-
2
-
-
8644279145
-
Large scale malicious code: A research agenda
-
N Weaver, V Paxson, S Stamford, et al. Large scale malicious code: A research agenda [OL]. http://www.cs.berkeley.edu/-nweaver/, 2003
-
(2003)
-
-
Weaver, N.1
Paxson, V.2
Stamford, S.3
-
3
-
-
8644246187
-
A virtual honeypot framework
-
Center of Information Technology Integration, University of Michigan, Tech Rep: citi-tr-03-1
-
N Proves. A virtual honeypot framework [R]. Center of Information Technology Integration, University of Michigan, Tech Rep: citi-tr-03-1, 2003
-
(2003)
-
-
Proves, N.1
-
5
-
-
33750903130
-
Cheese worm pros and cons of a 'Friendly' worm
-
Bryan Barber. Cheese worm pros and cons of a 'Friendly' worm [OL]. http://www.sans,org/rr/whitepapers/malicious/31.php, 2001
-
(2001)
-
-
Barber, B.1
-
6
-
-
0036119199
-
Analysis on Lion worm and some discussing about it
-
Zuo X D, Dai Y X. Analysis on Lion worm and some discussing about it [J]. Computer Engineering, 2002, 28 (1): 16-17
-
(2002)
Computer Engineering
, vol.28
, Issue.1
, pp. 16-17
-
-
Zuo, X.D.1
Dai, Y.X.2
-
7
-
-
33750924241
-
CRClean.zip
-
Kem Markus. CRClean.zip [OL]. http://archives.neohapsis.com/archives/vuln-dev/2001-q3/0577.html, 2001-09-01
-
(2001)
-
-
Markus, K.1
-
8
-
-
33750916888
-
CodeGreen beta release
-
Hexxer Der. CodeGreen beta release [OL]. http://archives.neohapsis.com/archives/vuln-dev/2001-q3/0575.html, 2001-09-01
-
(2001)
-
-
Der, H.1
-
10
-
-
28444442471
-
The propagation model and analysis of worms together with anti-worms
-
Wang Bai-ling, Fang Bin-xing, Yun Xiao-chun. The propagation model and analysis of worms together with anti-worms [J]. Wseas Trans on Information Science and Applications, 2004, 4 (1): 967-982
-
(2004)
Wseas Trans on Information Science and Applications
, vol.4
, Issue.1
, pp. 967-982
-
-
Wang, B.-L.1
Fang, B.-X.2
Yun, X.-C.3
-
12
-
-
8644261522
-
Research and development of Internet worms
-
in Chinese
-
W P Wen, S H Qing, J C Jiang, et al. Research and development of Internet worms [J]. Journal of Software, 2004, 15 (8): 1208-1219 (in Chinese)
-
(2004)
Journal of Software
, vol.15
, Issue.8
, pp. 1208-1219
-
-
Wen, W.P.1
Qing, S.H.2
Jiang, J.C.3
-
14
-
-
33750910883
-
The history of good worms
-
David J Meltzer. The history of good worms [OL]. http://www.intrusec.com/goodworm081903.ppt, 2005-4-1
-
(2005)
-
-
Meltzer, D.J.1
-
15
-
-
33750904249
-
Worms containment modeling and analysis under active worm countermeasure
-
Wang Bailing, Fang Binxing, Yun Xiaochun. Worms containment modeling and analysis under active worm countermeasure [J]. Wseas Trans on Information Science and Applications, 2004, 4 (1): 958-966
-
(2004)
Wseas Trans on Information Science and Applications
, vol.4
, Issue.1
, pp. 958-966
-
-
Wang, B.1
Fang, B.2
Yun, X.3
-
16
-
-
8644236108
-
Routing worm: A fast, selective attack worm based on IP address information
-
University Massachusetts, Tech Rep: TRCSE-03-06
-
C C Zou, D Towsley, W Gong, et al. Routing worm: A fast, selective attack worm based on IP address information [R]. University Massachusetts, Tech Rep: TRCSE-03-06, 2003
-
(2003)
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
17
-
-
8644220815
-
On the performance of Internet worm scanning strategies
-
Electrical and Computer Engineering Department, University of Massachusetts, Tech Rep: TR-03-CSE-07
-
C C Zou, W Gong, D Towsley. On the performance of Internet worm scanning strategies [R]. Electrical and Computer Engineering Department, University of Massachusetts, Tech Rep: TR-03-CSE-07, 2003
-
(2003)
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
18
-
-
14944380936
-
The top speed of flash worms
-
Washington, DC, USA
-
Stuart Staniford, David Moore, Vern Paxson, et al. The top speed of flash worms [C]. In: Proc of the ACM CCS Workshop on Rapid Malcode (WORM 2004), Washington, DC, USA, 2004
-
(2004)
Proc of the ACM CCS Workshop on Rapid Malcode (WORM 2004)
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
-
19
-
-
33750896805
-
Analysis of information diffusion models for computer conference
-
in Chinese
-
Ding Wei, Pan jianping, Gong Jian, et al. Analysis of information diffusion models for computer conference [J]. Journal of Computer Research and Development, 1998, 35 (1): 24-29 (in Chinese)
-
(1998)
Journal of Computer Research and Development
, vol.35
, Issue.1
, pp. 24-29
-
-
Ding, W.1
Pan, J.2
Gong, J.3
|