-
4
-
-
0036013593
-
Statistical mechanics of complex networks
-
Réka Albert and Alert-László Barabási. Statistical mechanics of complex networks. Reviews of Modern Physics, 74(1), 2002.
-
(2002)
Reviews of Modern Physics
, vol.74
, Issue.1
-
-
Albert, R.1
Barabási, A.2
-
5
-
-
0034721164
-
Error and attack tolerance of complex networks
-
Réka Albert, Hawoong Jeong, and Alert-Lászloó Barabási. Error and attack tolerance of complex networks. Nature, 406:378-382, 2000.
-
(2000)
Nature
, vol.406
, pp. 378-382
-
-
Réka, A.1
Jeong, H.2
Barabási, A.3
-
15
-
-
48649097305
-
-
June Technical report, Georgia Institute of Technology
-
David Dagon, Amar Takar, Guofei Gu, Xinzhou Qin, and Wenke Lee. Worm population control through periodic response. Technical report, Georgia Institute of Technology, June 2004.
-
(2004)
Worm Population Control Through Periodic Response
-
-
Dagon, D.1
Takar, A.2
Guofei, G.3
Qin, X.4
Lee, W.5
-
19
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Julian B. Grizzard, Vikram Sharma, Chris Nunnery, Brent ByungHoon Kang, and David Dagon. Peer-to-peer botnets: Overview and case study. In USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), 2007.
-
(2007)
USENIX Workshop On Hot Topics In Understanding Botnets (HotBots'07)
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
20
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, and Wenke Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In 16th USENIX Security Symposium (Security'07), 2007.
-
(2007)
16th USENIX Security Symposium (Security'07)
-
-
Guofei, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
21
-
-
21644482790
-
Worm detection, early warning and response based on local victim information
-
Guofei Gu, Monirul Sharif, Xinzhou Qin, David Dagon, Wenke Lee, and George Riley. Worm detection, early warning and response based on local victim information. In 20th Annual Computer Security Applications Conference (ACSAC), 2004.
-
(2004)
20th Annual Computer Security Applications Conference (ACSAC)
-
-
Guofei, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
26
-
-
34547307344
-
-
Technical Report CERIAS Technical Report (2005-24), Purdue University, February
-
Xuxian Jiang, Dongyan Xu, Helen J. Wang, and Eugene H. Spafford. Virtual playgrounds for worm behavior investigation. Technical Report CERIAS Technical Report (2005-24), Purdue University, February 2005.
-
(2005)
Virtual Playgrounds For Worm Behavior Investigation
-
-
Jiang, X.1
Dongyan, X.2
Wang, H.J.3
Spafford, E.H.4
-
32
-
-
48649095253
-
-
LURHQ
-
LURHQ. Zindos worm analysis. http://www.lurhq.com/zindos.html,2004.
-
(2004)
Zindos Worm Analysis
-
-
-
33
-
-
0036374187
-
Search and replication in unstructured peer-to-peer networks
-
New York, NY, USA, ACM Press
-
Qin Lv, Pei Cao, Edith Cohen, Kai Li, and Scott Shenker. Search and replication in unstructured peer-to-peer networks. In ICS'02: Proceedings of the 16th international conference on Supercomputing, pages 84-95, New York, NY, USA, 2002. ACM Press.
-
(2002)
ICS'02: Proceedings of the 16th International Conference On Supercomputing
, pp. 84-95
-
-
Lv, Q.1
Cao, P.2
Cohen, E.3
Li, K.4
Shenker, S.5
-
35
-
-
47949132450
-
-
November Trend Micro, Technical report, Trend Micro White Paper
-
Trend Micro. Taxonomy of botnet threats. Technical report, Trend Micro White Paper, November 2006.
-
(2006)
Taxonomy of Botnet Threats
-
-
-
36
-
-
0002687371
-
The small world problem
-
S. Milgram. The small world problem. Psychology Today, 2(60), 1967.
-
(1967)
Psychology Today
, vol.2
, Issue.60
-
-
Milgram, S.1
-
38
-
-
0742276097
-
Inside the slammer worm
-
July
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Magazine on Security and Privacy, 1(4), July 2003.
-
(2003)
IEEE Magazine On Security and Privacy
, vol.1
, Issue.4
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
41
-
-
48649084321
-
Botnet tracking: Tools, techniques, and lessons learned
-
Jose Nazario. Botnet tracking: Tools, techniques, and lessons learned. In Black Hat, 2007.
