-
1
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
Marseille, France, November
-
D. Moore, C. Shannon, and J. Brown, "Code-red: a case study on the spread and victims of an internet worm," in Proceedings of 2-th Internet Measurement Workshop (IMW), Marseille, France, November 2002.
-
(2002)
Proceedings of 2-th Internet Measurement Workshop (IMW)
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
3
-
-
84860927616
-
-
CERT
-
CERT, CERT/CC advisories, http://www.cert.org/advisories/.
-
CERT/CC advisories
-
-
-
4
-
-
84941175590
-
-
W32/MyDoom.B Virus, http://www.us-cert.gov/cas/techalerts/TA04- 028A.html.
-
W32/MyDoom.B Virus
-
-
-
5
-
-
39049164715
-
-
W32.Sircam.Worm@mm, http://www.symantec.com/avcenter/venc/data/ w32.sircam.worm@mm.html.
-
W32.Sircam.Worm@mm, http://www.symantec.com/avcenter/venc/data/ w32.sircam.worm@mm.html.
-
-
-
-
6
-
-
39049107025
-
-
Worm.ExploreZip, http://www.symantec.com/avcenter/venc/data/worm. explore.zip.html.
-
Worm.ExploreZip
-
-
-
8
-
-
0038349210
-
Code-red worm propagation modeling and analysis
-
Washington DC, November
-
C. C. Zou, W. Gong, and D. Towsley, "Code-red worm propagation modeling and analysis," in Proceedings of the 9-th ACM Conference on Computer and Communication Security (CCS), Washington DC, November 2002.
-
(2002)
Proceedings of the 9-th ACM Conference on Computer and Communication Security (CCS)
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
9
-
-
85084162258
-
How to own the internet in your spare time
-
San Francisco, CA, August
-
S. Staniford, V. Paxson, and N. Weaver, "How to own the internet in your spare time," in Proceedings of the 11-th USENIX Security Symposium, San Francisco, CA, August 2002.
-
(2002)
Proceedings of the 11-th USENIX Security Symposium
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
10
-
-
0042474227
-
Modeling the spread of active worms
-
San Francisco, CA, March
-
Z. S. Chen, L.X. Gao, and K. Kwiat, "Modeling the spread of active worms," in Proceedings of the IEEE Conference on Computer Communications (INFOCOM), San Francisco, CA, March 2003.
-
(2003)
Proceedings of the IEEE Conference on Computer Communications (INFOCOM)
-
-
Chen, Z.S.1
Gao, L.X.2
Kwiat, K.3
-
11
-
-
0042474229
-
Modeling malware spreading dynamics
-
San Francisco, CA, March
-
M. Garetto, W. B. Gong, and D. Towsley, "Modeling malware spreading dynamics," in Proceedings of the IEEE Conference on Computer Communications (INFOCOM), San Francisco, CA, March 2003.
-
(2003)
Proceedings of the IEEE Conference on Computer Communications (INFOCOM)
-
-
Garetto, M.1
Gong, W.B.2
Towsley, D.3
-
12
-
-
26844510250
-
Monitoring and early detection for internet worms
-
Washington DC, October
-
C. Zou, W. B. Gong, D. Towsley, and L. X. Gao, "Monitoring and early detection for internet worms," in Proceedings of the 10-th ACM Conference on Computer and Communication Security (CCS), Washington DC, October 2003.
-
(2003)
Proceedings of the 10-th ACM Conference on Computer and Communication Security (CCS)
-
-
Zou, C.1
Gong, W.B.2
Towsley, D.3
Gao, L.X.4
-
13
-
-
33749864044
-
New streaming algorithms for superspreader detection
-
San Diego, CA, Febrary
-
S. Venkataraman, D. Song, P. Gibbons, and A. Blum, "New streaming algorithms for superspreader detection," in Proceedings of the 12-th IEEE Network and Distributed Systems Security Symposium (NDSS), San Diego, CA, Febrary 2005.
