-
1
-
-
77953145744
-
A Survey of Internet Worm Detection and Containment
-
1st quarter
-
P. Li, M. Salour, and X. Su, "A Survey of Internet Worm Detection and Containment," IEEE Communications Surveys & Tutorials, vol. 10, no. 1, pp. 20-35, 1st quarter, 2008.
-
(2008)
IEEE Communications Surveys & Tutorials
, vol.10
, Issue.1
, pp. 20-35
-
-
Li, P.1
Salour, M.2
Su, X.3
-
3
-
-
66549094338
-
-
J. Kim, W.O. Wilson, U. Aickelin, and J. McLeod, Cooperative Automated Worm Response and Detection ImmuNe Algorithm (CARDINAL) Inspired by T-cell Immunity and Tolerance, Proc. Int'l Conf. on Artificial Immune Systems, LNCS 3627, Banff, Canada, 2007.
-
J. Kim, W.O. Wilson, U. Aickelin, and J. McLeod, "Cooperative Automated Worm Response and Detection ImmuNe Algorithm (CARDINAL) Inspired by T-cell Immunity and Tolerance," Proc. Int'l Conf. on Artificial Immune Systems, LNCS 3627, Banff, Canada, 2007.
-
-
-
-
4
-
-
17444402134
-
-
J. Kim, S. Radhakrishnan, and S.K. Dhall, Measurement and Analysis of Worm Propagation on Internet Network Topology, Proc. Int'l Conf. on Computer Communications and Networks (ICCCN'04), pp. 495-500, Chicago, Oct. 2004.
-
J. Kim, S. Radhakrishnan, and S.K. Dhall, "Measurement and Analysis of Worm Propagation on Internet Network Topology," Proc. Int'l Conf. on Computer Communications and Networks (ICCCN'04), pp. 495-500, Chicago, Oct. 2004.
-
-
-
-
5
-
-
14944367812
-
-
F. Castaneda, E.C. Sezer, and J. Xu, Worm vs. Worm: Preliminary Study of an Active Counter-Attack Mechanism, Proc. 2003 ACM Workshop on Rapid Malcode (WORM'04), pp. 83-93, Washington, DC, Oct. 2004.
-
F. Castaneda, E.C. Sezer, and J. Xu, "Worm vs. Worm: Preliminary Study of an Active Counter-Attack Mechanism," Proc. 2003 ACM Workshop on Rapid Malcode (WORM'04), pp. 83-93, Washington, DC, Oct. 2004.
-
-
-
-
6
-
-
43649100273
-
Modeling and Automated Containment of Worms
-
April
-
S.H. Selke, N.B. Shroff, and S. Bagchi, "Modeling and Automated Containment of Worms," IEEE Trans. on Dependable and Secure Computing, vol. 5, no. 2, pp. 71-86, April 2008.
-
(2008)
IEEE Trans. on Dependable and Secure Computing
, vol.5
, Issue.2
, pp. 71-86
-
-
Selke, S.H.1
Shroff, N.B.2
Bagchi, S.3
-
7
-
-
39449122187
-
Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model
-
Feb
-
X. Yan and Y. Zou, "Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model," ETRI Journal, vol. 30, no. 1, pp. 81-88, Feb. 2008.
-
(2008)
ETRI Journal
, vol.30
, Issue.1
, pp. 81-88
-
-
Yan, X.1
Zou, Y.2
-
8
-
-
34948870917
-
-
H. Zhou, Y. Wen, and H. Zhao, Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms, Proc. IEEE Int'l Conf. on Networking (ICN'07), 2007.
-
H. Zhou, Y. Wen, and H. Zhao, "Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms," Proc. IEEE Int'l Conf. on Networking (ICN'07), 2007.
-
-
-
-
9
-
-
0042474227
-
Modeling the Spread of Active Worms
-
Z. Chen, L. Gao, and K. Kwiat, "Modeling the Spread of Active Worms," Proc. IEEE INFOCOM, vol. 3, pp. 1890-1900, 2003.
-
(2003)
Proc. IEEE INFOCOM
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
10
-
-
3042542433
-
-
R. Dantu, J. Cangussu, and A. Yelimeli, Dynamic Control of Worm Propagation, Proc. Int'l Conf. Information Technology: Coding and Computing (ITCC), 2004.
-
R. Dantu, J. Cangussu, and A. Yelimeli, "Dynamic Control of Worm Propagation," Proc. Int'l Conf. Information Technology: Coding and Computing (ITCC), 2004.
