-
2
-
-
85081770459
-
Internet motion sensor: A distributed blackhole monitoring system
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson. Internet motion sensor: A distributed blackhole monitoring system. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
3
-
-
0042474227
-
Modeling the spread of active worms
-
Z. Chen, L. Gao, and K. Kwiat. Modeling the Spread of Active Worms. In Proceedings of IEEE INFOCOMM, volume 3, pages 1890 – 1900, 2003.
-
(2003)
Proceedings of IEEE INFOCOMM
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
4
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
October
-
Evan Cooke, Michael Bailey, Z. Morley Mao, David Watson, Farnam Jahanian, and Danny McPherson. Toward Understanding Distributed Blackhole Placement. In Proceedings of ACM Workshop on Rapid Malcode WORM04, pages 54–64, October 2004.
-
(2004)
Proceedings of ACM Workshop on Rapid Malcode WORM04
, pp. 54-64
-
-
Cooke, E.1
Bailey, M.2
Morley Mao, Z.3
Watson, D.4
Jahanian, F.5
McPherson, D.6
-
5
-
-
8744281125
-
-
August
-
Symantec Corporation. W32.Blaster.Worm. Available at: http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html, August 2003.
-
(2003)
W32.Blaster.Worm
-
-
-
7
-
-
85077553130
-
Eeye digital security
-
“eEye Digital Security”. Code Red-II Worm Analysis. http://www.eeye.com/html/Research/Advisories/ AL20010804.html.
-
Code Red-II Worm Analysis
-
-
-
8
-
-
85077554189
-
Eeye digital security
-
“eEye Digital Security”. Code Red Worm. http://www.eeye.com/html/Research/Advisories/AL20010717.html.
-
Code Red Worm
-
-
-
10
-
-
0034486891
-
The mathematics of infectious diseases
-
H.W. Hethcote. The Mathematics of Infectious Diseases. In SIAM Reviews, Vol. 42 No. 4, 2000.
-
(2000)
SIAM Reviews
, vol.42
, Issue.4
-
-
Hethcote, H.W.1
-
13
-
-
28444495656
-
Network telescopes: Observing small or distant security events
-
Invited Talk, August
-
th USENIX Security Symposium, Invited Talk, August 2002.
-
(2002)
th USENIX Security Symposium
-
-
Moore, D.1
-
14
-
-
0141762461
-
Code-ReD: A case study on the spread and victims of an internet worm
-
November
-
David Moore, Collen Shannon, and Jeffry Brown. Code-Red: A case study on the spread and victims of an Internet worm. In Proceedings of Internet Measurement Workshop, pages 273–284, November 2002.
-
(2002)
Proceedings of Internet Measurement Workshop
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
16
-
-
85077632890
-
-
Routeviews- University of Oregon. http://www.routeviews.org
-
Routeviews- University of Oregon. http://www.routeviews.org/.
-
-
-
-
19
-
-
14944380936
-
The top speed of flash worms
-
October
-
Stuart Staniford, David Moore, Vern Paxson, and Nick Weaver. The Top Speed of Flash Worms. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), pages 33–42, October 2004.
-
(2004)
Proceedings of the ACM Workshop on Rapid Malcode (WORM)
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
20
-
-
85077627860
-
-
Colleen Shannon and David Moore, Support for the Witty Worm dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, DHS, NSF, CAIDA, DARPA, Digital Envoy, and CAIDA Members
-
The CAIDA Dataset on the Witty Worm - March 19-24, 2004, Colleen Shannon and David Moore, http://www.caida.org/passive/witty/. Support for the Witty Worm dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, DHS, NSF, CAIDA, DARPA, Digital Envoy, and CAIDA Members.
-
The CAIDA Dataset on the Witty Worm - March 19-24, 2004
-
-
-
23
-
-
16344396406
-
Monitoring and early warning of internet worms
-
October
-
C. Zou, L. Gao, W. Gong, and D. Towsley. Monitoring and Early Warning of Internet Worms. In Proceedings of ACM Conference on Computer and Communications Security (CCS), pages 190–199, October 2003.
-
(2003)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
, pp. 190-199
-
-
Zou, C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
24
-
-
8644236108
-
Routing worm: A fast, selective attack worm based on IP address information
-
November
-
Cliff Zou, D. Towsley, Weibo Gong, and Songlin Cai. Routing Worm: A Fast, Selective Attack Worm based on IP Address Information. UMass ECE Technical Report TR-03-CSE-06, November 2003.
-
(2003)
UMass ECE Technical Report TR-03-CSE-06
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
Cai, S.4
|