
C. Nachenberg, "Computer Virus - Coevolution," Communications of the ACM, vol. 50, no. 1, pp. 46-51, 1997.
-
(1997)
Communications of the ACM
, vol.50
, Issue.1
, pp. 46-51
-
-
Nachenberg, C.1
|