메뉴 건너뛰기




Volumn 28, Issue 7, 2009, Pages 648-659

A concise cost analysis of Internet malware

Author keywords

[No Author keywords available]

Indexed keywords

BACKDOORS; COST ANALYSIS; COST MODELS; ECONOMIC LOSS; FAILED SYSTEM; IMPACT ANALYSIS; INFECTION PATTERNS; KEYLOGGERS; LOSS FUNCTIONS; MALWARE PROPAGATION; MALWARES; PEER TO PEER; PHISHING; POTENTIAL LOSS; PROBABILISTIC RISK; RECOVERY EFFICIENCY; ROOTKITS; SPY-WARE;

EID: 70349438880     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.03.007     Document Type: Article
Times cited : (17)

References (30)
  • 1
    • 13644274213 scopus 로고    scopus 로고
    • A survey of peer-to-peer content distribution technologies
    • Androutsellis-Theotokis S., and Spinellis D. A survey of peer-to-peer content distribution technologies. ACM Computing Surveys 36 4 (2004) 335-371. http://doi.acm.org/10.1145/1041680.1041681
    • (2004) ACM Computing Surveys , vol.36 , Issue.4 , pp. 335-371
    • Androutsellis-Theotokis, S.1    Spinellis, D.2
  • 5
    • 0042474227 scopus 로고    scopus 로고
    • Modeling the spread of active worms
    • IEEE
    • Chen Z., Gao L., and Kwiat K. Modeling the spread of active worms. INFOCOM 2003 vol. 3 (2003), IEEE 1890-1900
    • (2003) INFOCOM 2003 , vol.3 , pp. 1890-1900
    • Chen, Z.1    Gao, L.2    Kwiat, K.3
  • 7
  • 13
    • 33845768389 scopus 로고    scopus 로고
    • Learning to detect and classify malicious executables in the wild
    • Kolter J.Z., and Maloof M.A. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research 7 (2006) 2721-2744
    • (2006) Journal of Machine Learning Research , vol.7 , pp. 2721-2744
    • Kolter, J.Z.1    Maloof, M.A.2
  • 14
    • 55349122357 scopus 로고    scopus 로고
    • A new assessment and improvement model of risk propagation in information security
    • Kondakci S. A new assessment and improvement model of risk propagation in information security. International Journal of Information and Computer Security 1 3 (2007) 341-366
    • (2007) International Journal of Information and Computer Security , vol.1 , Issue.3 , pp. 341-366
    • Kondakci, S.1
  • 15
    • 42649108776 scopus 로고    scopus 로고
    • Epidemic state analysis of computers under malware attacks
    • Kondakci S. Epidemic state analysis of computers under malware attacks. Simulation Modelling Practice and Theory 16 5 (2008) 271-285
    • (2008) Simulation Modelling Practice and Theory , vol.16 , Issue.5 , pp. 271-285
    • Kondakci, S.1
  • 17
    • 34248394369 scopus 로고    scopus 로고
    • Modeling and analyzing the spread of active worms based on P2P systems
    • Lia T., Guana Z., and Wu X. Modeling and analyzing the spread of active worms based on P2P systems. Computers & Security 26 3 (2007) 213-218
    • (2007) Computers & Security , vol.26 , Issue.3 , pp. 213-218
    • Lia, T.1    Guana, Z.2    Wu, X.3
  • 18
    • 18844367440 scopus 로고    scopus 로고
    • Simulating realistic network worm traffic for worm warning system design and testing
    • ACM Press, New York, NY, USA
    • Liljenstam M., Nicol D.M., Berk V.H., and Gray R.S. Simulating realistic network worm traffic for worm warning system design and testing. WORM '03: Proceedings of the 2003 ACM workshop on rapid malcode (2003), ACM Press, New York, NY, USA 24-33. http://doi.acm.org/10.1145/948187.948193
    • (2003) WORM '03: Proceedings of the 2003 ACM workshop on rapid malcode , pp. 24-33
    • Liljenstam, M.1    Nicol, D.M.2    Berk, V.H.3    Gray, R.S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.