-
1
-
-
0024684041
-
With Microscope and Tweezers: The Worm from MIT's Perspective
-
June
-
J. Rochlis and M. Eichin, "With Microscope and Tweezers: The Worm from MIT's Perspective," Comm. ACM, vol. 32, no. 6, pp. 689-698, June 1989.
-
(1989)
Comm. ACM
, vol.32
, Issue.6
, pp. 689-698
-
-
Rochlis, J.1
Eichin, M.2
-
2
-
-
34250358044
-
CERT Advisory CA-2001-23
-
Computer Emergency Response Team, Code Red, July
-
Computer Emergency Response Team, "CERT Advisory CA-2001-23 "Code Red" Worm Exploiting Buffer Overflow in IIS Indexing Service DLL," http://www.cert.org/advisories/CA-2001-23.html, July 2001.
-
(2001)
Worm Exploiting Buffer Overflow in IIS Indexing Service DLL
-
-
-
3
-
-
34250319500
-
-
eEye Digital Security, ANALYSIS: CodeRed II Worm, http:// www.eeye.com/html/Research/Advisories/AL20010804.html, Aug. 2001.
-
eEye Digital Security, "ANALYSIS: CodeRed II Worm," http:// www.eeye.com/html/Research/Advisories/AL20010804.html, Aug. 2001.
-
-
-
-
4
-
-
0042536297
-
-
Computer Emergency Response Team, July
-
Computer Emergency Response Team, "CERT Advisory CA-2001-26 Nimda Worm," http://www.cert.org/advisories/CA-2001-26.html, July 2001.
-
(2001)
CERT Advisory CA-2001-26 Nimda Worm
-
-
-
5
-
-
1642435179
-
-
Computer Emergency Response Team, Jan
-
Computer Emergency Response Team, "CERT Advisory CA-2003-04 MS-SQL Server Worm," http://www.cert.org/advisories/CA-2003-04.html, Jan. 2003.
-
(2003)
CERT Advisory CA-2003-04 MS-SQL Server Worm
-
-
-
7
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
Jan
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. Seventh USENIX Security Conf., Jan. 1998.
-
(1998)
Proc. Seventh USENIX Security Conf
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
8
-
-
85081874807
-
A First Step towards Automated Detection of Buffer Overrun Vulnerabilities
-
Feb
-
D. Wagner, J.S. Foster, E.A. Brewer, and A. Aiken, "A First Step towards Automated Detection of Buffer Overrun Vulnerabilities," Proc. Network and Distributed System Security Symp., Feb. 2000.
-
(2000)
Proc. Network and Distributed System Security Symp
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.A.3
Aiken, A.4
-
9
-
-
84880028758
-
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations
-
Oct
-
M. Liljenstam, Y. Yuan, B. Premore, and D. Nicol, "A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations," Proc. 10th IEEE/ACM Symp. Modeling, Analysis and Simulation of Computer and Telecomm. Systems (MASCOTS '02), Oct. 2002.
-
(2002)
Proc. 10th IEEE/ACM Symp. Modeling, Analysis and Simulation of Computer and Telecomm. Systems (MASCOTS '02)
-
-
Liljenstam, M.1
Yuan, Y.2
Premore, B.3
Nicol, D.4
-
12
-
-
0042474173
-
Internet Quarantine: Requirements for Containing Self-Propagating Code
-
Mar
-
D. Moore, C. Shannon, G.M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code," Proc. IEEE INFOCOM '03, Mar. 2003.
-
(2003)
Proc. IEEE INFOCOM '03
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
13
-
-
14944358991
-
Preliminary Results Using Scale-Down to Explore Worm Dynamics
-
Oct
-
N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson, "Preliminary Results Using Scale-Down to Explore Worm Dynamics," Proc. Second ACM Workshop on Rapid Malcode (WORM '04), Oct. 2004.
