-
1
-
-
85084162258
-
How to own the Internet in your spare time
-
Boneh D. (ed.), San Francisco
-
Staniford S, Paxson V, Weaver N. How to own the Internet in your spare time. In: Boneh D, ed. Proc. of the 11th Usenix Security Symp. San Francisco, 2002. http://www.icir.org/vern/papers/cdc-usenix-sec02/cdc.pdf
-
(2002)
Proc. of the 11th Usenix Security Symp
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
2
-
-
0038289949
-
Warhol worms: The potential for very fast Internet plagues
-
Weaver N. Warhol worms: The potential for very fast Internet plagues. 2002. http://www.cs.berkeley.edu/-nweaver/warhol.html
-
(2002)
-
-
Weaver, N.1
-
3
-
-
21644432294
-
Computers and epidemiology
-
Kephart JO, Chess DM, White SR. Computers and epidemiology. http://www.research.ibm.com/antivirus/ SciPapers/Kephart/Spectrum/Spectrum.html
-
-
-
Kephart, J.O.1
Chess, D.M.2
White, S.R.3
-
5
-
-
33751564201
-
Email worm modeling and defense
-
Zou CC, Towsley D, Gong W. Email worm modeling and defense. 2004. http://www-unix.ecs.umass.edu/-gong/papers/emailModel-ICCCN04.pdf
-
(2004)
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
6
-
-
0041534274
-
A snapshot of global Internet worm activity
-
Technical Report, Arbor Networks
-
Song D, Malan R, Stone R. A snapshot of global Internet worm activity. Technical Report, Arbor Networks, 2001. http://www.first.org/events/progconf/2002/d5-02-song-slides.pdf
-
(2001)
-
-
Song, D.1
Malan, R.2
Stone, R.3
-
7
-
-
33751566470
-
IM management, security and compliance solutions
-
Imlogic
-
Imlogic. IM management, security and compliance solutions. 2006. http://www.imlogic.com
-
(2006)
-
-
-
11
-
-
33751569182
-
-
iResearch Consulting Group. China Instant Messaging Research Report
-
iResearch Consulting Group. China Instant Messaging Research Report. 2005. http://wwwh.iresearch.com.cn/
-
(2005)
-
-
-
12
-
-
14944375512
-
Malicious threats and vulnerabilities in instant messaging
-
Hindocha N, Chien E. Malicious threats and vulnerabilities in instant messaging. 2005. http://www.symantec.com/avcenter/reference/ malicious.threats.instant.messaging.pdf
-
(2005)
-
-
Hindocha, N.1
Chien, E.2
-
13
-
-
33751575431
-
2005 real-time communication security: The year in review
-
IMlogic Threat Center
-
IMlogic Threat Center. 2005 real-time communication security: The year in review. 2005. http://www.imlogic.com/pdf/2005ThreatCenter_report.pdf
-
(2005)
-
-
-
14
-
-
33751570100
-
-
CN/CERT. CN/CERT China Network Security Research Annual Report
-
CN/CERT. CN/CERT China Network Security Research Annual Report. 2005. http://www.hais.org.cn/doc/2005CNCERTCC AnnualReport_Chinese.pdf
-
(2005)
-
-
-
16
-
-
8644224392
-
Internet worm research
-
Tianjin: Nankai University, Chinese source
-
Zheng H. Internet worm research[Ph. D. Thesis]. Tianjin: Nankai University, 2003 (in Chinese with English abstract).