-
-
-
-
11
-
-
33750064843
-
Cost Optimization in SIS Model of Worm Infection
-
J. Kim, S. Radhakrishnan, and J. Jang, "Cost Optimization in SIS Model of Worm Infection," ETRI Journal, vol. 28, no. 5, pp. 692-695, 2006.
-
(2006)
ETRI Journal
, vol.28
, Issue.5
, pp. 692-695
-
-
Kim, J.1
Radhakrishnan, S.2
Jang, J.3
-
12
-
-
52949095075
-
Modeling and Analysis of a Self-Learning Worm Based on Good Point Set Scanning
-
Nov
-
F. Wang, Y. Zhang, and J. Ma, "Modeling and Analysis of a Self-Learning Worm Based on Good Point Set Scanning," Wireless Communications and Mobile Computing, Early View, Nov. 2008.
-
(2008)
Wireless Communications and Mobile Computing, Early View
-
-
Wang, F.1
Zhang, Y.2
Ma, J.3
-
13
-
-
0141762461
-
-
D. Moore, C. Shannon, and J. Brown, Code Red: a Case Study on the Spread and Victims of an Internet Worm, Proc. 2nd ACM SIGCOMM Workshop on Internet Measurement, Marseille, France, Nov. 2002.
-
D. Moore, C. Shannon, and J. Brown, "Code Red: a Case Study on the Spread and Victims of an Internet Worm," Proc. 2nd ACM SIGCOMM Workshop on Internet Measurement, Marseille, France, Nov. 2002.
-
-
-
-
14
-
-
0742276097
-
Inside the Slammer Worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford,, and N. Weaver, "Inside the Slammer Worm," IEEE Magazine of Security and Privacy, vol. 1, no. 4, pp. 33-39, 2003.
-
(2003)
IEEE Magazine of Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
16
-
-
0038349210
-
Code Red Worm Propagation Modeling and Analysis
-
Washington DC
-
C.C. Zou, W. Gong, and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," 9th ACM Symp. on Computer and Communication Security, pp. 138-147, Washington DC, 2002.
-
(2002)
9th ACM Symp. on Computer and Communication Security
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
17
-
-
85084162258
-
How to Own the Internet in Your Spare Time
-
San Francisco, Aug
-
S. Staniford, V. Paxson, and W. Weaver, "How to Own the Internet in Your Spare Time," 11th Usenix Security Symposium, San Francisco, Aug. 2002.
-
(2002)
11th Usenix Security Symposium
-
-
Staniford, S.1
Paxson, V.2
Weaver, W.3
-
18
-
-
84943680959
-
Computers and Epidemiology
-
J.O. Kephart, D.M. Chess, and S.R. White, "Computers and Epidemiology," IEEE Spectrum, vol. 30, no. 5, pp. 20-26, 1993.
-
(1993)
IEEE Spectrum
, vol.30
, Issue.5
, pp. 20-26
-
-
Kephart, J.O.1
Chess, D.M.2
White, S.R.3
-
19
-
-
0042474173
-
Internet Quarantine: Requirements for Containing Self-Propagating Code
-
San Franciso, Mar.-Apr
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code," Proc. IEEE INFOCOM, San Franciso, vol. 3, pp. 1901-1910, Mar.-Apr. 2003.
-
(2003)
Proc. IEEE INFOCOM
, vol.3
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
20
-
-
14944368398
-
-
C.C. Zou, W. Gong, and D. Towsley, Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense, Proc. 2003 ACM Workshop on Rapid Malcode (WORM'03), Washington, DC, Oct. 2003.
-
C.C. Zou, W. Gong, and D. Towsley, "Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense," Proc. 2003 ACM Workshop on Rapid Malcode (WORM'03), Washington, DC, Oct. 2003.
-
-
-
-
21
-
-
66549102203
-
-
H. Zhou, Y. Wen, and H. Zhao, Passive Worm Propagation Modeling and Analysis, Proc. IEEE Int'l Conf. on Computing in the Global Information Technology, Guadelope, French Caribbean, pp. 32, Mar. 2007.
-
H. Zhou, Y. Wen, and H. Zhao, "Passive Worm Propagation Modeling and Analysis," Proc. IEEE Int'l Conf. on Computing in the Global Information Technology, Guadelope, French Caribbean, pp. 32, Mar. 2007.
-
-
-
|