-
(2004)
Proc. Second ACM Workshop on Rapid Malcode (WORM '04)
-
-
Weaver, N.1
Hamadeh, I.2
Kesidis, G.3
Paxson, V.4
-
14
-
-
16344396406
-
Monitoring and Early Warning for Internet Worms
-
Oct
-
C.C. Zou, L. Gao, W. Gong, and D. Towsley, "Monitoring and Early Warning for Internet Worms," Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), Oct. 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03)
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
15
-
-
21644482790
-
Worm Detection, Early Warning, and Response Based on Local Victim Information
-
Dec
-
G. Gu, D. Dagon, X. Qin, M.I. Sharif, W. Lee, and G.F. Riley, "Worm Detection, Early Warning, and Response Based on Local Victim Information," Proc. 20th Ann. Computer Security Applications Conf. (ACSAC '04), Dec. 2004.
-
(2004)
Proc. 20th Ann. Computer Security Applications Conf. (ACSAC '04)
-
-
Gu, G.1
Dagon, D.2
Qin, X.3
Sharif, M.I.4
Lee, W.5
Riley, G.F.6
-
16
-
-
27644500372
-
Detecting Internet Worms at Early Stage
-
Oct
-
S. Chen and S. Ranka, "Detecting Internet Worms at Early Stage," IEEE J. Selected Areas in Comm., special issue on recent advances in managing enterprise network services, vol. 23, no. 10, Oct. 2005.
-
(2005)
IEEE J. Selected Areas in Comm
, vol.23
, Issue.10
-
-
Chen, S.1
Ranka, S.2
-
17
-
-
33748427096
-
-
DARPA ATO FTN, Technical Report AFRL-IF-RS-TR-2004-100, Dept. Computer Science, Purdue Univ
-
K. Park, H. Kim, B. Bethala, and A. Selcuk, "Scalable Protection against DDoS and Worm Attacks," DARPA ATO FTN, Technical Report AFRL-IF-RS-TR-2004-100, Dept. Computer Science, Purdue Univ., 2004.
-
(2004)
Scalable Protection against DDoS and Worm Attacks
-
-
Park, K.1
Kim, H.2
Bethala, B.3
Selcuk, A.4
-
18
-
-
73449118218
-
The Internet as a Large-Scale Complex System, Chapter 1: The Internet as a Complex System
-
K. Park and W. Willinger, eds, Oxford Univ. Press
-
K. Park, "The Internet as a Large-Scale Complex System, Chapter 1: The Internet as a Complex System," SFI Studies in the Sciences of Complexity, K. Park and W. Willinger, eds., Oxford Univ. Press, 2005.
-
(2005)
SFI Studies in the Sciences of Complexity
-
-
Park, K.1
-
21
-
-
0042536223
-
Welcome to My Tarpit: The Tactical and Strategic Use of LaBrea
-
T. Liston, "Welcome to My Tarpit: The Tactical and Strategic Use of LaBrea," technical report http://www.threenorth.com/LaBrea/LaBrea.txt, 2001.
-
(2001)
technical report
-
-
Liston, T.1
-
22
-
-
14844308379
-
Containment of Scanning Worms in Enterprise Networks
-
S. Staniford, "Containment of Scanning Worms in Enterprise Networks," J. Computer Security, 2004.
-
(2004)
J. Computer Security
-
-
Staniford, S.1
-
25
-
-
27544467604
-
The EarlyBird System for Real-Time Detection of Unknown Worms
-
Dec
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "The EarlyBird System for Real-Time Detection of Unknown Worms," Proc. Sixth Symp. Operating System Design and Implementation (OSDI '04), Dec. 2004.
-
(2004)
Proc. Sixth Symp. Operating System Design and Implementation (OSDI '04)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
30
-
-
0034486891
-
The Mathematics of Infectious Diseases
-
H.W. Hethcote, "The Mathematics of Infectious Diseases," SIAM Rev. vol. 42, no. 4, pp. 599-653, 2000.
-
(2000)
SIAM Rev
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
|