-
1
-
-
58149103021
-
-
P-M. Bureau and A. Lee, Malware storms: a global climate change, Virus Bulletin www.virusbtn.com, November 2007.
-
P-M. Bureau and A. Lee, "Malware storms: a global climate change," Virus Bulletin www.virusbtn.com, November 2007.
-
-
-
-
3
-
-
70350241605
-
-
February 2007
-
J. Stewart, "Storm worm DDoS attack," http://www.secureworks. com/ research/threats/storm-worm, February 2007.
-
Storm worm DDoS attack
-
-
Stewart, J.1
-
4
-
-
58149096308
-
Expert: Botnets no. 1 emerging Internet threat
-
CNN Technology news, January
-
"Expert: Botnets no. 1 emerging Internet threat," CNN Technology news, www.Cnn.com/2006/TECH/internet/01/31/furst/, January 2006.
-
(2006)
-
-
-
5
-
-
58149102489
-
The botnet trackers
-
Washington Post Technology news, February
-
"The botnet trackers," Washington Post Technology news, www.washingtonpost.com/wp-dyn/content/article/2006/02/16/AR200602l601388.html, February 2006.
-
(2006)
-
-
-
6
-
-
58149083658
-
Attack of the zombie computers is growing threat
-
The New York Times Technology news, nytimes.com, January
-
"Attack of the zombie computers is growing threat," The New York Times Technology news, nytimes.com, January 2007.
-
(2007)
-
-
-
9
-
-
58149100231
-
2008 internet malware trends: Storm and the future of social engineering
-
CISCO and IronPort, "2008 internet malware trends: Storm and the future of social engineering," www.ironport.com/malwaretrends, 2008.
-
(2008)
-
-
CISCO1
IronPort2
-
10
-
-
58149089682
-
Storm significantly weekens & web-based malware on the rise
-
MessageLabs Intelligence:, April
-
MessageLabs, "Storm significantly weekens & web-based malware on the rise," MessageLabs Intelligence: www.messagelabs.com/mlireport/MLI- Report-April-2008.pdf, April 2008.
-
(2008)
-
-
-
12
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
July
-
E. Cooke, F. Jahanian, and D. McPherson, "The zombie roundup: Understanding, detecting, and disrupting botnets," in Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet SRUTI'05, July 2005.
-
(2005)
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet SRUTI'05
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
17
-
-
0038483826
-
Emergence of scaling in random networks
-
A. L. Barabási and R. Albert, "Emergence of scaling in random networks," Science, vol. 286, pp. 509-512, 1999.
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabási, A.L.1
Albert, R.2
-
18
-
-
58149100562
-
-
March 2001
-
"Gnutella," http://www.gnutella.com, March 2001.
-
-
-
-
19
-
-
0001540595
-
On random graphs I
-
P. Erdös and A. Rényi, "On random graphs I," Publ. Math., vol. 15, pp. 290-297, 1959.
-
(1959)
Publ. Math
, vol.15
, pp. 290-297
-
-
Erdös, P.1
Rényi, A.2
-
20
-
-
58149094732
-
Measuring large overlay networks the overnet example
-
May
-
K. Kutznet and T. Fuhrmann, "Measuring large overlay networks the overnet example." in KiVS, May 2006.
-
(2006)
KiVS
-
-
Kutznet, K.1
Fuhrmann, T.2
-
24
-
-
44649128920
-
-
Technical report, Computer Science Laboratory, SRI Internatal, October
-
P. Porras, H. Saidi, and V. Yegneswaran, "A multi-perspective analysis of the storm (peacomm) worm," Technical report, Computer Science Laboratory, SRI Internatal, October 2007.
-
(2007)
A multi-perspective analysis of the storm (peacomm) worm
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
25
-
-
49949109773
-
Know your enemy: Fast-flux service networks
-
Honeynet Project, July
-
"Know your enemy: Fast-flux service networks," Honeynet Project, www.honeynet.org/papers/honeynet, July 2007.
-
(2007)
-
-
-
26
-
-
33244496719
-
-
D. Dumitriu, E. Knightly, A. Kuzmanovic, 1. Stoica, and W. Zwaenepoel, Denial-of-service resilience in peer-to-peer file sharing systems, ACM SIGMETRICS Performance Evaluation Review, 33, pp. 38-49, June 2005.
-
D. Dumitriu, E. Knightly, A. Kuzmanovic, 1. Stoica, and W. Zwaenepoel, "Denial-of-service resilience in peer-to-peer file sharing systems," ACM SIGMETRICS Performance Evaluation Review, vol. 33, pp. 38-49, June 2005.
-
-
-
-
31
-
-
84876244094
-
Exploiting kad: Possible uses and misuses
-
October
-
M. Steiner, T. En-Najjary, and E. Biersack, "Exploiting kad: possible uses and misuses," ACM SIGCOMM Computer Communication Review, vol. 37, pp. 65-70, October 2007.
-
(2007)
ACM SIGCOMM Computer Communication Review
, vol.37
, pp. 65-70
-
-
Steiner, M.1
En-Najjary, T.2
Biersack, E.3
|