-
1
-
-
33746380389
-
Internet - An open complex giant system
-
Dai Ruwei, Cao Longbing, Internet - An open complex giant system, Science in China (in Chinese), Ser. E, 2003, 33(4): 289-296.
-
(2003)
Science in China (in Chinese), Ser. E
, vol.33
, Issue.4
, pp. 289-296
-
-
Dai, R.1
Cao, L.2
-
2
-
-
85084162258
-
How to own the Internet in your spare time
-
Staniford, S., Paxson, V., Weaver, N., How to own the Internet in your spare time, in Proc. of the USENIX Security Symposium, 2002.
-
(2002)
Proc. of the USENIX Security Symposium
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
5
-
-
33746372577
-
-
Das Bistro Project's anti-code-red default.ida, http://www.dasbitro.com/default.ida
-
-
-
-
6
-
-
33646411132
-
-
Knowles, D., Perriot, F., Szor, P., Symantec security response: W32/Nachi.A, http://www.f-prot.com/virus-info/descriptions/nachi_A.html.
-
Symantec Security Response: W32/Nachi.A
-
-
Knowles, D.1
Perriot, F.2
Szor, P.3
-
7
-
-
33646411132
-
-
Knowles, D., Perriot, F., Szor, P., Symantec security response: W32.Blaster.Worm, http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html.
-
Symantec Security Response: W32.Blaster.Worm
-
-
Knowles, D.1
Perriot, F.2
Szor, P.3
-
8
-
-
14944350556
-
Email virus propagation modeling and analysis
-
May
-
Zou, C. C. C., Towsley, D., Email virus propagation modeling and analysis, Umass ECE Technical Report TR-03-CSE-04, May, 2003.
-
(2003)
Umass ECE Technical Report
, vol.TR-03-CSE-04
-
-
Zou, C.C.C.1
Towsley, D.2
-
9
-
-
84880028758
-
A mixed abstraction level simulation model of large-scale internet worm infestations
-
IEEE Computer Society Press, Fort Worth, TX, Oct
-
Liljenstam, M., A mixed abstraction level simulation model of large-scale internet worm infestations, in Proceedings of the Tenth IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), IEEE Computer Society Press, Fort Worth, TX, Oct 2002.
-
(2002)
Proceedings of the Tenth IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
-
-
Liljenstam, M.1
-
10
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
Moore, D., Code-Red: a case study on the spread and victims of an Internet worm, Presented at the Internet Measurement Workshop (IMW) in 2002.
-
Internet Measurement Workshop (IMW) in 2002
-
-
Moore, D.1
-
11
-
-
0038349210
-
Code red II worm propagation modeling and analysis
-
Nov. 18-22, Washington DC, USA
-
Zou, C. C. C., Gong, W. B., Towsley, D., Code Red II worm propagation modeling and analysis, in 9th ACM Conference on Computer and Communication Security, Nov. 18-22, Washington DC, USA, 2002, http://ten-nis.ecs.umass.edu/~czou/research/codered.pdf.
-
(2002)
9th ACM Conference on Computer and Communication Security
-
-
Zou, C.C.C.1
Gong, W.B.2
Towsley, D.3
-
13
-
-
0026156688
-
Directed-graph epidemiological models of computer viruses
-
Oakland, California, May
-
Kephart, J. O., White, S. R., Directed-graph epidemiological models of computer viruses, in Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, California, May 1991, 343-359.
-
(1991)
Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 343-359
-
-
Kephart, J.O.1
White, S.R.2
-
14
-
-
0003566358
-
-
Cambridge, UK: Cambridge University Press
-
Daley, D. J., Gani, J., Epidemic Modelling: An Introduction, Cambridge, UK: Cambridge University Press, 1999.
-
(1999)
Epidemic Modelling: An Introduction
-
-
Daley, D.J.1
Gani, J.2
-
15
-
-
8644268365
-
Potential strategies for high speed active worm: A worst case analysis
-
Weaver, N., Potential Strategies for High Speed Active Worm: A Worst Case Analysis, Technical Report, 2002.
-
(2002)
Technical Report
-
-
Weaver, N.1
|