-
1
-
-
85084162258
-
How to own the internet in your spare time
-
San Francisco, California, USA, Aug.
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in Your Spare Time," in Proceedings of the 11th USENIX Security Symposium (Security '2002), San Francisco, California, USA, Aug. 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium (Security '2002)
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
2
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
San Francisco, California, USA, Apr.
-
nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '2003), San Francisco, California, USA, Apr. 2003.
-
(2003)
nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '2003)
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
5
-
-
0742276097
-
Inside the slammer worm
-
July
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm," IEEE Magazine of Security and Privacy, pp. 33-39, July 2003.
-
(2003)
IEEE Magazine of Security and Privacy
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
6
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, Texas, USA, Jan.
-
th USENIX Security Conference (Security '1998). San Antonio, Texas, USA, Jan. 1998, pp. 63-78.
-
(1998)
th USENIX Security Conference (Security '1998)
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
7
-
-
0024663403
-
With microscope and tweezers: An analysis of the internet virus of november 1988
-
Oakland, California, USA, May
-
M. Eichin and J. Rochlis, "With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988," in Proceedings of the 1989 IEEE Symposium on Security and Privacy. Oakland, California, USA, May 1989, pp. 326-344.
-
(1989)
Proceedings of the 1989 IEEE Symposium on Security and Privacy
, pp. 326-344
-
-
Eichin, M.1
Rochlis, J.2
-
8
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Washington, DC, USA: ACM Press, Nov.
-
th ACM Conference on Computer and Communications Security (CCS '2002). Washington, DC, USA: ACM Press, Nov. 2002, pp. 138-147.
-
(2002)
th ACM Conference on Computer and Communications Security (CCS '2002)
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
9
-
-
16344396406
-
Monitoring and early warning for internet worms
-
Washington D.C., USA: ACM Press, Oct.
-
th ACM Conference on Computer and Communication Security (CCS '2003). Washington D.C., USA: ACM Press, Oct. 2003, pp. 190-199.
-
(2003)
th ACM Conference on Computer and Communication Security (CCS '2003)
, pp. 190-199
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
10
-
-
0042474227
-
Modeling the spread of active worms
-
San Francisco, California, USA, Mar.
-
nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM' 2003), San Francisco, California, USA, Mar. 2003, pp. 1890-1900.
-
(2003)
nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM' 2003)
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
11
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
Marseille, France, Nov.
-
nd Internet Measurement Workshop (IMW '2002), Marseille, France, Nov. 2002, pp. 273-284.
-
(2002)
nd Internet Measurement Workshop (IMW '2002)
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
-
12
-
-
0026156688
-
Directed-graph epidemiological models of computer viruses
-
Oakland, California, USA, May
-
J. O. Kephart and S. R. White, "Directed-Graph Epidemiological Models of Computer Viruses," in Proceedings of the 1991 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 1991, pp. 343-361.
-
(1991)
Proceedings of the 1991 IEEE Symposium on Security and Privacy
, pp. 343-361
-
-
Kephart, J.O.1
White, S.R.2
-
14
-
-
0004118981
-
The NIDES statistical component description and justification
-
Computer Science Laboratory, SRI International, Menlo Park, California, USA
-
H. Javitz and A. Valdes, "The NIDES Statistical Component Description and Justification," Computer Science Laboratory, SRI International, Menlo Park, California, USA, Tech. Rep., 1994.
-
(1994)
Tech. Rep.
-
-
Javitz, H.1
Valdes, A.2
-
16
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. Kemmerer, and P. Porras, "State Transition Analysis: A Rule-based Intrusion Detection Approach," IEEE Trans. Software Eng., vol. 2, pp. 181-199, 1995.
-
(1995)
IEEE Trans. Software Eng.
, vol.2
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
17
-
-
84940110274
-
Detecting computer and network misuse through the Production-Based Expert System Toolset (P-BEST)
-
Oakland, California, USA, May
-
U. Lindqvist and P. Porras, "Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST)," in Proceedings of the 1999 Symposium on Security and Privacy, Oakland, California, USA, May 1999.
-
(1999)
Proceedings of the 1999 Symposium on Security and Privacy
-
-
Lindqvist, U.1
Porras, P.2
-
18
-
-
0025320805
-
An Expectation Maximization (EM) algorithm for the identification and characterization of common sites in unaligned biopolymer sequences
-
C. E. Lawrence and A. A. Reilly, "An Expectation Maximization (EM) Algorithm for the Identification and Characterization of Common Sites in Unaligned Biopolymer Sequences," PROTEINS:Structure, Function and Genetics, vol. 7, pp. 41-51, 1990.
-
(1990)
PROTEINS:Structure, Function and Genetics
, vol.7
, pp. 41-51
-
-
Lawrence, C.E.1
Reilly, A.A.2
-
19
-
-
0027912333
-
Detecting subtle sequence signals: A gibbs sampling strategy for multiple alignment
-
Oct.
-
C. E. Lawrence, S. F. Altschul, M. S. Boguski, J. S. Liu, A. F. Neuwald, and J. C. Wootton, "Detecting Subtle Sequence Signals: A Gibbs Sampling Strategy for Multiple Alignment," Science, vol. 262, pp. 208-214, Oct. 1993.
-
(1993)
Science
, vol.262
, pp. 208-214
-
-
Lawrence, C.E.1
Altschul, S.F.2
Boguski, M.S.3
Liu, J.S.4
Neuwald, A.F.5
Wootton, J.C.6
-
21
-
-
8644246187
-
A virtual honeypot framework
-
Center for Information Technology Integration, University of Michigan, Ann Arbor, Michigan, USA, Tech. Rep. CITI Oct.
-
N. Provos, "A virtual Honeypot Framework," Center for Information Technology Integration, University of Michigan, Ann Arbor, Michigan, USA, Tech. Rep. CITI Technical Report 03-1, Oct. 2003.
-
(2003)
Technical Report
, vol.3
, Issue.1
-
-
Provos, N.1
-
22
-
-
0004216472
-
-
Upper Saddle River, NJ. USA: Prentice Hall, Inc.
-
C. Kaufman, R. Perlman, and M. Speciner. Network Security: Private Communication in a Public World. Upper Saddle River, NJ. USA: Prentice Hall, Inc., 2002.
-
(2002)
Network Security: Private Communication in a Public World
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
24
-
-
0021518209
-
Stochastic relaxation, gibbs distribution, and the bayesian restoration of images
-
S. Geman and D. Geman, "Stochastic Relaxation, Gibbs Distribution, and the Bayesian Restoration of Images," IEEE Trans. Pattern Anal. Machine Intell., vol. 6, pp. 721-741, 1984.
-
(1984)
IEEE Trans. Pattern Anal. Machine Intell.
, vol.6
, pp. 721-741
-
-
Geman, S.1
Geman, D.2
|