-
1
-
-
70350650293
-
Know your enemy: Tracking botnets
-
Mar.
-
P. Bächer, T. Holz, M.Kötter, G. Wicherski, "Know Your Enemy: Tracking Botnets", The Honeynet Project and Research Alliance, Mar. 2005; http://www.honeynet.org/papers/bots/.
-
(2005)
The Honeynet Project and Research Alliance
-
-
Bächer, P.1
Holz, T.2
Kötter, M.3
Wicherski, G.4
-
2
-
-
84868997571
-
-
Mar., Online
-
US-CERT. (2007, Mar.). Quarterly Trends and Analysis Report. [Online]. 2 (1); *http://www.uscert.gov/press-room/trendsandanalysisQ107.pdf.
-
(2007)
Quarterly Trends and Analysis Report
, vol.2
, Issue.1
-
-
-
3
-
-
84868963092
-
-
Reuters, Sept.
-
Reuters, "Cybercrime is Getting Organized", Wired, Sept. 2006; http://www.wired.com/techbiz/media/news/2006/09/71793.
-
(2006)
Cybercrime is Getting Organized
-
-
-
8
-
-
84868974104
-
Studying malicious websites and the underground economy on the chinese web
-
Dec.
-
J. Zhuge, T. Holz, C. Song, J. Guo, X. Han, W. Zou, "Studying Malicious Websites and the Underground Economy on the Chinese Web", Department for Mathematics and Computer Science, University of Mannheim, TR-2007-2011, Dec. 2007; http://madoc.bib.unimannheim.de/madoc/volltexte/2007/ 1718/.
-
(2007)
Department for Mathematics and Computer Science, University of Mannheim, TR-2007-2011
-
-
Zhuge, J.1
Holz, T.2
Song, C.3
Guo, J.4
Han, X.5
Zou, W.6
-
9
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
K. Campbell, L. A. Gordon, M. P. Loeb, L. Zhou, "The Economic Cost of Publicly Announced Information Security Breaches: Empirical Evidence from the Stock Market", Jour. of Computer Security, vol.11, (3), 2003, pp. 431-448.
-
(2003)
Jour. of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
10
-
-
79751480868
-
Is there a cost to privacy breaches? An event study
-
University of Cambridge, England, Jun. 26-28
-
A. Acquisti, A. Friedman and R. Telang, "Is There a Cost to Privacy Breaches? An Event Study", The Fifth Workshop on the Economics of Information Security (WEIS 2006, University of Cambridge, England, Jun. 26-28, 2006; http://weis2006.econinfosec.org/docs/40.pdf.
-
(2006)
The Fifth Workshop on the Economics of Information Security (WEIS 2006)
-
-
Acquisti, A.1
Friedman, A.2
Telang, R.3
-
11
-
-
0034823003
-
A trend analysis of exploitations
-
H.K. Browne, W.A. Arbaugh, J. McHugh and W.L. Fithen, "A Trend Analysis of Exploitations", Proc. Security and Privacy, Oakland, California, USA, May 14-16, 2001, pp. 214-229. (Pubitemid 32882638)
-
(2001)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 214-229
-
-
Browne, H.K.1
Arbaugh, W.A.2
McHugh, J.3
Fithen, W.L.4
-
12
-
-
17444402134
-
Measurement and analysis of worm propagation on internet network topology
-
Proceedings - 13th International Conference on Computer Communications and Networks, ICCCN 2004
-
J. Kim, S. Radhakrishnan, S.K. Dhall, "Measurement and analysis of worm propagation on Internet network topology", Proc. 13th Int. Conference on Computer Communications and Networks, Oct. 11-13, 2004, pp. 495- 500. (Pubitemid 40540260)
-
(2004)
Proceedings - International Conference on Computer Communications and Networks, ICCCN
, pp. 495-500
-
-
Kim, J.1
Radhakrishnan, S.2
Dhall, S.K.3
-
13
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Nov.
-
C.C. Zou, W. Gong, and D. Towsley, "Code Red Worm Propagation Modeling and Analysis", Proc. 9th ACM Conference on Computer and Communications Security, Nov. 2002, pp. 138-147.
