-
1
-
-
34948827892
-
-
D. Moore, C. Shannon, and J. Brown. Code-Red: a case study on the spread and victims of an Internet worm. In Proceedings of the second ACM SIGCOMM Workshop on Internet Measurement, November 2002.
-
D. Moore, C. Shannon, and J. Brown. Code-Red: a case study on the spread and victims of an Internet worm. In Proceedings of the second ACM SIGCOMM Workshop on Internet Measurement, November 2002.
-
-
-
-
3
-
-
34948823177
-
-
eEye Digital Security, ANALYSIS: CodeRed II Worm.http://www.eeye.com/ html/Research/Advisories/AL20010804.html
-
eEye Digital Security, ANALYSIS: CodeRed II Worm.http://www.eeye.com/ html/Research/Advisories/AL20010804.html
-
-
-
-
4
-
-
0742276097
-
Inside the slammer worm
-
Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N. Inside the slammer worm. IEEE Magazine of Security and Privacy, 2003,1(4):33-39.
-
(2003)
IEEE Magazine of Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
6
-
-
26844466732
-
Fast Detection of Scanning Worm Infections
-
France, September
-
Stuart Schechter, Jaeyeon Jung, and Arthur W.Berger. Fast Detection of Scanning Worm Infections.In 7th International Symposium on Recent Advancesin Intrusion Detection (RAID), French Riviera, France, September 2004
-
(2004)
7th International Symposium on Recent Advancesin Intrusion Detection (RAID), French Riviera
-
-
Schechter, S.1
Jung, J.2
Berger, A.W.3
-
7
-
-
85084163246
-
Autograph : Toward automated , distributed worm signature detection
-
San Diego, CA
-
Kim H. , Karp B. . Autograph : Toward automated , distributed worm signature detection. In : Proceedings of the USENIX Security, San Diego, CA, 2004, 271-286.
-
(2004)
Proceedings of the USENIX Security
, pp. 271-286
-
-
Kim, H.1
Karp, B.2
-
8
-
-
84991765629
-
Savage S.Automated worm fingerprinting
-
San Francisco, CA
-
Singh S.,Estan C.,Varghese G.,Savage S.Automated worm fingerprinting. In : Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), San Francisco, CA, 2004, 45-60.
-
(2004)
Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI)
, pp. 45-60
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
-
9
-
-
27544498978
-
-
Newsome J., Karp B., Song D.Polygraph:Automatically generating signatures for polymorphic worms.In:Proceedings of the IEEE S &P 2005, Oakland, California, 2005, 226-241
-
Newsome J., Karp B., Song D.Polygraph:Automatically generating signatures for polymorphic worms.In:Proceedings of the IEEE S &P 2005, Oakland, California, 2005, 226-241
-
-
-
-
12
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Washington,DC, Nov
-
C.C. Zou, W. Gong, and D. Towsley. Code red worm propagation modeling and analysis. In: Proc. 9th ACM Conference on Computer and Communication Security (CCS'02), Washington,DC, Nov. 2002.138-147.
-
(2002)
Proc. 9th ACM Conference on Computer and Communication Security (CCS'02)
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
13
-
-
24144441166
-
-
G. Kesidis, I. Hamadeh, and S. Jiwasurat. Coupled kermack-mckendrick models for randomly scanning and bandwidth-saturating internet worms. In:Proceedings of 3rd International Workshop on QoS in Multiservice IP Networks QoS-IP, February 2005.101-109.
-
G. Kesidis, I. Hamadeh, and S. Jiwasurat. Coupled kermack-mckendrick models for randomly scanning and bandwidth-saturating internet worms. In:Proceedings of 3rd International Workshop on QoS in Multiservice IP Networks QoS-IP, February 2005.101-109.
-
-
-
-
14
-
-
33646397291
-
Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy In
-
Melbourne, October
-
Dan Wu, Dongyang Long, Changji Wang, and Zhanpeng Guan. Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy In: Proc. of the 6th International Conference on Algorithms and Architectures for Parallel Processing, Melbourne, October 2005:370-375.
-
(2005)
Proc. of the 6th International Conference on Algorithms and Architectures for Parallel Processing
, pp. 370-375
-
-
Wu, D.1
Long, D.2
Wang, C.3
Guan, Z.4
-
16
-
-
35948965217
-
WORM: Preliminary Study of an ActiveCounter-Attack Mechanism
-
Staniford S, ed, Washington
-
Frank Castaneday, Emre Can Sezery, Jun Xu. WORM vs. WORM: Preliminary Study of an ActiveCounter-Attack Mechanism. In: Staniford S, ed. Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2004), Washington, 2004.
-
(2004)
Proc. of the ACM CCS Workshop on Rapid Malcode (WORM
-
-
Castaneday, F.1
Can Sezery, E.2
Xu, J.3
vs, W.O.R.M.4
-
17
-
-
34948837710
-
-
Markus Kern. Re: Codegreen beta release, http://online.securityfocus.com/ archive/82/211462.
-
Markus Kern. Re: Codegreen beta release, http://online.securityfocus.com/ archive/82/211462.
-
-
-
-
18
-
-
20444443538
-
-
Washington: Prentice Hall Professional Technical Reference
-
Ed Skoudis, Lenny Zeltser Malware: Fighting Malicious Code Washington: Prentice Hall Professional Technical Reference,2003.104-111.
-
(2003)
Fighting Malicious Code
, pp. 104-111
-
-
Skoudis, E.1
Zeltser Malware, L.2
|