-
(2005)
Proceedings of the 12-th IEEE Network and Distributed Systems Security Symposium (NDSS)
-
-
Venkataraman, S.1
Song, D.2
Gibbons, P.3
Blum, A.4
-
14
-
-
84892612179
-
An effective architecture and algorithm for detecting worms with various scan techniques
-
San Diego, CA, Febrary
-
J. Wu, S. Vangala, and L. X. Gao, "An effective architecture and algorithm for detecting worms with various scan techniques," in Proceedings of the 11-th IEEE Network and Distributed System Security Symposium (NDSS), San Diego, CA, Febrary 2004.
-
(2004)
Proceedings of the 11-th IEEE Network and Distributed System Security Symposium (NDSS)
-
-
Wu, J.1
Vangala, S.2
Gao, L.X.3
-
17
-
-
14944341848
-
On the design and utility of internet sinks for network abuse monitoring
-
Pittsburgh, PA, September
-
V. Yegneswaran, P. Barford, and D. Plonka, "On the design and utility of internet sinks for network abuse monitoring," in Proceeding of Symposium on Recent Advances in Intrusion Detection (RAID), Pittsburgh, PA, September 2003.
-
(2003)
Proceeding of Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Yegneswaran, V.1
Barford, P.2
Plonka, D.3
-
18
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA, May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in Proceedings of the 25-th IEEE Symposium on Security and Privacy, Oakland, CA, May 2004.
-
(2004)
Proceedings of the 25-th IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
19
-
-
21644482790
-
Worm detection, early warning, and response based on local victim information
-
Tucson, Arizona, December
-
G. F. Gu, D. Dagon, M. I. Sharif X. Z. Qin, W. Lee, and G. F. Riley, "Worm detection, early warning, and response based on local victim information," in Proceedings of Proceedings of the 20-th Annual Computer Security Applications Conference (ACSAC 2004), Tucson, Arizona, December 2004.
-
(2004)
Proceedings of Proceedings of the 20-th Annual Computer Security Applications Conference (ACSAC 2004)
-
-
Gu, G.F.1
Dagon, D.2
Sharif, M.I.3
Qin, X.Z.4
Lee, W.5
Riley, G.F.6
-
20
-
-
84991765629
-
Automated worm fingerprinting
-
San Francisco, CA, December
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting," in Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation, San Francisco, CA, December 2004.
-
(2004)
Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
22
-
-
39049121278
-
-
Linux.com, Understanding Stealth Scans: Forewarned is Forearmed, http://security.itworld.com/4363/LWD010321vcontrol3/page1.html.
-
Linux.com, Understanding Stealth Scans: Forewarned is Forearmed, http://security.itworld.com/4363/LWD010321vcontrol3/page1.html.
-
-
-
-
23
-
-
39049117488
-
-
Solar Designer, Designing and Attacking Port Scan Detection Tools, http://www.phrack.org/phrack/53/P53-13.
-
Solar Designer, Designing and Attacking Port Scan Detection Tools, http://www.phrack.org/phrack/53/P53-13.
-
-
-
-
25
-
-
11144286121
-
The spectral autocorrelation peak valley ratio (sapvr) - a usable speech measure employed as a co-channel detection system
-
Budapest, Hungary, May
-
R. E. Yantorno, K. R. Krishnamachari, J. M. Lovekin, D. S. Benincasa, and S. J. Wenndt, "The spectral autocorrelation peak valley ratio (sapvr) - a usable speech measure employed as a co-channel detection system," in Proceedings of IEEE International Workshop on Intelligent Signal Processing (WISP), Budapest, Hungary, May 2001.
-
(2001)
Proceedings of IEEE International Workshop on Intelligent Signal Processing (WISP)
-
-
Yantorno, R.E.1
Krishnamachari, K.R.2
Lovekin, J.M.3
Benincasa, D.S.4
Wenndt, S.J.5
|