-
(2007)
Black Hat
-
-
Nazario, J.1
-
42
-
-
0035420732
-
Random graphs with arbitrary degree distributions and their applications
-
026118
-
M.E.J. Newman, S.H. Strogatz, and D.J. Watts. Random graphs with arbitrary degree distributions and their applications. Phys. Rev., E64(026118), 2001.
-
(2001)
Phys. Rev
, vol.E64
-
-
Newman, M.E.J.1
Strogatz, S.H.2
Watts, D.J.3
-
43
-
-
70350283482
-
-
Average web usage
-
Nielsen NetRatings. Average web usage. http://www.nielsen-netratings.com/reports.jsp?section=pub_reports&repor%t=usage&period=weekly, 2007.
-
(2007)
Nielsen NetRatings
-
-
-
45
-
-
15744366692
-
Search and replication in unstructured peer-to-peer networks
-
L. Qin, C. Pei, E. Cohen, L. Kai, and S. Scott. Search and replication in unstructured peer-to-peer networks. In 16th ACM International Conference on Supercomputing, 2002.
-
(2002)
16th ACM International Conference On Supercomputing
-
-
Qin, L.1
Pei, C.2
Cohen, E.3
Kai, L.4
Scott, S.5
-
46
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Moheeb Rajab, Jay Zarfoss, Fabian Monrose, and Andreas Terzis. A multifaceted approach to understanding the botnet phenomenon. In Proceedings of the 6th ACM SIG-COMM on Internet Measurement (IMC), pages 41-52, 2006.
-
(2006)
Proceedings of the 6th ACM SIG-COMM On Internet Measurement (IMC)
, pp. 41-52
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
47
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
Moheeb Rajab, Jay Zarfoss, Fabian Monrose, and Andreas Terzis. My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), 2007.
-
(2007)
USENIX Workshop On Hot Topics In Understanding Botnets (HotBots'07)
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
48
-
-
0034775826
-
A scalable content-addressable network
-
August
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. InProceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM), pages 161-172, August 2001.
-
(2001)
InProceedings of the ACM Conference of the Special Interest Group On Data Communication (SIGCOMM)
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
49
-
-
0036187056
-
Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design
-
M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal, 6(1), 2002.
-
(2002)
IEEE Internet Computing Journal
, vol.6
, Issue.1
-
-
Ripeanu, M.1
Foster, I.2
Iamnitchi, A.3
-
52
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego, California, August
-
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the ACM SIGCOMM'01 Conference, San Diego, California, August 2001.
-
Proceedings of the ACM SIGCOMM'01 Conference
, pp. 2001
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
53
-
-
44649101679
-
-
Technical report, Department of Computer Science, University of Calgary, August
-
Ryan Vogt and John Aycock. Attack of the 50 foot botnet. Technical report, Department of Computer Science, University of Calgary, August 2006.
-
(2006)
Attack of the 50 Foot Botnet
-
-
Vogt, R.1
Aycock, J.2
-
57
-
-
12244311689
-
A taxonomy of computer worms
-
ACM SIGSAC, October
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A taxonomy of computer worms. In 2003 ACM Workshop on Rapid Malcode (WORM'03). ACM SIGSAC, October 2003.
-
2003 ACM Workshop On Rapid Malcode (WORM'03)
, pp. 2003
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
58
-
-
48649104978
-
-
Yinglian Xie, Hyang-Ah Kim, David R. O'Hallaron, Michael K. Reiter, and Hui Zhang. Seurat: A pointillist approach to network security, 2004.
-
(2004)
Seurat: A Pointillist Approach to Network Security
-
-
Xie, Y.1
Kim, H.-A.2
O'Hallaron, D.R.3
Reiter, M.K.4
Zhang, H.5
-
63
-
-
8644236108
-
-
Technical Report TR-03-CSE-06, Umass ECE Dept., November
-
C.C. Zou, D. Towsley, W. Gong, and S. Cai. Routing worm: A fast, selective attack worm based on ip address information. Technical Report TR-03-CSE-06, Umass ECE Dept., November 2003.
-
(2003)
Routing Worm: A Fast, Selective Attack Worm Based On Ip Address Information
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
|