-
2
-
-
33847123551
-
Experience with DETER: A testbed for security research
-
Barcelona, Spain; March
-
Benzel T, Braden B, Kim D, Neuman C, Joseph A, Sklower K, et al. Experience with DETER: a testbed for security research. In: Proceedings of second international IEEE/create-net conference on testbeds and research infrastructures for the development of networks and communities (TridentCOM'06). Barcelona, Spain; March 2006.
-
(2006)
Proceedings of second international IEEE/create-net conference on testbeds and research infrastructures for the development of networks and communities (TridentCOM'06)
-
-
Benzel, T.1
Braden, B.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
et al7
-
3
-
-
71649083286
-
-
Cert advisory ca-2001-26 nimda worm, Tech. rep.
-
Cert advisory ca-2001-26 nimda worm, Tech. rep.
-
-
-
-
10
-
-
31844439877
-
Coupled Kermack-Mckendrick models for randomly scanning and bandwidth saturating internet worms
-
Springer-Verlag, Catania, Sicily
-
Kesidis G., Hamadeh I., and Jiwasurat S. Coupled Kermack-Mckendrick models for randomly scanning and bandwidth saturating internet worms. Proceedings of QoS-IP (Feb. 2005), Springer-Verlag, Catania, Sicily
-
(2005)
Proceedings of QoS-IP
-
-
Kesidis, G.1
Hamadeh, I.2
Jiwasurat, S.3
-
11
-
-
71649107704
-
Emulation of single packet UDP scanning worms in large enterprises
-
Beijing, China; August
-
Li L, Jiwasurat S, Liu P, Kesidis G. Emulation of single packet UDP scanning worms in large enterprises. In: Proceedings of nineteenth International Teletraffic Congress (ITC19). Beijing, China; August, 2005.
-
(2005)
Proceedings of nineteenth International Teletraffic Congress (ITC19)
-
-
Li, L.1
Jiwasurat, S.2
Liu, P.3
Kesidis, G.4
-
12
-
-
71649113735
-
Emulation of sequential scanning worms in large enterprises
-
Barcelona, Spain; March
-
Li L, Jiwasurat S, Hamadeh I, Liu P, Kesidis G, Neuman C. Emulation of sequential scanning worms in large enterprises. In: Proceedings of second international IEEE/create-net conference on testbeds and research infrastructures for the development of networks and communities (TridentCOM'06). Barcelona, Spain; March 2006a.
-
(2006)
Proceedings of second international IEEE/create-net conference on testbeds and research infrastructures for the development of networks and communities (TridentCOM'06)
-
-
Li, L.1
Jiwasurat, S.2
Hamadeh, I.3
Liu, P.4
Kesidis, G.5
Neuman, C.6
-
13
-
-
34547346848
-
Visual toolkit for network security experiment specification and data analysis
-
ACM Press, New York, NY, USA
-
Li L., Liu P., and Kesidis G. Visual toolkit for network security experiment specification and data analysis. VizSEC '06: proceedings of the third international workshop on visualization for computer security (2006), ACM Press, New York, NY, USA 7-14. http://doi.acm.org/10.1145/1179576.1179579
-
(2006)
VizSEC '06: proceedings of the third international workshop on visualization for computer security
, pp. 7-14
-
-
Li, L.1
Liu, P.2
Kesidis, G.3
-
15
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
Washington, DC;
-
Liljenstam M, Nicol D, Berk V, Gray R. Simulating realistic network worm traffic for worm warning system design and testing. In: Proceedings of ACM WORM. Washington, DC; 2003.
-
(2003)
Proceedings of ACM WORM
-
-
Liljenstam, M.1
Nicol, D.2
Berk, V.3
Gray, R.4
-
18
-
-
31844457315
-
Worm evolution tracking via timing analysis
-
ACM Press, New York, NY, USA
-
Rajab M., Monrose F., and Terzis A. Worm evolution tracking via timing analysis. WORM '05: proceedings of the 2005 ACM workshop on rapid malcode (2005), ACM Press, New York, NY, USA 52-59. http://doi.acm.org/10.1145/1103626.1103637
-
(2005)
WORM '05: proceedings of the 2005 ACM workshop on rapid malcode
, pp. 52-59
-
-
Rajab, M.1
Monrose, F.2
Terzis, A.3
-
22
-
-
33845571723
-
A multi-resolution approach for worm detection and containment
-
IEEE Computer Society, Washington, DC, USA
-
Sekar V., Xie Y., Reiter M.K., and Zhang H. A multi-resolution approach for worm detection and containment. DSN '06: proceedings of the international conference on dependable systems and networks (2006), IEEE Computer Society, Washington, DC, USA 189-198. http://dx.doi.org/10.1109/DSN.2006.6
-
(2006)
DSN '06: proceedings of the international conference on dependable systems and networks
, pp. 189-198
-
-
Sekar, V.1
Xie, Y.2
Reiter, M.K.3
Zhang, H.4
-
23
-
-
71649104597
-
-
Staniford S. Containment of scanning worms in enterprise networks. Journal of Computer Security
-
Staniford S. Containment of scanning worms in enterprise networks. Journal of Computer Security.
-
-
-
-
28
-
-
84948951525
-
Throttling viruses: restricting propagation to defeat malicious mobile code
-
IEEE Computer Society
-
Williamson M.M. Throttling viruses: restricting propagation to defeat malicious mobile code. ACSAC (2002), IEEE Computer Society 61-68
-
(2002)
ACSAC
, pp. 61-68
-
-
Williamson, M.M.1
-
29
-
-
14344250902
-
A firewall network system for worm defense in enterprise networks
-
Tech. Rep. TR-04-CSE-01, UMass; Feb
-
Zou C, Towsley D, Gong W. A firewall network system for worm defense in enterprise networks, Tech. Rep. TR-04-CSE-01, UMass; Feb. 2004.
-
(2004)
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
-
30
-
-
28044469549
-
The monitoring and early detection of internet worms
-
Zou C., Gong W., Towsley D., and Gao L. The monitoring and early detection of internet worms. IEEE/ACM Trans. Netw. 13 5 (2005) 961-974. http://dx.doi.org/10.1109/TNET.2005.857113
-
(2005)
IEEE/ACM Trans. Netw.
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
Gao, L.4
|