-
1
-
-
0242314805
-
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The spread of the sapphire/slammer worm," 2003.
-
(2003)
The spread of the sapphire/slammer worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
4
-
-
21644482790
-
Worm detection, early warning and response based on local victim information
-
Tucson, Arizona, dec
-
G. Gu, M. Sharif, X. Qin, D. Dagon, W. Lee, and G. Riley, "Worm detection, early warning and response based on local victim information," in Annual Computer Security Applications Conference, (Tucson, Arizona), dec 2004.
-
(2004)
Annual Computer Security Applications Conference
-
-
Gu, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
5
-
-
84892612179
-
An effective architecture and algorithm for detecting worms with various scan techniques
-
Feb
-
J. Wu, S. Vangala, L. Gao, and K. Kwiat, "An effective architecture and algorithm for detecting worms with various scan techniques," in Network and Distributed System Security Symposium, Feb 2004.
-
(2004)
Network and Distributed System Security Symposium
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
-
6
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
may
-
J. Jung, V. Paxson, A. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in IEEE Symposium on Security and Privacy, may 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
8
-
-
84991765629
-
Automated worm fingerprinting
-
Dec
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting," in ACM/USENIX Symposium on Operating System Design and Implementation, Dec 2004.
-
(2004)
ACM/USENIX Symposium on Operating System Design and Implementation
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
11
-
-
39049169334
-
-
Symantec early warning solutions
-
"Symantec early warning solutions."
-
-
-
-
12
-
-
39049085002
-
-
Internet storm center
-
"Internet storm center."
-
-
-
-
14
-
-
39049151456
-
-
Honeynet project: know your enemy
-
"Honeynet project: know your enemy."
-
-
-
-
15
-
-
28044442580
-
Honeystat: Local worm detection using honeypots
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, and H. Owen, "Honeystat: Local worm detection using honeypots," in Recent Advances In Intrusion Detection (RAID), 2004.
-
(2004)
Recent Advances In Intrusion Detection (RAID)
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
16
-
-
14644397228
-
Change-point monitoring for detection of dos attacks
-
H. Wang, D. Zhang, and K. G. Shin, "Change-point monitoring for detection of dos attacks," IEEE Transactions on Dependable and Secure Computing, vol. 1, no. 4, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.4
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
23
-
-
0242312718
-
Computing average run lengths for exponential cusum schemes source
-
F. Gan and K. Choi, "Computing average run lengths for exponential cusum schemes source," Journal of Quality Technology, vol. 26, no. 2, pp. 134-143.
-
Journal of Quality Technology
, vol.26
, Issue.2
, pp. 134-143
-
-
Gan, F.1
Choi, K.2
|