-
1
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
Marseille, France, November
-
D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm," in Proceedings of Internet Measurement Workshop (IMW), Marseille, France, November 2002.
-
(2002)
Proceedings of Internet Measurement Workshop (IMW)
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
2
-
-
24344436426
-
The Blaster worm: Then and
-
July
-
M. Bailey, E. Cooke, F. Jahanian, and D. Watson, "The Blaster worm: Then and Now," IEEE Security and Privacy Magazine, vol. 3, no. 4, pp. 26-31, July 2005.
-
(2005)
IEEE Security and Privacy Magazine
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Watson, D.4
-
3
-
-
34748915490
-
-
N. Weaver and D. Ellis, Reflections on the Witty Worm: Analyzing the Attacker, -,login: The USENIX Magazine, 29, no. 3, pp. 34-37, June 2004.
-
N. Weaver and D. Ellis, "Reflections on the Witty Worm: Analyzing the Attacker," -,login: The USENIX Magazine, vol. 29, no. 3, pp. 34-37, June 2004.
-
-
-
-
4
-
-
0742276097
-
Inside the Slammer worm
-
July
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer worm," IEEE Security and Privacy Magazine, vol. 1, no. 4, pp. 33-39, July 2003.
-
(2003)
IEEE Security and Privacy Magazine
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
5
-
-
26844502466
-
A preliminary simulation of the effect of scanning worm activity on multicast
-
Monterey, CA, USA, June
-
I. Hamadeh, J. Hart, G. Kesidis, and V. Pothamsetty, "A preliminary simulation of the effect of scanning worm activity on multicast," in Proceedings of the Workshop on Principles of Advanced and Distributed Simulation (PADS), Monterey, CA, USA, June 2005.
-
(2005)
Proceedings of the Workshop on Principles of Advanced and Distributed Simulation (PADS)
-
-
Hamadeh, I.1
Hart, J.2
Kesidis, G.3
Pothamsetty, V.4
-
7
-
-
28044469549
-
The monitoring and early detection of Internet worms
-
October
-
C. C. Zou, W. Gong, D. Towsley, and L. Gao, "The monitoring and early detection of Internet worms," IEEE/ACM Transactions on Networking, vol. 13, no. 5, pp. 961-974, October 2005.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
Gao, L.4
-
8
-
-
28044457069
-
Network telescopes
-
Technical report, Cooperative Association for Internet Data Analysis (CAIDA) Technical Report
-
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Network telescopes: Technical report," 2004, Cooperative Association for Internet Data Analysis (CAIDA) Technical Report.
-
(2004)
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
9
-
-
34748825897
-
P2P systems for worm detection
-
Piscataway, NJ, USA, September
-
J. Sandin, "P2P systems for worm detection," in DIMACS Workshop on large scale attacks, Piscataway, NJ, USA, September 2003.
-
(2003)
DIMACS Workshop on large scale attacks
-
-
Sandin, J.1
-
10
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
Brighton, United Kingdom, October
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham, "Vigilante: End-to-End Containment of Internet Worms," in Proceedings of the 20th A CM Symposium on Operating Systems Principles (SOSP '05), Brighton, United Kingdom, October 2005.
-
(2005)
Proceedings of the 20th A CM Symposium on Operating Systems Principles (SOSP '05)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
11
-
-
0000660738
-
Strong approximation theorems for density dependent ma-rkov chains
-
T. G. Kurtz, "Strong approximation theorems for density dependent ma-rkov chains," Stochastic Processes and their Applications, vol. 6, pp. 223-240, 1978.
-
(1978)
Stochastic Processes and their Applications
, vol.6
, pp. 223-240
-
-
Kurtz, T.G.1
-
14
-
-
0038349210
-
Code Red Worm Propagation Modeling and Analysis
-
Washington DC, USA, November
-
C. C. Zou, W. Gong, and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," in 9th ACM Conference on Computer and Communication Security (CCS'02), Washington DC, USA, November 2002.
-
(2002)
9th ACM Conference on Computer and Communication Security (CCS'02)
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
15
-
-
85084162258
-
How to Own the Internet in Your Spare Time
-
San Francisco, CA, USA, August
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in Your Spare Time," in Proceedings of the 11th USENIX Security Symposium (Security '02), San Francisco, CA, USA, August 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium (Security '02)
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
16
-
-
0042474227
-
Modeling the spread of active worms
-
San Franciso, CA, USA, April
-
Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in Proceedings of IEEE INFOCOM 2003, San Franciso, CA, USA, April 2003.
-
(2003)
Proceedings of IEEE INFOCOM 2003
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
17
-
-
33646150900
-
On the Performance of Internet Worm Scanning Strategies
-
July
-
C. Zou, D. Towsley, and W. Gong, "On the Performance of Internet Worm Scanning Strategies," Elsevier Journal of Performance Evaluation, vol. 63, no. 7, pp. 700-723, July 2006.
