-
1
-
-
0042474227
-
Modeling the spread of active worms
-
San Francisco, CA, April
-
Chen, Z., Gao, L. and Kwiat, K. (2003) ‘Modeling the spread of active worms’, Proceedings of INFOCOM’03, Vol. 3, San Francisco, CA, April, pp.1890–1900.
-
(2003)
Proceedings of INFOCOM’03
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
2
-
-
31844443075
-
A self-learning worm using importance scanning
-
Fairfax, VA, November
-
Chen, Z. and Ji, C. (2005a) ‘A self-learning worm using importance scanning’, Proceedings ACM/CCS Workshop on Rapid Malcode (WORM’05), Fairfax, VA, November, pp.22–29.
-
(2005)
Proceedings ACM/CCS Workshop on Rapid Malcode (WORM’05)
, pp. 22-29
-
-
Chen, Z.1
Ji, C.2
-
3
-
-
33846607334
-
Importance-scanning worm using vulnerable-host distribution
-
St. Louis, MO, November
-
Chen, Z. and Ji, C. (2005b) ‘Importance-scanning worm using vulnerable-host distribution’, Proceedings 48th Annual IEEE Global Telecommunications Conference (GLOBECOM’05), St. Louis, MO, November.
-
(2005)
Proceedings 48th Annual IEEE Global Telecommunications Conference (GLOBECOM’05)
-
-
Chen, Z.1
Ji, C.2
-
6
-
-
25644446918
-
The effect of DNS delays on worm propagation in an IPv6 Internet
-
Miami, FL, March
-
Feng, H., Kamra, A., Misra, V. and Keromytis, A.D. (2005) ‘The effect of DNS delays on worm propagation in an IPv6 Internet’, Proceedings of INFOCOM’05, Vol. 4, Miami, FL, March, pp.2405–2414.
-
(2005)
Proceedings of INFOCOM’05
, vol.4
, pp. 2405-2414
-
-
Feng, H.1
Kamra, A.2
Misra, V.3
Keromytis, A.D.4
-
7
-
-
84976842451
-
Fast simulation of rare events in queueing and reliability models
-
January
-
Heidelberger, P. (1995) ‘Fast simulation of rare events in queueing and reliability models’, ACM Transactions on Modeling and Computer Simulation, Vol. 5, No. 1, January, pp.43–85.
-
(1995)
ACM Transactions on Modeling and Computer Simulation
, vol.5
, Issue.1
, pp. 43-85
-
-
Heidelberger, P.1
-
9
-
-
31844448803
-
Self-stopping worms
-
Fairfax, VA, November
-
Ma, J., Voelker, G.M. and Savage, S. (2005) ‘Self-stopping worms’, Proceedings ACM/CCS Workshop on Rapid Malcode (WORM’05), Fairfax, VA, November, pp.12–21.
-
(2005)
Proceedings ACM/CCS Workshop on Rapid Malcode (WORM’05)
, pp. 12-21
-
-
Ma, J.1
Voelker, G.M.2
Savage, S.3
-
10
-
-
0742276097
-
Inside the Slammer worm
-
July
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S. and Weaver, N. (2003) ‘Inside the Slammer worm’, IEEE Security and Privacy, Vol. 1 No. 4, July, pp.33–39.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
11
-
-
0141762461
-
Code-red: a case study on the spread and victims of an Internet worm
-
Marseille, France, November
-
Moore, D., Shannon, C. and Brown, J. (2002) ‘Code-red: a case study on the spread and victims of an Internet worm’, ACM SIGCOMM/USENIX Internet Measurement Workshop, Marseille, France, November.
-
(2002)
ACM SIGCOMM/USENIX Internet Measurement Workshop
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
12
-
-
0004260006
-
-
New York: Academic Press
-
Owen, G. (2004) Game Theory, New York: Academic Press.
-
(2004)
Game Theory
-
-
Owen, G.1
-
13
-
-
31844452004
-
On the effectiveness of distributed worm monitoring
-
Baltimore, MD, August
-
Rajab, M.A., Monrose, F. and Terzis, A. (2005) ‘On the effectiveness of distributed worm monitoring’, Proceedings of the 14th USENIX Security Symposium (Security’05), Baltimore, MD, August, pp.225–237.
-
(2005)
Proceedings of the 14th USENIX Security Symposium (Security’05)
, pp. 225-237
-
-
Rajab, M.A.1
Monrose, F.2
Terzis, A.3
-
14
-
-
4344627335
-
The spread of the Witty worm
-
July-August
-
Shannon, C. and Moore, D. (2004) ‘The spread of the Witty worm’, IEEE Security andPrivacy, Vol. 2, No. 4, July-August, pp.46–50.
