-
1
-
-
0024663403
-
With microscope and tweezers: An analysis of the Internet virus of November 1988
-
Washington: Computer Society Press of the IEEE
-
Eichin M, Rochlis J. With microscope and tweezers: An analysis of the Internet virus of November 1988. In: Proc. of the IEEE'89 Computer Society Symp. on Security and Privacy. Washington: Computer Society Press of the IEEE, 1989. 326-343. http://csdl2.computer.org/persagen/DLAbsToc.jsp-resourcePath=/dl/ proceedings/&toc=comp/proceedings/sp/1989/1939/00/1939toc.xml
-
(1989)
Proc. of the IEEE'89 Computer Society Symp. on Security and Privacy
, pp. 326-343
-
-
Eichin, M.1
Rochlis, J.2
-
2
-
-
34547187294
-
CERT advisory CA-1999-04 melissa macro virus
-
CERT
-
CERT. CERT advisory CA-1999-04 melissa macro virus. 1999. http://www.cert.org/advisories/ca-1999-04.html
-
(1999)
-
-
-
3
-
-
3042600178
-
CERT advisory CA-2000-04 love letter worm
-
CERT
-
CERT. CERT advisory CA-2000-04 love letter worm. 2000. http://www.cert.org/advisories/CA-2000-04.html
-
(2000)
-
-
-
4
-
-
33751574795
-
Research and development of instant messaging worms
-
in Chinese
-
Qing SH, Wang C, He JB, Li DZ. Research and development of instant messaging worms. Journal of Software, 2006, 17(10): 2118-2130 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/17/2118.htm
-
(2006)
Journal of Software
, vol.17
, Issue.10
, pp. 2118-2130
-
-
Qing, S.H.1
Wang, C.2
He, J.B.3
Li, D.Z.4
-
5
-
-
46449104702
-
The W32/Sobig.E@MM virus spreads steadily: Forges its 'from:' field
-
The W32/Sobig.E@MM virus spreads steadily: Forges its 'from:' field. http://virusbusters.itcs.umich.edu//sobig-e.html
-
-
-
-
6
-
-
14944376454
-
A study of mass-mailing worms
-
New York: Publications Dept., ACM, Inc.
-
Wong C, Bielski S, McCune JM, Wang CX. A study of mass-mailing worms. In: Proc. of the 2004 ACM Workshop on Rapid Malcode. New York: Publications Dept., ACM, Inc., 2004. 1-10. http://portal.acm.org/citation.cfm-id=1029618
-
(2004)
Proc. of the 2004 ACM Workshop on Rapid Malcode
, pp. 1-10
-
-
Wong, C.1
Bielski, S.2
McCune, J.M.3
Wang, C.X.4
-
7
-
-
33744940042
-
E-mail worm detection using the analysis of behavior
-
Berlin, Heidelberg: Springer-Verlag
-
Jiang T, Kim W, Lhee J, Hong M. E-mail worm detection using the analysis of behavior. In: Proc. of the 2nd Int'l Conf. on Distributed Computing and Internet Technology. LNCS 3816, Berlin, Heidelberg: Springer-Verlag, 2005. 348-356. http://www.springerlink.com/content/jr9435t76537/-p=be5b723ce 25946d288ea6ee0667cb743&pi=0
-
(2005)
Proc. of the 2nd Int'l Conf. on Distributed Computing and Internet Technology. LNCS 3816
, pp. 348-356
-
-
Jiang, T.1
Kim, W.2
Lhee, J.3
Hong, M.4
-
9
-
-
0032482432
-
Collective dynamic of Small World networks
-
Watts D, Strogatz S. Collective dynamic of Small World networks. Nature, 1998, 393(4): 440-442.
-
(1998)
Nature
, vol.393
, Issue.4
, pp. 440-442
-
-
Watts, D.1
Strogatz, S.2
-
10
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Atluri V.(ed.), New York: Publications Dept., ACM, Inc.
-
Zou CC, Gong W, Towsley D. Code red worm propagation modeling and analysis. In: Atluri V, ed. Proc. of the 9th ACM Symp. on Computer and Communication Security. New York: Publications Dept., ACM, Inc., 2002. 138-147.
