-
3
-
-
0742276097
-
Inside the slammer worm
-
Moore D, Paxson V, Savage S, et al. Inside the slammer worm[J]. IEEE Magazine of Security and Privacy, 2003, 1(4): 33-39
-
(2003)
IEEE Magazine of Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
-
6
-
-
14944367812
-
WORM vs WORM: Preliminary study of an active counter-attack mechanism
-
Stamford S., New York: ACM
-
Castaneda Frank, Sezery Emre Can, Xu Jun. WORM vs WORM: Preliminary study of an active counter-attack mechanism[C]//Stamford S. Proc of the ACM CCS Workshop on Rapid Malcode (WORM 2003). New York: ACM, 2004: 83-93
-
(2004)
Proc of the ACM CCS Workshop on Rapid Malcode (WORM 2003)
, pp. 83-93
-
-
Frank, C.1
Can, S.E.2
Xu, J.3
-
8
-
-
34047267176
-
Anti-worm based on hybrid confronting technology
-
Chinese source
-
Wang Chao, Qing Sihan, He Jianbo. Anti-worm based on hybrid confronting technology[J]. Journal on Communications, 2007, 28(1): 28-34 (in Chinese)
-
(2007)
Journal on Communications
, vol.28
, Issue.1
, pp. 28-34
-
-
Wang, C.1
Qing, S.2
He, J.3
-
9
-
-
85084162258
-
How to own the Internet in your spare time
-
Boneh D., San Francisco: USENIX Association
-
Stamford S, Paxson V, Weaver N. How to own the Internet in your spare time[C/OL]//Boneh D. Proc of the 11th Usenix Security Symp. San Francisco: USENIX Association, 2002[2009-01-13]. http://www.icir.org/vern/papers/cdc-usenix-sec02/cdc.pdf
-
(2002)
Proc of the 11th Usenix Security Symp
-
-
Stamford, S.1
Paxson, V.2
Weaver, N.3
-
11
-
-
0042474227
-
Modeling the spread of active worms
-
Piscataway, NJ: IEEE
-
Chen Z, Gao L, Kwiat K. Modeling the spread of active worms[C]//Proc of the IEEE INFOCOM 2003. Piscataway, NJ: IEEE, 2003: 1890-1900
-
(2003)
Proc of the IEEE INFOCOM 2003
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
12
-
-
8644261522
-
Research and development of Internet worms
-
Chinese source
-
Wen Weiping, Qing Sihan, Jiang Jianchun, et al. Research and development of Internet worms[J]. Journal of Software, 2004, 15(8): 1208-1219 (in Chinese)
-
(2004)
Journal of Software
, vol.15
, Issue.8
, pp. 1208-1219
-
-
Wen, W.1
Qing, S.2
Jiang, J.3
-
13
-
-
33646386296
-
Modeling and analysis on the interaction between the Internet worm and anti-worm
-
Chinese source
-
Li Xing, Yang Feng, Duan Haixin. Modeling and analysis on the interaction between the Internet worm and anti-worm[J]. Science in China: Ser E Information Sciences, 2004, 34(8): 841-856 (in Chinese)
-
(2004)
Science in China: Ser E Information Sciences
, vol.34
, Issue.8
, pp. 841-856
-
-
Li, X.1
Yang, F.2
Duan, H.3
-
14
-
-
34447121211
-
Modeling and analysis of active benign worms and hybrid benign worms countering against worms
-
Chinese source
-
Zhou Hanxun, Zhao Hong. Modeling and analysis of active benign worms and hybrid benign worms countering against worms[J]. Journal of Computer Research and Development, 2007, 44(6): 958-964 (in Chinese)
-
(2007)
Journal of Computer Research and Development
, vol.44
, Issue.6
, pp. 958-964
-
-
Zhou, H.1
Zhao, H.2
|