-
1
-
-
84857671018
-
Peer to Peer Networks for Defense Against Internet Worms
-
Pisa, Italy, Oct
-
S. Shakkottai and R. Srikant, "Peer to Peer Networks for Defense Against Internet Worms," in the Workshop on Interdisciplinary Systems Approach, in Performance Evaluation and Design of Computer & Communications Systems (Inter-Perf 2006), Pisa, Italy, Oct. 2006.
-
(2006)
Workshop on Interdisciplinary Systems Approach, in Performance Evaluation and Design of Computer & Communications Systems (Inter-Perf
-
-
Shakkottai, S.1
Srikant, R.2
-
3
-
-
26844502466
-
A preliminary simulation of the effect of scanning worm activity on multicast
-
Monterey, CA, USA, June
-
I. Hamadeh, J. Hart, G. Kesidis, and V. Pothamsetty, "A preliminary simulation of the effect of scanning worm activity on multicast," in Proc. Workshop on Principles of Advanced and Distributed Simulation (PADS), Monterey, CA, USA, June 2005.
-
(2005)
Proc. Workshop on Principles of Advanced and Distributed Simulation (PADS)
-
-
Hamadeh, I.1
Hart, J.2
Kesidis, G.3
Pothamsetty, V.4
-
4
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
Marseille, France, November
-
D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm," in Proc. Internet Measurement Workshop (IMW), Marseille, France, November 2002.
-
(2002)
Proc. Internet Measurement Workshop (IMW)
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
5
-
-
0742276097
-
Inside the Slammer worm
-
July
-
D. Moore, V. Paxson, S. Savage, C Shannon, S. Stamford, and N. Weaver, "Inside the Slammer worm," IEEE Security and Privacy Mag., vol. 1, no. 4, pp. 33-39, July 2003.
-
(2003)
IEEE Security and Privacy Mag
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Stamford, S.5
Weaver, N.6
-
6
-
-
24344436426
-
The Blaster worm: Then and
-
July
-
M. Bailey, E. Cooke, F. Jahanian, and D. Watson, "The Blaster worm: Then and Now," IEEE Security and Privacy Mag., vol. 3, no. 4, pp. 26-31, July 2005.
-
(2005)
IEEE Security and Privacy Mag
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Watson, D.4
-
7
-
-
28044469549
-
The monitoring and early detection of Internet worms
-
October
-
C. C. Zou, W. Gong, D. Towsley, and L. Gao, "The monitoring and early detection of Internet worms," IEEE/ACM Trans. Networking, vol. 13, no. 5, pp. 961-974, October 2005.
-
(2005)
IEEE/ACM Trans. Networking
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
Gao, L.4
-
8
-
-
28044457069
-
Network telescopes
-
Technical report, Cooperative Association for Internet Data Analysis (CAIDA) Technical Report
-
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Network telescopes: Technical report," 2004, Cooperative Association for Internet Data Analysis (CAIDA) Technical Report.
-
(2004)
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
9
-
-
34748825897
-
P2P systems for worm detection
-
Piscataway, NJ,USA, September
-
J. Sandin, "P2P systems for worm detection," in DIMACS Worksliop on large scale attacks, Piscataway, NJ,USA, September 2003.
-
(2003)
DIMACS Worksliop on large scale attacks
-
-
Sandin, J.1
-
10
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
Brighton, United Kingdom, October
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham, "Vigilante: End-to-End Containment of Internet Worms," in Proc. 20th ACM Symposium on Operating Systems Principles (SOSP '05), Brighton, United Kingdom, October 2005.
-
(2005)
Proc. 20th ACM Symposium on Operating Systems Principles (SOSP '05)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
11
-
-
84948951525
-
Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code
-
Las Vegas, NV, USA
-
M. Williamson, "Throttling Viruses: Restricting Propagation to Defeat Malicious Mobile Code," in Proc. ASAC Security Conference, Las Vegas, NV, USA, 2002.
-
(2002)
Proc. ASAC Security Conference
-
-
Williamson, M.1
-
12
-
-
84860603040
-
Implementing and testing a virus throttle
-
Washington, DC, USA, August
-
J. Twycross and M. Williamson, "Implementing and testing a virus throttle," in Proc. 12th USENIX Security Symposium, Washington, DC, USA, August 2003.
-
(2003)
Proc. 12th USENIX Security Symposium
-
-
Twycross, J.1
Williamson, M.2
-
13
-
-
0000660738
-
Strong approximation theorems for density dependent markov chains
-
T. G. Kurtz, "Strong approximation theorems for density dependent markov chains," Stochastic Processes and their Applications, vol. 6, pp. 223-240, 1978.
