-
3
-
-
33845391802
-
Vigilante: End-to-End Containment of Internet Works
-
Costa, M., Crowcroft, J., Castro, M., Rowstron, A., Zhou, L., Zhang, L., Barham, P.: Vigilante: End-to-End Containment of Internet Works. In: 20th ACM symposium on Operating systems principles, pp. 133-147 (2005)
-
(2005)
20th ACM symposium on Operating systems principles
, pp. 133-147
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
4
-
-
21644482790
-
Worm detection, early warning and response based on local victim information
-
Gu, G., Sharif, M., Qin, X., Dagon, D., Lee, W., Riley, G.: Worm detection, early warning and response based on local victim information. In: 20th Annual Computer Security Applications Conference, pp. 136-145 (2004)
-
(2004)
20th Annual Computer Security Applications Conference
, pp. 136-145
-
-
Gu, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
5
-
-
0034486891
-
-
Heathcote The mathematics of infectious diseases. SIAM Rev. 42(4), 599-653 (2000)
-
Heathcote The mathematics of infectious diseases. SIAM Rev. 42(4), 599-653 (2000)
-
-
-
-
7
-
-
0000998185
-
A contribution to the mathematical theory of epidemics
-
Proceedings of the Royal Society of London, Containing Papers of a Mathematical and Physical Character
-
Kermack, W.O., McKendrick, A.G.: A contribution to the mathematical theory of epidemics. In: Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, vol. 115, No. 772, pp. 700-721 (1927)
-
(1927)
Series A
, vol.115
, Issue.772
, pp. 700-721
-
-
Kermack, W.O.1
McKendrick, A.G.2
-
8
-
-
24144441166
-
-
Kesidis, G., Hamadeh, I.: Jiwasurat Soranun.: coupled Kermack-McKendrick models for randomly scanning and bandwidth-saturating internet worms. In: QoS-IP 2005, LNCS 3375, pp. 101-109 (2005)
-
Kesidis, G., Hamadeh, I.: Jiwasurat Soranun.: coupled Kermack-McKendrick models for randomly scanning and bandwidth-saturating internet worms. In: QoS-IP 2005, LNCS 3375, pp. 101-109 (2005)
-
-
-
-
11
-
-
0042474173
-
-
INFOCOM
-
Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet Quarantine: Requirements for Containing Self-Propagating Code. INFOCOM (2003)
-
(2003)
Internet Quarantine: Requirements for Containing Self-Propagating Code
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
12
-
-
34249859855
-
-
Nimda (2001) Symantec, W32.nimda.a@mm, http://www. symantec.com/avcenter/venc/data/w32.nimda.a@mm.html
-
Nimda (2001) Symantec, "W32.nimda.a@mm," http://www. symantec.com/avcenter/venc/data/w32.nimda.a@mm.html
-
-
-
-
14
-
-
26844467276
-
Comparative study between analytical models and packet-level worm simulations
-
IEEE, pp
-
Sharif, M.I., Riley, G.F., Lee, W.: Comparative study between analytical models and packet-level worm simulations. In: 19th Workshop on Principles of Advanced and Distributed Simulation. IEEE, pp. 88-98 (2005)
-
(2005)
19th Workshop on Principles of Advanced and Distributed Simulation
, pp. 88-98
-
-
Sharif, M.I.1
Riley, G.F.2
Lee, W.3
-
15
-
-
33644660669
-
Computer virus propagation models
-
Calzarossa, M.C, Gelenbe, E, eds, Springer, New York
-
Serazzi, G., Zanero, S.: Computer virus propagation models. In: Calzarossa, M.C., Gelenbe, E. (eds.) Tutorials of the 11th IEEE/ACM Int'l symp. on modeling, analysis and simulation of computer and telecom - systems - MASCOTS 2003. Springer, New York (2003)
-
(2003)
Tutorials of the 11th IEEE/ACM Int'l symp. on modeling, analysis and simulation of computer and telecom - systems - MASCOTS
-
-
Serazzi, G.1
Zanero, S.2
-
20
-
-
4544275741
-
Modeling the effects of timing parameters on virus propagation
-
ACM Press, New York
-
Yang, W., Chenxi, W.: Modeling the effects of timing parameters on virus propagation. In: Proceedings of the 2003 ACM workshop on Rapid Malcode, pp. 61-66. ACM Press, New York (2003)
-
(2003)
Proceedings of the 2003 ACM workshop on Rapid Malcode
, pp. 61-66
-
-
Yang, W.1
Chenxi, W.2
-
21
-
-
50049110702
-
Effective detection of active worms with varying scan rate
-
SecureComm, to appear
-
Yu, W., Wang, X., Xuan, D., Lee, D.: Effective detection of active worms with varying scan rate. In: Proceedings of IEEE International Conference on Security and Privacy in Communication Networks (SecureComm), to appear (2006)
-
(2006)
Proceedings of IEEE International Conference on Security and Privacy in Communication Networks
-
-
Yu, W.1
Wang, X.2
Xuan, D.3
Lee, D.4
-
22
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
ACM Press, New York
-
Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of the 9th ACM conference on computer and communications security, pp 138-147. ACM Press, New York (2002)
-
(2002)
Proceedings of the 9th ACM conference on computer and communications security
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
23
-
-
26844510250
-
Monitoring and early detection for internet worms
-
October
-
Zou, C., Gong, W.B., Towsley, D., Gao, L.X.: Monitoring and early detection for internet worms. In: Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS), October (2003)
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS)
-
-
Zou, C.1
Gong, W.B.2
Towsley, D.3
Gao, L.X.4
-
24
-
-
33646150900
-
-
Zou Cliff, C., Towsley, D., Gong, W.: On the performance of Internet worm scanning strategies. Performance Evaluation 63 (2006), Science Direct, pp. 700-723 (2006)
-
Zou Cliff, C., Towsley, D., Gong, W.: On the performance of Internet worm scanning strategies. Performance Evaluation 63 (2006), Science Direct, pp. 700-723 (2006)
-
-
-
|