-
1
-
-
16344396406
-
-
C. C. Zou, L. Gao, W. Gong, D. Towsley.: Monitoring and Early Warning for Internet Worms. In Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS '2003). Washington D. C., USA: ACM Press, Oct. 2003, pp. 190-199.
-
C. C. Zou, L. Gao, W. Gong, D. Towsley.: Monitoring and Early Warning for Internet Worms. In Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS '2003). Washington D. C., USA: ACM Press, Oct. 2003, pp. 190-199.
-
-
-
-
2
-
-
0042474227
-
-
Z. Chen, L. Gao, K. Kwiat.: Modeling the Spread of Active Worms. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM' 2003), San Francisco, California, USA, Mar. 2003, pp. 1890-1900
-
Z. Chen, L. Gao, K. Kwiat.: Modeling the Spread of Active Worms. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM' 2003), San Francisco, California, USA, Mar. 2003, pp. 1890-1900
-
-
-
-
3
-
-
63249116509
-
A survey and trends on Internet worms
-
Sihan Qing, Weiping Wen, et al..: A survey and trends on Internet worms. Journal of Software, 2004, 15(8):1208-1219
-
(2004)
Journal of Software
, vol.15
, Issue.8
, pp. 1208-1219
-
-
Qing, S.1
Wen, W.2
-
4
-
-
63249103601
-
-
Thomas M. Chen. : Intrusion detection for Viruses and Worms. In: IEC Annual Review of Communications, 2004
-
Thomas M. Chen. : Intrusion detection for Viruses and Worms. In: IEC Annual Review of Communications, 2004
-
-
-
-
5
-
-
0037142572
-
Anomaly inrusion detection method based on HMM
-
No: 20020467
-
Qiao Y., X. W. Xin, Y. Bin, S. Ge, "Anomaly inrusion detection method based on HMM", IEEE Electronic Letters Online No: 20020467, 2002
-
(2002)
IEEE Electronic Letters Online
-
-
Qiao, Y.1
Xin, X.W.2
Bin, Y.3
Ge, S.4
-
6
-
-
63249136725
-
-
Martin Roesch.: Snort-Lightweight Intrusion Detection for Networks[EB/OI.]. Http://www.snort.org/docs/lisapper.txt, 2003-02-20
-
Martin Roesch.: Snort-Lightweight Intrusion Detection for Networks[EB/OI.]. Http://www.snort.org/docs/lisapper.txt, 2003-02-20
-
-
-
-
8
-
-
63249123485
-
-
C. Kreibich, J. Crowcroft.: Honeycomb-Creating Intrusion Detection Signatures Using Honeypots. In Proceedings of the 2nd Workshop on Hot Topics in Networks (HotNets-II), November 2003
-
C. Kreibich, J. Crowcroft.: Honeycomb-Creating Intrusion Detection Signatures Using Honeypots. In Proceedings of the 2nd Workshop on Hot Topics in Networks (HotNets-II), November 2003
-
-
-
-
10
-
-
84991765629
-
-
S. Singh, C. Estan, G. Varghese, S. Savage.: Automated worm fingerprinting. In Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation, Dec. 2004
-
S. Singh, C. Estan, G. Varghese, S. Savage.: Automated worm fingerprinting. In Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation, Dec. 2004
-
-
-
-
11
-
-
14944379887
-
-
Daniel R. Ellis, john G. Aiken, Kira S. Attwood, Scott D. Tenaglia.:. A Behavioral Approach to Worm Detection[C]. In: Proceedings of ACM Workshop on Rapid Malcode(WORM), New York:ACM Press, 2004.43-53
-
Daniel R. Ellis, john G. Aiken, Kira S. Attwood, Scott D. Tenaglia.:. A Behavioral Approach to Worm Detection[C]. In: Proceedings of ACM Workshop on Rapid Malcode(WORM), New York:ACM Press, 2004.43-53
-
-
-
-
12
-
-
33749830186
-
large scale network worm detection using automatic signature extraction[J]
-
Ping W, Binxing F.: large scale network worm detection using automatic signature extraction[J], journal on communications, 2006, 27(6): 87-93
-
(2006)
journal on communications
, vol.27
, Issue.6
, pp. 87-93
-
-
Ping, W.1
Binxing, F.2
|