-
(2004)
IEEE Security andPrivacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
15
-
-
0031146656
-
Quick simulation: a review of importance sampling techniques in communications systems
-
Smith, PJ., Shafi, M. and Gao, H. (1997) ‘Quick simulation: a review of importance sampling techniques in communications systems’, IEEE Journal of Selected Areas Communication, Vol. 15, May, pp.597–613.
-
(1997)
IEEE Journal of Selected Areas Communication
, vol.15
, Issue.May
, pp. 597-613
-
-
Smith, P.J.1
Shafi, M.2
Gao, H.3
-
16
-
-
14944380936
-
The top speed of flash worms
-
Washington DC, October
-
Staniford, S., Moore, D., Paxson, V. and Weaver, N. (2004) ‘The top speed of flash worms’, Proceedings ofthe ACM/CCS Workshop on Rapid Malcode (WORM’04), Washington DC, October, pp.33–42.
-
(2004)
Proceedings ofthe ACM/CCS Workshop on Rapid Malcode (WORM’04)
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
17
-
-
85084162258
-
How to Own the internet in your spare time
-
San Francisco, CA, August
-
Staniford, S., Paxson, V. and Weaver, N. (2002) ‘How to Own the internet in your spare time’, Proceedings of the 11th USENIX Security Symposium(Security’02), San Francisco, CA, August.
-
(2002)
Proceedings of the 11th USENIX Security Symposium(Security’02)
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
18
-
-
84952960123
-
-
Colleen Shannon and David Moore, Available at: http://www.caida.org/passive/witty/. Support for the Witty Worm Dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, the US Department of Homeland Security, the National Science Foundation, and CAIDA, DARPA, Digital Envoy and CAIDA Members
-
The CAIDA Dataset on the Witty Worm (2004) Colleen Shannon and David Moore, Available at: http://www.caida.org/passive/witty/. Support for the Witty Worm Dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, the US Department of Homeland Security, the National Science Foundation, and CAIDA, DARPA, Digital Envoy and CAIDA Members.
-
(2004)
-
-
The CAIDA Dataset on the Witty Worm1
-
19
-
-
84892612179
-
An effective architecture and algorithm for detecting worms with various scan techniques
-
San Diego, CA, February
-
Wu, J., Vangala, S., Gao, L. and Kwiat, K. (2004) ‘An effective architecture and algorithm for detecting worms with various scan techniques’, Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS’04), San Diego, CA, February.
-
(2004)
Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS’04)
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
-
20
-
-
84952317743
-
Mapping the growth of the internet
-
Dallas, TX, October
-
Xing, S. and Paris, B-P. (2003a) ‘Mapping the growth of the internet’, Proceedings of IEEE 2003 International Conference on Computer Communications and Networks, Dallas, TX, October, pp.199–204.
-
(2003)
Proceedings of IEEE 2003 International Conference on Computer Communications and Networks
, pp. 199-204
-
-
Xing, S.1
Paris, B.-P.2
-
21
-
-
0042526015
-
Measuring the size of the Internet via importance sampling
-
August 2003
-
Xing, S. and Paris, B-P. (2003b) ‘Measuring the size of the Internet via importance sampling’, IEEE Journal on Selected Areas in Communications, Vol. 21, No. 6, August 2003, pp.922–933.
-
(2003)
IEEE Journal on Selected Areas in Communications
, vol.21
, Issue.6
, pp. 922-933
-
-
Xing, S.1
Paris, B.-P.2
-
22
-
-
16344396406
-
Monitoring and early warning for internet worms
-
Washington, DC, October
-
Zou, C.C., Gao, L., Gong, W. and Towsley, D. (2003) ‘Monitoring and early warning for internet worms’, Tenth ACM Conference on Computer and Communication Security (CCS’03), Washington, DC, October.
-
(2003)
Tenth ACM Conference on Computer and Communication Security (CCS’03)
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
23
-
-
26844507894
-
Routing worm: a fast, selective attack worm based on IP address information
-
Monterey, CA, June
-
Zou, C.C., Towsley, D., Gong, W. and Cai, S. (2005) ‘Routing worm: a fast, selective attack worm based on IP address information’, Proceedings of the 19thACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS’05), Monterey, CA, June.
-
(2005)
Proceedings of the 19thACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS’05)
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
24
-
-
33646150900
-
On the performance of internet worm scanning strategies
-
Zou, C.C., Towsley, D. and Gong, W. (2006) ‘On the performance of internet worm scanning strategies’, Elsevier Journal of Performance Evaluation, Vol. 63, No. 7, pp.700–723.
-
(2006)
Elsevier Journal of Performance Evaluation
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
|