-
(1978)
Stochastic Processes and their Applications
, vol.6
, pp. 223-240
-
-
Kurtz, T.G.1
-
16
-
-
0038349210
-
Code Red Worm Propagation Modeling and Analysis
-
Washington DC, USA, November
-
C. C. Zou, W. Gong, and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," in 9th ACM Conference on Computer and Communication Security (CCS'02), Washington DC, USA, November 2002.
-
(2002)
9th ACM Conference on Computer and Communication Security (CCS'02)
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
17
-
-
85084162258
-
How to Own the Internet in Your Spare Time
-
San Francisco, CA, USA, August
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in Your Spare Time," in Proc. 11th USENIX Security Symposium (Security '02), San Francisco, CA, USA, August 2002.
-
(2002)
Proc. 11th USENIX Security Symposium (Security '02)
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
18
-
-
0042474227
-
Modeling the spread of active worms
-
San Franciso, CA, USA, April
-
Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in Proc. IEEE INFOCOM 2003, San Franciso, CA, USA, April 2003.
-
(2003)
Proc. IEEE INFOCOM 2003
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
19
-
-
33646150900
-
On the Performance of Internet Worm Scanning Strategies
-
July
-
C. Zou, D. Towsley, and W. Gong, "On the Performance of Internet Worm Scanning Strategies," Elsevier Journal of Performance Evaluation, vol. 63, no. 7, pp. 700-723, July 2006.
-
(2006)
Elsevier Journal of Performance Evaluation
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
-
20
-
-
14944358991
-
Preliminary results using scale-down to explore worm dynamics
-
Washington, DC, USA, October
-
N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson, "Preliminary results using scale-down to explore worm dynamics," in Proc. Second Workshop on Rapid Malcode ACM-SIGSAC WORM 2005, Washington, DC, USA, October 2004.
-
(2004)
Proc. Second Workshop on Rapid Malcode ACM-SIGSAC WORM 2005
-
-
Weaver, N.1
Hamadeh, I.2
Kesidis, G.3
Paxson, V.4
-
21
-
-
34748865726
-
Coupled Kermack-McKendrick model for randomly scanning worms
-
Sicily, Italy, February
-
G. Kesidis, I. Hamadeh, and S. Jiwasurat, "Coupled Kermack-McKendrick model for randomly scanning worms ," in Proc. QoS-IP, Sicily, Italy, February 2005.
-
(2005)
Proc. QoS-IP
-
-
Kesidis, G.1
Hamadeh, I.2
Jiwasurat, S.3
-
22
-
-
34748886424
-
Model of the spread of randomly scanning Internet worms that saturate access links
-
to appear
-
G. Kesidis, M. Vojnovic, I. Hamadeh, Y. Jin, and S. Jiwasurat, "Model of the spread of randomly scanning Internet worms that saturate access links," ACM Trans. Modeling and Computer Simulation, 2006, to appear.
-
(2006)
ACM Trans. Modeling and Computer Simulation
-
-
Kesidis, G.1
Vojnovic, M.2
Hamadeh, I.3
Jin, Y.4
Jiwasurat, S.5
-
23
-
-
31844441738
-
On the effectiveness of automatic patching
-
Fairfax, VA,USA, November
-
M. Vojnović and A. J. Ganesh, "On the effectiveness of automatic patching," in Proc. Third Workshop on Rapid Malcode ACM-SIGSAC WORM 2005, Fairfax, VA,USA, November 2005.
-
(2005)
Proc. Third Workshop on Rapid Malcode ACM-SIGSAC WORM 2005
-
-
Vojnović, M.1
Ganesh, A.J.2
-
24
-
-
79957872505
-
Analyzing Cooperative Containment of Fast Scanning Worms
-
Cambridge, MA, USA, July
-
J. Kannan, L. Subramanian, I. Stoica, and R. H. Katz, "Analyzing Cooperative Containment of Fast Scanning Worms," in Proc. USENIX SRUTI2005, Cambridge, MA, USA, July 2005.
-
(2005)
Proc. USENIX SRUTI2005
-
-
Kannan, J.1
Subramanian, L.2
Stoica, I.3
Katz, R.H.4
-
26
-
-
36749010570
-
-
B. Cohen, Incentives to build robustness in BitTorrent, 2003, documentation from BitTorrent: http://www.bittor.rent.com.
-
B. Cohen, "Incentives to build robustness in BitTorrent," 2003, documentation from BitTorrent: http://www.bittor.rent.com.
-
-
-
|