-
(2003)
-
-
Zheng, H.1
-
17
-
-
33751577149
-
-
Messenger APIs
-
Messenger APIs. http://msdn.microsoft.com/downloads/list/messengerapi.asp
-
-
-
-
18
-
-
33751556301
-
-
ICQ APIs
-
ICQ APIs. http://www.icq.com/api/
-
-
-
-
19
-
-
33751569013
-
-
W32. Choke. Worm
-
W32. Choke. Worm. http://securityresponse.symantec.com /avcenter/venc/data/w32.choke.worm.html
-
-
-
-
20
-
-
33751583932
-
-
W32. Goner. A@mm
-
W32. Goner. A@mm. http://securityresponse. symantec.com/avcenter/venc/data/w32.goner.a@mm.html
-
-
-
-
21
-
-
33751576119
-
-
W32. AimVen@mm
-
W32. AimVen@mm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.aimven.worm.html
-
-
-
-
22
-
-
33751579081
-
-
W32. Kelvir. HI@mm
-
W32. Kelvir. HI@mm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.kelvir.hi.html
-
-
-
-
23
-
-
33751560358
-
-
W32. SoFunny. Worm
-
W32. SoFunny. Worm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.sofunny.html
-
-
-
-
24
-
-
33751568835
-
-
W32. Aplore@mm
-
W32. Aplore@mm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.aplore@mm.html
-
-
-
-
25
-
-
33751582016
-
-
W32. Serflog. A@mm
-
W32. Serflog. A@mm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.serflog.a@mm.html
-
-
-
-
26
-
-
33751583174
-
-
W32. Bizex. worm
-
W32. Bizex. worm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.bizex.worm.html
-
-
-
-
27
-
-
33751578985
-
-
W32. Bropia. F. worm
-
W32. Bropia. F. worm. http://securityresponse.symantec.com/ avcenter/venc/data/w32.bropia.f worm.html
-
-
-
-
30
-
-
4544275741
-
Modeling the effects of timing parameters on virus propagation
-
Staniford S. (ed.), Washington
-
Wang Y, Wang CX. Modeling the effects of timing parameters on virus propagation. In: Staniford S, ed. Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003). Washington, 2003. http://www.ece.cmu.edu/-chenxi/pub/worm.pdf
-
(2003)
Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003)
-
-
Wang, Y.1
Wang, C.X.2
-
31
-
-
0004140894
-
Search in power-law networks
-
Technical Report, 1063-651X, American Physical Society
-
Adamic LA, Lukose RM, Puniyani AR, Hubermanl BA. Search in power-law networks. Technical Report, 1063-651X, American Physical Society, 2001. 64-71. http://www.hpl.hp.com/research/idl/papers/plsearch/pre46135.pdf
-
(2001)
, pp. 64-71
-
-
Adamic, L.A.1
Lukose, R.M.2
Puniyani, A.R.3
Hubermanl, B.A.4
-
32
-
-
0036792011
-
Classification of scale-free networks
-
Goh K, Oh E, Jeong H, Kahng B, Kim D. Classification of scale-free networks. PNAS, 2002, 99(20): 12583-12588.
-
(2002)
PNAS
, vol.99
, Issue.20
, pp. 12583-12588
-
-
Goh, K.1
Oh, E.2
Jeong, H.3
Kahng, B.4
Kim, D.5
-
33
-
-
0037861702
-
Instant messaging as a scale-free network
-
Smith RD. Instant messaging as a scale-free network. 2006. http://arxiv.org/abs/cond-mat/0206378
-
(2006)
-
-
Smith, R.D.1
-
35
-
-
33751582673
-
The project of completely automated public turing test to tell computers and humans apart
-
Carnegie Mellon University
-
Carnegie Mellon University. The project of completely automated public turing test to tell computers and humans apart. 2005. http://www.captcha.net/
-
(2005)
-
-
-
36
-
-
33751573192
-
Yahoo fills in messenger hole
-
News.com Staff
-
News.com Staff. Yahoo fills in messenger hole. 2005. http://news.com.com/2100-1023-923638.html
-
(2005)
-
-
-
37
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
Las Vegas
-
Williamson M. Throttling viruses: Restricting propagation to defeat malicious mobile code. In: Proc. of the 18th Annual Computer Security Applications Conf. (ACSAC). Las Vegas, 2002. 61-68. http://www.acsa-admin.org/2002/papers/97.pdf
-
(2002)
Proc. of the 18th Annual Computer Security Applications Conf. (ACSAC)
, pp. 61-68
-
-
Williamson, M.1
-
38
-
-
33751575600
-
Securing instant messaging
-
Symantec Group
-
Symantec Group. Securing instant messaging. 2006. http://www.symantec.com/avcenter/ reference/secure.instant.messaging.pdf
-
(2006)
-
-
|