-
1
-
-
85081770459
-
Internet motion sensor: A distributed blackhole monitoring system
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson. Internet motion sensor: A distributed blackhole monitoring system. In Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2005.
-
(2005)
Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
2
-
-
84858547800
-
-
CAIDA. http://www.caida.org.
-
-
-
-
5
-
-
0042474227
-
Modeling the spread of active worms
-
Zesheng Chen, Lixin Gao, and Kevin Kwiat. Modeling the Spread of Active Worms. In Proceedings of IEEE INFOCOMM, volume 3, pages 1890 - 1900, 2003.
-
(2003)
Proceedings of IEEE INFOCOMM
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
6
-
-
0034486891
-
The mathematics of infectious diseases
-
H.W. Hethcote. The Mathematics of Infectious Diseases. In SIAM Reviews, Vol. 42 No. 4, 2000.
-
(2000)
SIAM Reviews
, vol.42
, Issue.4
-
-
Hethcote, H.W.1
-
7
-
-
84858544285
-
-
iSink- University of Wisconsin, http://wail.cs.wisc.edu/.
-
-
-
-
8
-
-
31844447541
-
Exploiting underlying structure for detailed reconstruction of an internet-scale event
-
Abhishek Kumar, Vern Paxson, and Nicholas Weaver. Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event. In Technical Report.
-
Technical Report
-
-
Kumar, A.1
Paxson, V.2
Weaver, N.3
-
10
-
-
0742276097
-
Inside the slammer worm
-
July
-
David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver. Inside the Slammer Worm. IEEE Magazine of Security and Privacy Magazine, pages 33-39, July 2003.
-
(2003)
IEEE Magazine of Security and Privacy Magazine
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
12
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
November
-
David Moore, Collen Shannon, and Jeffry Brown. Code-Red: A case study on the spread and victims of an Internet worm. In Proceedings of Internet Measurement Workshop, pages 273-284, November 2002.
-
(2002)
Proceedings of Internet Measurement Workshop
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
16
-
-
14844308379
-
Containment of scanning worms in enterprose networks
-
Stuart Staniford. Containment of Scanning Worms in Enterprose Networks. In Journal of Computer Security, 2004.
-
(2004)
Journal of Computer Security
-
-
Staniford, S.1
-
21
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
December
-
Matthew M. Williamson. Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code. In Proceedings of the 18th Annual Computer Security Conference, pages 61-68, December 2002.
-
(2002)
Proceedings of the 18th Annual Computer Security Conference
, pp. 61-68
-
-
Williamson, M.M.1
-
22
-
-
84858536738
-
-
The CAIDA Dataset on the Witty Worm - March 19-24, 2004, Support for the Witty Worm dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, DHS, NSF, CAIDA, DARPA, Digital Envoy, and CAIDA Members
-
The CAIDA Dataset on the Witty Worm - March 19-24, 2004, Colleen Shannon and David Moore, http://www.caida.org/ passive/witty/. Support for the Witty Worm dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, DHS, NSF, CAIDA, DARPA, Digital Envoy, and CAIDA Members.
-
-
-
Shannon, C.1
Moore, D.2
-
23
-
-
27544495684
-
Worm origin identification using random moonwalks
-
May
-
Yinglian Xie, Vyas Sckar, David A. Maltz, Michael K. Reiter, and Hui Zhang. Worm Origin Identification Using Random Moonwalks. In Proceedings of IEEE Symposium on Security and Privacy, pages 242-256, May 2005.
-
(2005)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 242-256
-
-
Xie, Y.1
Sckar, V.2
Maltz, D.A.3
Reiter, M.K.4
Zhang, H.5
|