-
2
-
-
85084162258
-
How to Own Internet in Your Spare Time
-
Aug
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own Internet in Your Spare Time," Proc. 11th Usenix Security Symp., pp. 149-167, Aug. 2002.
-
(2002)
Proc. 11th Usenix Security Symp
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
3
-
-
3042628120
-
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The Spread of the Sapphire Worm," http://cs.berkely.edu/nweaver/ sapphire, 2005.
-
(2005)
The Spread of the Sapphire Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
5
-
-
0036057862
-
Mimo Control of an Apache Web Server: Modeling and Controller Design
-
May
-
N. Gandhi, D. Tilbury, Y. Diao, J. Hellerstein, and S. Parekh, "Mimo Control of an Apache Web Server: Modeling and Controller Design," Proc. 21st Am. Control Conf. (ACC '02), May 2002.
-
(2002)
Proc. 21st Am. Control Conf. (ACC '02)
-
-
Gandhi, N.1
Tilbury, D.2
Diao, Y.3
Hellerstein, J.4
Parekh, S.5
-
9
-
-
0038349210
-
Code Red Worm Propagation Modeling and Analysis
-
Nov
-
C.C. Zou, W. Gong, and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), pp. 138-147, Nov. 2002.
-
(2002)
Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02)
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
10
-
-
33646150900
-
On the Performance of Internet Worm Scanning Strategies
-
July
-
C.C. Zou, D. Towsley, and W. Gong, "On the Performance of Internet Worm Scanning Strategies," Performance Evaluation, vol. 63, pp. 700-723, July 2006.
-
(2006)
Performance Evaluation
, vol.63
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
11
-
-
3042542433
-
Dynamic Control of Worm Propagation
-
Apr
-
R. Dantu, J.W. Cangussu, and A. Yelimeli, "Dynamic Control of Worm Propagation," Proc. Int'l Conf. Information Technology (ITCC '04), vol. 1, pp. 419-423, Apr. 2004.
-
(2004)
Proc. Int'l Conf. Information Technology (ITCC '04)
, vol.1
, pp. 419-423
-
-
Dantu, R.1
Cangussu, J.W.2
Yelimeli, A.3
-
12
-
-
84945712966
-
Matrix Calculus and the Sensitivity Analysis of Linear Dynamic Systems
-
Aug
-
J.W. Brewer, "Matrix Calculus and the Sensitivity Analysis of Linear Dynamic Systems," IEEE Trans. Automatic Control, vol. 23, pp. 748-751, Aug. 1978.
-
(1978)
IEEE Trans. Automatic Control
, vol.23
, pp. 748-751
-
-
Brewer, J.W.1
-
16
-
-
34249087245
-
A Multi-Variate Analyses of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails,
-
master's thesis, Univ. of North Texas
-
P. Srikanth, "A Multi-Variate Analyses of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails," master's thesis, Univ. of North Texas, 2006.
-
(2006)
-
-
Srikanth, P.1
-
17
-
-
8344223694
-
A Nonstationary Poisson View of Internet Traffic
-
Mar
-
T. Karagiannis, M. Molle, M. Faloutsos, and A. Broido, "A Nonstationary Poisson View of Internet Traffic," Proc. INFOCOM '04, vol. 3, pp. 1558-1569, Mar. 2004
-
(2004)
Proc. INFOCOM '04
, vol.3
, pp. 1558-1569
-
-
Karagiannis, T.1
Molle, M.2
Faloutsos, M.3
Broido, A.4
-
23
-
-
34249112970
-
Core Elements of the Cisco Self-Defending Network Strategy
-
"Core Elements of the Cisco Self-Defending Network Strategy," www.cisco.com/application/pdf/en/us/guest/netsol/ns413/c654/ cdccont_0900aecd80247914.pdf, 2005.
-
(2005)
-
-
-
24
-
-
14944359480
-
A Hybrid Quarantine Defense
-
Oct
-
P. Porras, L. Briesemeister, K. Skinner, K. Levitt, J. Rowe, and A. Ting, "A Hybrid Quarantine Defense," Proc. Second ACM SIGSAC Workshop Rapid Malcode (WORM '04), Oct. 2004.
-
(2004)
Proc. Second ACM SIGSAC Workshop Rapid Malcode (WORM '04)
-
-
Porras, P.1
Briesemeister, L.2
Skinner, K.3
Levitt, K.4
Rowe, J.5
Ting, A.6
-
25
-
-
34249099852
-
-
Intel Corp
-
U. Savagaonkar, R. Sahita, G. Nagabhushan, P. Rajagopal, and D. Durham, "An OS Independent Heuristics-Based Worm-Containment System," Intel Corp., 2005.
-
(2005)
An OS Independent Heuristics-Based Worm-Containment System
-
-
Savagaonkar, U.1
Sahita, R.2
Nagabhushan, G.3
Rajagopal, P.4
Durham, D.5
-
28
-
-
1942532330
-
Feedback Control Applied to Survivability: A Host-Based Autonomic Defense System
-
Mar
-
O.P. Kreidl and T.M. Frazier, "Feedback Control Applied to Survivability: A Host-Based Autonomic Defense System," IEEE Trans. Reliability, vol. 53, Mar. 2004.
-
(2004)
IEEE Trans. Reliability
, vol.53
-
-
Kreidl, O.P.1
Frazier, T.M.2
-
29
-
-
70450183909
-
Modelling a Computer Worm Defense System,
-
master's thesis, Univ. of California, Davis
-
S.G. Cheetancheri and K.N. Levitt, "Modelling a Computer Worm Defense System," master's thesis, Univ. of California, Davis, 2004.
-
(2004)
-
-
Cheetancheri, S.G.1
Levitt, K.N.2
-
31
-
-
34249020004
-
A Framework for Worm Defense Evaluation
-
Sept
-
S. Cheetancheri, D. Ma, A. Ting, J. Rowe, T. Heberlien, and K. Levitt, "A Framework for Worm Defense Evaluation," Proc. US National Science Foundation Cyber Trust Ann. Principal Investigator Meeting, Sept. 2005.
-
(2005)
Proc. US National Science Foundation Cyber Trust Ann. Principal Investigator Meeting
-
-
Cheetancheri, S.1
Ma, D.2
Ting, A.3
Rowe, J.4
Heberlien, T.5
Levitt, K.6
|