메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 86-89

Stopping internet epidemics

Author keywords

[No Author keywords available]

Indexed keywords

BROADCASTING; COMPUTER OPERATING SYSTEMS; DIGITAL FILTERS; INTERNET; SECURITY OF DATA; SOFTWARE ENGINEERING; TELECOMMUNICATION SERVICES;

EID: 33845591995     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IZS.2006.1649086     Document Type: Conference Paper
Times cited : (1)

References (12)
  • 3
    • 21644482450 scopus 로고    scopus 로고
    • Minos: Control data attack prevention orthogonal to memory model
    • Dec.
    • J. R. Crandall and F. T. Chong. Minos: Control data attack prevention orthogonal to memory model. In MICRO-37, Dec. 2004.
    • (2004) MICRO-37
    • Crandall, J.R.1    Chong, F.T.2
  • 4
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • Aug.
    • H. Kim and B. Karp. Autograph: Toward automated, distributed worm signature detection. In USENIX Security Symposium, Aug. 2004.
    • (2004) USENIX Security Symposium
    • Kim, H.1    Karp, B.2
  • 5
    • 33646048960 scopus 로고    scopus 로고
    • Honeycomb - Creating intrusion detection signatures using honeypots
    • Nov.
    • C. Kreibich and J. Crowcroft. Honeycomb - creating intrusion detection signatures using honeypots. In HotNets, Nov. 2003.
    • (2003) HotNets
    • Kreibich, C.1    Crowcroft, J.2
  • 7
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • Apr.
    • D. Moore, C. Shannon, G. Voelker, and S. Savage. Internet quarantine: Requirements for containing self-propagating code. In IEEE INFOCOM, Apr. 2003.
    • (2003) IEEE INFOCOM
    • Moore, D.1    Shannon, C.2    Voelker, G.3    Savage, S.4
  • 8
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • Feb.
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS, Feb. 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 11
    • 12844267418 scopus 로고    scopus 로고
    • Secure program execution via dynamic information flow tracking
    • Oct.
    • G. E. Suh, J. Lee, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS XI, Oct. 2004.
    • (2004) ASPLOS XI
    • Suh, G.E.1    Lee, J.2    Devadas, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.