-
1
-
-
84888747323
-
-
Inktomi web search faq. Technical report. http://support.inktomi.com/ Search-Engine/Product.Info/FAQ/searchfaq.html#slurp.
-
Inktomi web search faq. Technical report. http://support.inktomi.com/ Search-Engine/Product.Info/FAQ/searchfaq.html#slurp.
-
-
-
-
2
-
-
84888656589
-
Worm:win32/zotob.a
-
Malicious software encyclopedia:, Technical report
-
Malicious software encyclopedia: Worm:win32/zotob.a. Technical report, http://www.microsoft.com/security/incident/zotob.mspx.
-
-
-
-
3
-
-
84888709283
-
The spread of the witty worm, caida
-
Technical report
-
The spread of the witty worm, caida. Technical report. http://www.caida.org/analysis/security/witty.
-
-
-
-
7
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
October
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: end-to-end containment of internet worms. In Proceedings of ACM SOSP, October 2005.
-
(2005)
Proceedings of ACM SOSP
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
8
-
-
14944379887
-
A behavioral approach to worm, detection
-
Washington, DC, October
-
D. Ellis, J. Aiken, K. Attwood, and S. Tenaglia. A behavioral approach to worm, detection. In Proceedings of ACM WORM, Washington, DC, October 2004.
-
(2004)
Proceedings of ACM WORM
-
-
Ellis, D.1
Aiken, J.2
Attwood, K.3
Tenaglia, S.4
-
9
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA, May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. In Proceedings of IEEE Security and Privacy, Oakland, CA, May 2004.
-
(2004)
Proceedings of IEEE Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
10
-
-
85084163246
-
Toward automated, distributed worm. signature detection
-
San Diego, CA, August
-
H. A. Kim and B. Karp. Toward automated, distributed worm. signature detection. In Proceedings of Usenix Security, San Diego, CA, August 2004.
-
(2004)
Proceedings of Usenix Security
-
-
Kim, H.A.1
Karp, B.2
-
11
-
-
0040291388
-
The Click modular router
-
August
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kasshoek. The Click modular router. ACM TOCS, 18(3):263-297, August 2000.
-
(2000)
ACM TOCS
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kasshoek, M.F.5
-
12
-
-
33646048960
-
Honeycomb-creating intrusion detection signatures using honeypots
-
November
-
C. Kreibich and J. Crowcroft. Honeycomb-creating intrusion detection signatures using honeypots. In Proceedings of ACM HotNets-II, November 2003.
-
(2003)
Proceedings of ACM HotNets-II
-
-
Kreibich, C.1
Crowcroft, J.2
-
15
-
-
79953672829
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proceedings of NDSS 12, 2005.
-
(2005)
Proceedings of NDSS 12
-
-
Newsome, J.1
Song, D.2
-
16
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
M. Roesch. Snort: Lightweight intrusion detection for networks. In Proceedings of Usenix LISA, 1999.
-
(1999)
Proceedings of Usenix LISA
-
-
Roesch, M.1
-
21
-
-
84944731126
-
Design, implementation and test of an email virus throttle
-
M. Williamson. Design, implementation and test of an email virus throttle. In Proceedings of ACSAC 19, 2003.
-
(2003)
Proceedings of ACSAC 19
-
-
Williamson, M.1
-
22
-
-
27544495684
-
Worm origin identification using random moonwalks
-
Y. Xie, V. Sekar, D. Maltz, M. Reiter, and H. Zhang. Worm origin identification using random moonwalks. In Proceedings of IEEE Security and Privacy, 2005.
-
(2005)
Proceedings of IEEE Security and Privacy
-
-
Xie, Y.1
Sekar, V.2
Maltz, D.3
Reiter, M.4
Zhang, H.5
|