-
1
-
-
34249852710
-
A spatial stochastic model for worm propagation: Scale effects
-
Avlonitis M., Magkos E., Stefanidakis M., Chrissikopoulos V.: A spatial stochastic model for worm propagation: scale effects. J. Comput. Virol. 3, 87-92 (2007).
-
(2007)
J. Comput. Virol.
, vol.3
, pp. 87-92
-
-
Avlonitis, M.1
Magkos, E.2
Stefanidakis, M.3
Chrissikopoulos, V.4
-
3
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
ACM, New York
-
Moore, D., Shannon, C., Claffy, K.C.: Code-red: A case study on the spread and victims of an internet worm. In: IMW'02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment, pp. 273-284. ACM, New York (2002).
-
(2002)
IMW'02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.C.3
-
4
-
-
0742276097
-
Inside the slammer worm
-
Moore D., Paxson V., Savage S., Shannon C., Staniford S., Weaver N.: Inside the slammer worm. IEEE Secur. Priv. 1, 33-39 (2003).
-
(2003)
IEEE Secur. Priv.
, vol.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
5
-
-
4243109552
-
Malware month
-
Berghel H.: Malware month. Commun. ACM 46, 15-19 (2003).
-
(2003)
Commun. ACM
, vol.46
, pp. 15-19
-
-
Berghel, H.1
-
6
-
-
4344627335
-
The spread of the witty worm
-
Shannon C., Moore D.: The spread of the witty worm. IEEE Secur. Priv. 2, 46-50 (2004).
-
(2004)
IEEE Secur. Priv.
, vol.2
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
7
-
-
85084162258
-
How to own the internet in your spare time
-
USENIX Association, Berkeley
-
Staniford, S., Paxson, V., Weaver, N.: How to own the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, pp. 149-167. USENIX Association, Berkeley (2002).
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
8
-
-
33646400816
-
Advanced routing worm and its security challenges
-
Zou C.C., Towsley D., Gong W., Cai S.: Advanced routing worm and its security challenges. Simul. 82, 75-85 (2006).
-
(2006)
Simul.
, vol.82
, pp. 75-85
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
10
-
-
36348997064
-
Understanding localized-scanning worms
-
Chen, Z., Chen, C., Ji, C.: Understanding localized-scanning worms. In: 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, pp. 186-193 (2007).
-
(2007)
26th IEEE International Performance Computing and Communications Conference, IPCCC 2007
, pp. 186-193
-
-
Chen, Z.1
Chen, C.2
Ji, C.3
-
11
-
-
33646150900
-
On the performance of internet worm scanning strategies
-
Zou C.C., Towsley D., Gong W.: On the performance of internet worm scanning strategies. Perform. Eval. 63, 700-723 (2006).
-
(2006)
Perform. Eval.
, vol.63
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
12
-
-
34249007032
-
Worm propagation strategies in an ipv6 internet
-
Keromytis A.D., Bellovin S.M., Cheswick B.: Worm propagation strategies in an ipv6 internet. USENIX, login 31, 70-76 (2006).
-
(2006)
USENIX, Login
, vol.31
, pp. 70-76
-
-
Keromytis, A.D.1
Bellovin, S.M.2
Cheswick, B.3
-
13
-
-
28044469549
-
The monitoring and early detection of internet worms
-
Zou C., Gong W., Towsley D., Gao L.: The monitoring and early detection of internet worms. ACM Trans. Networking 13, 961-974 (2005).
-
(2005)
ACM Trans. Networking
, vol.13
, pp. 961-974
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
Gao, L.4
-
14
-
-
34249862682
-
Effective detection of active worms with varying scan rate
-
Yu, W., Wang, X., Xuan, D., Lee, D.: Effective detection of active worms with varying scan rate. International Conference on Security and Privacy in Communication Networks (IEEE SecureComm), pp. 1-10 (2006).
-
(2006)
International Conference on Security and Privacy in Communication Networks (IEEE SecureComm)
, pp. 1-10
-
-
Yu, W.1
Wang, X.2
Xuan, D.3
Lee, D.4
-
15
-
-
33947608017
-
Intrusion detection and virology: An analysis of differences, similarities and complementariness
-
Morin B., Mé L.: Intrusion detection and virology: An analysis of differences, similarities and complementariness. J. Comput. Virol. 3, 39-49 (2007).
-
(2007)
J. Comput. Virol.
, vol.3
, pp. 39-49
-
-
Morin, B.1
Mé, L.2
-
16
-
-
35048846038
-
Computer virus propagation models
-
of Lecture Notes in Computer Science, pp. 26-50. Springer, Heidelberg
-
Serazzi, G., Zanero, S.: Computer virus propagation models. In: MASCOTS Tutorials. Volume 2965 of Lecture Notes in Computer Science, pp. 26-50. Springer, Heidelberg (2003).
-
(2003)
MASCOTS Tutorials
, vol.2965
, pp. 26-50
-
-
Serazzi, G.1
Zanero, S.2
-
17
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
ACM, New York
-
Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pp. 138-147. ACM, New York (2002).
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
20
-
-
33947325694
-
An improved worm mitigation model for evaluating the spread of aggressive network worms. Computer as a Tool, 2005
-
Onwubiko C., Lenaghan A., Hebbes L.: An improved worm mitigation model for evaluating the spread of aggressive network worms. Computer as a Tool, 2005. EUROCON 2005. Int. Conf. 2, 1710-1713 (2005).
-
(2005)
EUROCON 2005. Int. Conf.
, vol.2
, pp. 1710-1713
-
-
Onwubiko, C.1
Lenaghan, A.2
Hebbes, L.3
-
22
-
-
24144441166
-
Coupled kermack-mckendrick models for randomly scanning and bandwidth-saturating internet worms
-
Lecture Notes in Computer Science, Springer, Heidelberg
-
Kesidis, G., Hamadeh, I., Jiwasurat, S.: Coupled kermack-mckendrick models for randomly scanning and bandwidth-saturating internet worms. In: Quality of Service in Multiservice IP Networks, Third International Workshop, QoS-IP 2005. Lecture Notes in Computer Science, vol. 3375, pp. 101-109. Springer, Heidelberg (2005).
-
(2005)
Quality of Service in Multiservice IP Networks, Third International Workshop, QoS-IP 2005
, vol.3375
, pp. 101-109
-
-
Kesidis, G.1
Hamadeh, I.2
Jiwasurat, S.3
-
24
-
-
0000073691
-
Qualitative analysis of insect outbreak systems: The spruce budworm and forest
-
Ludwig D.J.D., Holling C.: Qualitative analysis of insect outbreak systems: The spruce budworm and forest. J. Anim. Ecol. 47, 315-332 (1978).
-
(1978)
J. Anim. Ecol.
, vol.47
, pp. 315-332
-
-
Ludwig, D.J.D.1
Holling, C.2
-
25
-
-
70350620041
-
Nucleation and non-linear strain localization during cyclic plastic deformation
-
Avlonitis M. Zaiser M.A.E.C.: Nucleation and non-linear strain localization during cyclic plastic deformation. J. Mech. Behav. Mater. 18, 69-79 (2007).
-
(2007)
J. Mech. Behav. Mater.
, vol.18
, pp. 69-79
-
-
Avlonitis, M.1
Zaiser, M.A.E.C.2
|