-
1
-
-
0036609886
-
Realizing the Transition to IPv6
-
June
-
D. G. Waddington and F. Chang, "Realizing the Transition to IPv6," IEEE Commun. Mag., vol. 40, no. 6, June 2002, pp. 138-47.
-
(2002)
IEEE Commun. Mag
, vol.40
, Issue.6
, pp. 138-147
-
-
Waddington, D.G.1
Chang, F.2
-
2
-
-
0031678018
-
The Next Generation of the Internet: Aspects of the Internet Protocol Version 6
-
D. C. Lee et al., "The Next Generation of the Internet: Aspects of the Internet Protocol Version 6," IEEE Network, vol. 12, no. 1, 1998, pp. 28-33.
-
(1998)
IEEE Network
, vol.12
, Issue.1
, pp. 28-33
-
-
Lee, D.C.1
-
4
-
-
31844443075
-
A Self-Learning Worm using Importance Scanning
-
Nov
-
Z. Chen and C. Ji, "A Self-Learning Worm using Importance Scanning," Proc. 3rd ACM CCS WORM '05, Nov. 2005.
-
(2005)
Proc. 3rd ACM CCS WORM '05
-
-
Chen, Z.1
Ji, C.2
-
5
-
-
25644446918
-
The Effect of DNS Delays on Worm Propagation in an IPv6 Internet
-
A. Kamra et al., "The Effect of DNS Delays on Worm Propagation in an IPv6 Internet," Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Kamra, A.1
-
7
-
-
34548324846
-
Measuring Network-Aware Worm Spreading Ability
-
May
-
Z. Chen and C. Ji, "Measuring Network-Aware Worm Spreading Ability," Proc. IEEE INFOCOM, May 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Chen, Z.1
Ji, C.2
-
8
-
-
85084162258
-
How to Own the Internet in Your Spare Time
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in Your Spare Time," Proc. 11th USENIX Sec. Symp., 2002, pp. 149-67.
-
(2002)
Proc. 11th USENIX Sec. Symp
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
9
-
-
41949100866
-
Modeling the Spread of Internet Worms via Persistently Unpatched Hosts
-
W. H. Debany, Jr., "Modeling the Spread of Internet Worms via Persistently Unpatched Hosts," IEEE Network, vol. 22, no. 2, 2008, pp. 26-32.
-
(2008)
IEEE Network
, vol.22
, Issue.2
, pp. 26-32
-
-
Debany Jr., W.H.1
-
10
-
-
28044469549
-
The Monitoring and Early Detection of Internet Worms
-
C. C. Zou et al., "The Monitoring and Early Detection of Internet Worms," IEEE/ACM Trans. Net., vol. 13, no. 5, 2005.
-
(2005)
IEEE/ACM Trans. Net
, vol.13
, Issue.5
-
-
Zou, C.C.1
-
11
-
-
34248995311
-
Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm
-
Apr.-June
-
C. C. Zou, D. Towsley, and W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet Email Worm," IEEE Trans. Dependable Sec. Comp., vol. 4, no. 2, Apr.-June 2007, pp. 105-18.
-
(2007)
IEEE Trans. Dependable Sec. Comp
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
12
-
-
70350049018
-
-
Advancing the Internet, Action Plan for the Deployment of Internet Protocol version 6 (IPv6) in Europe
-
"Advancing the Internet - Action Plan for the Deployment of Internet Protocol version 6 (IPv6) in Europe", http://www.ipv6.eu/admin/ bildbank/uploads/Documents/Commision/COM_.pdf
-
-
-
-
13
-
-
33847315215
-
-
CAIDA, at a Macroscopic Scale;
-
CAIDA, "Visualizing Internet Topology at a Macroscopic Scale"; http://www.caida.org/research/topology/as_core_network/pics-ipv6- 200801/ascore-ipv4-ipv6.200801.poster.pdf
-
Visualizing Internet Topology
-
-
-
15
-
-
70350074713
-
A New Worm Exploiting IPv4-IPv6 Dual-stack Networks
-
Nov
-
Q. Zheng et al., "A New Worm Exploiting IPv4-IPv6 Dual-stack Networks," Proc. 5th ACM CCS WORM '07, Nov. 2007.
-
(2007)
Proc. 5th ACM CCS WORM '07
-
-
Zheng, Q.1
|