-
(2002)
Proc. of the 9th ACM Symp. on Computer and Communication Security
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
12
-
-
34547208045
-
The impact of stochastic variance on worm propagation and detection
-
New York: Publications Dept., ACM, Inc
-
Nicol D. The impact of stochastic variance on worm propagation and detection. In: Proc. of the 2006 ACM Workshop on Rapid Malcode. New York: Publications Dept., ACM, Inc, 2006. 57-63. http://portal.acm.org/citation.cfm-id=1103626
-
(2006)
Proc. of the 2006 ACM Workshop on Rapid Malcode
, pp. 57-63
-
-
Nicol, D.1
-
15
-
-
84880028758
-
A mixed abstraction level simulation model of large-scale Internet worm infestations
-
Washington: Computer Society Press of the IEEE
-
Liljenstam M, Yuan Y, Premore B, Nicol D. A mixed abstraction level simulation model of large-scale Internet worm infestations. In: Proc. of the 10th IEEE Int'l Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems. Washington: Computer Society Press of the IEEE, 2002. 109-116.
-
(2002)
Proc. of the 10th IEEE Int'l Symp. on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
, pp. 109-116
-
-
Liljenstam, M.1
Yuan, Y.2
Premore, B.3
Nicol, D.4
-
16
-
-
21644482114
-
High-Fidelity modeling of computer network worms
-
Washington: Computer Society Press of the IEEE
-
Perumalla KS, Sundaragopalan S. High-Fidelity modeling of computer network worms. In: Proc. of the 20th Annual Computer Security Applications Conf. Washington: Computer Society Press of the IEEE, 2004. 126-135. http://ieeexplore.ieee.org/xpl/RecentCon.jsp-punumber=9473
-
(2004)
Proc. of the 20th Annual Computer Security Applications Conf
, pp. 126-135
-
-
Perumalla, K.S.1
Sundaragopalan, S.2
-
17
-
-
14944350556
-
Email virus propagation modeling and analysis
-
Technical Report, TR-03-CSE-04
-
Zou CC, Towsley D, Gong W. Email virus propagation modeling and analysis. Technical Report, TR-03-CSE-04, 2003. http://www.ists.dartmouth.edu/library/258.pdf
-
(2003)
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
18
-
-
12244311689
-
A taxonomy of computer worms
-
New York: Publications Dept., ACM, Inc.
-
Weaver N, Paxson V, Staniford S, Cunningham R. A taxonomy of computer worms. In: Proc of the 2003 ACM Workshop on Rapid Malcode. New York: Publications Dept., ACM, Inc., 2003. 11-18. http://portal.acm.org/citation.cfm-id=948187
-
(2003)
Proc of the 2003 ACM Workshop on Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
19
-
-
0037861702
-
Instant messaging as a scale-free network
-
Smith RD. Instant messaging as a scale-free network. 2006. http://arxiv.org/abs/cond-mat/0206378
-
(2006)
-
-
Smith, R.D.1
-
20
-
-
46449123234
-
W32.Serflog.A@mm
-
W32.Serflog.A@mm. http://securityresponse.symantec.com/avcenter/venc/data/w32. serflog.a@mm.html
-
-
-
-
21
-
-
46449089536
-
W32.Aplore@mm
-
W32.Aplore@mm. http://securityresponse.symantec.com/avcenter/venc/data/w32. aplore@mm.html
-
-
-
-
22
-
-
46449085361
-
W32.AimVen@mm
-
W32.AimVen@mm. http://securityresponse.symantec.com/avcenter/venc/data/ w32.aimven.worm.html
-
-
-
-
23
-
-
0033487710
-
Scaling and percolation in the Small World network model
-
Newman MEJ, Watts DJ. Scaling and percolation in the Small World network model. Physical Review E, 2002, 60(6): 7332-7342.
-
(2002)
Physical Review E
, vol.60
, Issue.6
, pp. 7332-7342
-
-
Newman, M.E.J.1
Watts, D.J.2
-
24
-
-
85084162258
-
How to own the Internet in your spare time
-
Boneh D.(ed.), Berkeley: The USENIX Association
-
Staniford S, Paxson V, Weaver N. How to own the Internet in your spare time. In: Boneh D, ed. Proc. of the USENIX Security Symp. 2002. Berkeley: The USENIX Association, 2002. 149-167.
-
(2002)
Proc. of the USENIX Security Symp. 2002
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
|