-
(2002)
Proc. 9th ACM Conference on Computer and Communications Security
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
14
-
-
23844456922
-
Multiscale, resurgent epidemics in a hierarchical metapopulation model
-
DOI 10.1073/pnas.0501226102
-
D.J. Watts, R. Muhamad, D.C. Medina, and P.S. Dodds, "Multiscale, resurgent epidemics in a hierarchical metapopulation model", Proc. National Academy of Sciences USA, vol.102, (32), Aug. 2005, pp. 11157-11162. (Pubitemid 41153791)
-
(2005)
Proceedings of the National Academy of Sciences of the United States of America
, vol.102
, Issue.32
, pp. 11157-11162
-
-
Watts, D.J.1
Muhamad, R.2
Medina, D.C.3
Dodds, P.S.4
-
15
-
-
0031753106
-
Use of time-series analysis in infectious disease surveillance
-
R. Allard, "Use of Time-series Analysis in Infectious Disease Surveillance", Bulletin of the World Health Organization, vol.76, (4), 1998, pg. 327-333. (Pubitemid 28469265)
-
(1998)
Bulletin of the World Health Organization
, vol.76
, Issue.4
, pp. 327-333
-
-
Allard, R.1
-
16
-
-
33749487050
-
Stochastic modeling of empirical time series of childhood infectious diseases data before and after mass vaccination
-
Aug.
-
H. Trottier, P. Philippe and R. Roy, "Stochastic Modeling of Empirical Time Series of Childhood Infectious Diseases Data before and After Mass Vaccination", Emerging Themes in Epidemiology, vol.3, (9), Aug. 2006; http://www.ete-online.com/content/3/1/9.
-
(2006)
Emerging Themes in Epidemiology
, vol.3
, pp. 9
-
-
Trottier, H.1
Philippe, P.2
Roy, R.3
-
17
-
-
33947327497
-
Monitoring the SARS epidemic in China: A time series analysis
-
D. Lai, "Monitoring the SARS Epidemic in China: A Time Series Analysis", Journal of Data Science, vol.3, 2005, pp. 279-293.
-
(2005)
Journal of Data Science
, vol.3
, pp. 279-293
-
-
Lai, D.1
-
18
-
-
21644455992
-
We did the right thing: An intervention analysis approach to modeling intervened SARS propagation in singapore
-
B. Han, T.Y. Leong, "We Did the Right Thing: An Intervention Analysis Approach to Modeling Intervened SARS Propagation in Singapore", Proc. of World Congress on Medical Informatics (MEDINFO), 2004, pp. 1246-1250.
-
(2004)
Proc. of World Congress on Medical Informatics (MEDINFO)
, pp. 1246-1250
-
-
Han, B.1
Leong, T.Y.2
-
19
-
-
0022592006
-
Box-Jenkins modelling of some viral infectious diseases
-
U. Helfenstein, "Box-Jenkins Modeling of Some Viral Infectious Diseases", Statistics in Medicine, vol.5, 1986, pp. 37-47. (Pubitemid 16132215)
-
(1986)
Statistics in Medicine
, vol.5
, Issue.1
, pp. 37-47
-
-
Helfenstein, U.1
-
20
-
-
84868987117
-
-
Snort; http://www.snort.org.
-
Snort
-
-
-
25
-
-
0000501656
-
Information theory and the extension of the maximum likelihood principle
-
B.N. Petrov and F. Csaki, eds., Budapest: Academia Kiado
-
H. Akaike, "Information theory and the extension of the Maximum Likelihood Principle", in Second International Symposium on Information Theory, B.N. Petrov and F. Csaki, eds., Budapest: Academia Kiado, 1973, pp. 267-281.
-
(1973)
Second International Symposium on Information Theory
, pp. 267-281
-
-
Akaike, H.1
-
26
-
-
70349119250
-
Regression and time series model selection in small samples
-
C. Hurvitch and C. Tsai, "Regression and Time Series Model Selection in Small Samples", Biometrika, vol.76, (2), Jun. 1989, pp. 297-307.
-
(1989)
Biometrika
, vol.76
, Issue.2
, pp. 297-307
-
-
Hurvitch, C.1
Tsai, C.2
-
27
-
-
0000120766
-
Estimating the dimension of a model
-
G. Schwarz, "Estimating the Dimension of a Model", The Annals of Statistics, vol.6, (2), Mar. 1978, pp. 461-464.
-
(1978)
The Annals of Statistics
, vol.6
, Issue.2
, pp. 461-464
-
-
Schwarz, G.1
-
28
-
-
84950445313
-
Cross-validation of regression models
-
R. Picard, R. Cook, "Cross-validation of Regression Models", Journal of the American Statistical Association, vol.79, (387), Sep., 1984, pp. 575-583.