-
(2006)
Elsevier Journal of Performance Evaluation
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
-
18
-
-
14944358991
-
Preliminary results using scale-down to explore worm dynamics
-
Washington, DC, USA, October
-
N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson, "Preliminary results using scale-down to explore worm dynamics," in Proceedings of the Second Workshop on Rapid Malcode ACM-SIGSAC WOPM 2005, Washington, DC, USA, October 2004.
-
(2004)
Proceedings of the Second Workshop on Rapid Malcode ACM-SIGSAC WOPM 2005
-
-
Weaver, N.1
Hamadeh, I.2
Kesidis, G.3
Paxson, V.4
-
19
-
-
34748865726
-
Coupled Kermack-McKendrick model for randomly scanning worms
-
Sicily, Italy, February
-
G. Kesidis, I. Hamadeh, and S. Jiwasurat, "Coupled Kermack-McKendrick model for randomly scanning worms ," in Proceedings of QoS-IP, Sicily, Italy, February 2005.
-
(2005)
Proceedings of QoS-IP
-
-
Kesidis, G.1
Hamadeh, I.2
Jiwasurat, S.3
-
20
-
-
34748886424
-
Model of the spread of randomly scanning internet worms that saturate access links
-
to appear
-
G. Kesidis, M. Vojnovic, I. Hamadeh, Y. Jin, and S. Jiwasurat, "Model of the spread of randomly scanning internet worms that saturate access links," ACM Transactions on Modeling and Computer Simulation, 2006, to appear.
-
(2006)
ACM Transactions on Modeling and Computer Simulation
-
-
Kesidis, G.1
Vojnovic, M.2
Hamadeh, I.3
Jin, Y.4
Jiwasurat, S.5
-
21
-
-
31844441738
-
On the effectiveness of automatic patching
-
Fairfax, VA,USA, November
-
M. Vojnovic and A. J. Ganesh, "On the effectiveness of automatic patching," in Proceedings of the Third Workshop on Rapid Malcode ACM-SIGSAC WORM 2005, Fairfax, VA,USA, November 2005.
-
(2005)
Proceedings of the Third Workshop on Rapid Malcode ACM-SIGSAC WORM 2005
-
-
Vojnovic, M.1
Ganesh, A.J.2
-
22
-
-
84948951525
-
Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code
-
Las Vegas, NV, USA
-
M. Williamson, "Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code," in Proceedings of the ASAC Security Conference, Las Vegas, NV, USA, 2002.
-
(2002)
Proceedings of the ASAC Security Conference
-
-
Williamson, M.1
-
23
-
-
84860603040
-
Implementing and testing a- virus throttle
-
Washington, DC, USA, August
-
J. Twycross and M. Williamson, "Implementing and testing a- virus throttle," in Proceedings of 12th USENIX Security Symposium, Washington, DC, USA, August 2003.
-
(2003)
Proceedings of 12th USENIX Security Symposium
-
-
Twycross, J.1
Williamson, M.2
-
24
-
-
34748923821
-
Fairness, incentives and performance in peer-to-peer networks
-
Monticello, IL, USA, October
-
G. Veciana and X. Yang, "Fairness, incentives and performance in peer-to-peer networks," in Proceedings of the Forty-First Annual Allerton Conference on Control, Communications and Computing, Monticello, IL, USA, October 2003.
-
(2003)
Proceedings of the Forty-First Annual Allerton Conference on Control, Communications and Computing
-
-
Veciana, G.1
Yang, X.2
-
25
-
-
24144496767
-
Modeling and performance analysis of BitTorrent-like peer-to-peer networks
-
Portland, Oregon, USA, August
-
D. Qiu and R. Srikant, "Modeling and performance analysis of BitTorrent-like peer-to-peer networks," in Proceedings of the ACM SIGCOMM, Portland, Oregon, USA, August 2004.
-
(2004)
Proceedings of the ACM SIGCOMM
-
-
Qiu, D.1
Srikant, R.2
-
26
-
-
33750376884
-
Coupon Replication Systems
-
Banff, Alberta, Canada, June
-
L. Massoulie and M. Vojnovic, "Coupon Replication Systems," in ACM Sigmetrics 2005, Banff, Alberta, Canada, June 2005.
-
(2005)
ACM Sigmetrics 2005
-
-
Massoulie, L.1
Vojnovic, M.2
-
27
-
-
79957872505
-
Analyzing Cooperative Containment of Fast Scanning Worms
-
Cambridge, MA, USA, July
-
J. Kannan, L. Subramanian, I. Stoica, and R., H. Katz, "Analyzing Cooperative Containment of Fast Scanning Worms," in Proceedings of USENIX SRUTI 2005, Cambridge, MA, USA, July 2005.
-
(2005)
Proceedings of USENIX SRUTI 2005
-
-
Kannan, J.1
Subramanian, L.2
Stoica, I.3
Katz, R.H.4
-
29
-
-
34748876279
-
-
B. Cohen, Incentives to build robustness in BitTorrent, 2003, documentation from BitTorrent: http://www.bittorrent.com.
-
B. Cohen, "Incentives to build robustness in BitTorrent," 2003, documentation from BitTorrent: http://www.bittorrent.com.
-
-
-
|