-
(1984)
Journal of the American Statistical Association
, vol.79
, Issue.387
, pp. 575-583
-
-
Picard, R.1
Cook, R.2
-
29
-
-
84907095419
-
R: A language and environment for statistical computing
-
R Development Core Team, Vienna, Austria
-
R Development Core Team, "R: A Language and Environment for Statistical Computing", R Foundation for Statistical Computing, Vienna, Austria, 2008, ISBN 3- 900051-07-0; http://www.R-project.org.
-
(2008)
R Foundation for Statistical Computing
-
-
-
30
-
-
0000263475
-
The determination of the order of an autoregression
-
E.J. Hannan and B.G. Quinn, "The Determination of the Order of an Autoregression", Journal of the Royal Statistical Society, Series B, vol.41, (2), 1979, pp. 190-195.
-
(1979)
Journal of the Royal Statistical Society, Series B
, vol.41
, Issue.2
, pp. 190-195
-
-
Hannan, E.J.1
Quinn, B.G.2
-
35
-
-
47349084770
-
Applying software reliability models on security incidents
-
Trollhättan, Sweden, Nov. 5-9
-
E. Condon, M. Cukier, and T. He, "Applying Software Reliability Models on Security Incidents", Proc. 18th IEEE Intl. Symposium on Software Reliability Engineering, Trollhättan, Sweden, Nov. 5-9, 2007, pp. 159-168.
-
(2007)
Proc. 18th IEEE Intl. Symposium on Software Reliability Engineering
, pp. 159-168
-
-
Condon, E.1
Cukier, M.2
He, T.3
-
36
-
-
0032626339
-
Analysis of repairable system failure data using time series models
-
M. Xie and S. Ho, "Analysis of repairable system failure data using time series models", Journal of Quality in Maintenance Engineering, vol.5, (1), 1999, pp. 50-61.
-
(1999)
Journal of Quality in Maintenance Engineering
, vol.5
, Issue.1
, pp. 50-61
-
-
Xie, M.1
Ho, S.2
-
37
-
-
0018505572
-
TIME-DEPENDENT ERROR-DETECTION RATE MODEL FOR SOFTWARE RELIABILITY AND OTHER PERFORMANCE MEASURES.
-
A. L. Goel and K. Okumoto, "Time-Dependent Error- Detection Rate Model for Software Reliability and Other Performance Measures", IEEE Trans. on Reliability, vol.R- 28, (3), Aug. 1979, pp 206-211. (Pubitemid 10414925)
-
(1979)
IEEE Transactions on Reliability
, vol.R-28
, Issue.3
, pp. 206-211
-
-
Goel Amrit, L.1
Okumoto Kazu2
-
38
-
-
0021506075
-
S-shaped software reliability growth models and their application
-
S. Yamada, M. Ohba and S. Osaki, "S-shaped Software Reliability Growth Models and Their Application", IEEE Trans. on Reliability, vol.R-33, (4), Oct. 1984, pp 289-291.
-
(1984)
IEEE Trans. on Reliability
, vol.R-33
, Issue.4
, pp. 289-291
-
-
Yamada, S.1
Ohba, M.2
Osaki, S.3
-
39
-
-
47349087741
-
Nonhomogeneous poisson processes for software reliability growth
-
Copenhagen, Denmark, Aug
-
T.M. Khoshgoftaar, "Nonhomogeneous Poisson Processes for Software Reliability Growth", Proc. 8th symposium in computational statistics, Copenhagen, Denmark, Aug 1988, pp. 11-12.
-
(1988)
Proc. 8th Symposium in Computational Statistics
, pp. 11-12
-
-
Khoshgoftaar, T.M.1
-
40
-
-
84937650085
-
Learning curve approach to reliability monitoring
-
As-2
-
J. T. Duane, "Learning Curve Approach to Reliability Monitoring", IEEE Tran. On Aerospace, As-2, 1964, pp 563-566.
-
(1964)
IEEE Tran. On Aerospace
, pp. 563-566
-
-
Duane, J.T.1
-
41
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
October
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage, "An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants", Proc. ACM Conf. Computer and Communications Security, October 2007.
-
(2007)
Proc. ACM Conf. Computer and Communications Security
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
|