-
2
-
-
10044259345
-
-
Tilab, September
-
Bellifemine, F., Caire, G., Trucco, T., Rimassa, G.: Jade-a white paper. Tilab (2003a, September).
-
(2003)
Jade-a white paper
-
-
Bellifemine, F.1
Caire, G.2
Trucco, T.3
Rimassa, G.4
-
3
-
-
56549099378
-
-
Tilab, February
-
Bellifemine, F., Caire, G., Trucco, T., Rimassa, G.: Jade programmers guide. Tilab (2003b, February).
-
(2003)
Jade programmers guide
-
-
Bellifemine, F.1
Caire, G.2
Trucco, T.3
Rimassa, G.4
-
6
-
-
0030615467
-
Designing distributed applications with a mobile code paradigm
-
Boston, MA, USA
-
Carzaniga, A., Picco, G. P., Vigna, G.: Designing distributed applications with a mobile code paradigm. In: Proceedings of the 19th International Conference on Software Engineering. Boston, MA, USA. http://citeseer.ist.psu.edu/carzaniga97designing.html (1997).
-
(1997)
Proceedings of the 19th International Conference on Software Engineering
-
-
Carzaniga, A.1
Picco, G.P.2
Vigna, G.3
-
7
-
-
0029392001
-
Itinerant agents for mobile computing
-
Chess, D., Grosof, B., Harrison, C., Levine, D., Parris, C., Tsudik, G.: Itinerant agents for mobile computing. IEEE Personal Commun. 2(5), 34-49. http://citeseer.ist.psu.edu/article/chess95itinerant.html (1995).
-
(1995)
IEEE Personal Commun
, vol.2
, Issue.5
, pp. 34-49
-
-
Chess, D.1
Grosof, B.2
Harrison, C.3
Levine, D.4
Parris, C.5
Tsudik, G.6
-
8
-
-
0003906677
-
-
(RC 19887 (December 21, 1994 - Declassified March 16, 1995)). IBM Research, Yorktown Heights, New York
-
Chess, D., Harrison, C., Kershenbaum, A.: Mobile agents: Are they a good idea? (RC 19887 (December 21, 1994 - Declassified March 16, 1995)). IBM Research, Yorktown Heights, New York. http://citeseer.ist. psu.edu/chess95mobile.html (1994).
-
(1994)
Mobile Agents: Are they a Good Idea?
-
-
Chess, D.1
Harrison, C.2
Kershenbaum, A.3
-
9
-
-
18844371168
-
Worm anatomy and model
-
ACM, New York, NY, USA
-
Ellis, D.: Worm anatomy and model. In: Worm '03 Proceedings of the 2003 ACM workshop on rapid malcode, pp. 42-50. ACM, New York, NY, USA (2003).
-
(2003)
Worm '03 Proceedings of the 2003 ACM workshop on rapid malcode
, pp. 42-50
-
-
Ellis, D.1
-
11
-
-
74849127913
-
-
(last access: October 29, 2007)
-
Faistenhammer, T., Klöck, M., Klotz, K., Krüger, T., Reinisch, P., Wagner, J.: October. Virlab 2. 1. Internet. http://kklotz.de/html/virlab.html (last access: October 29, 2007)) (1993).
-
(1993)
Virlab 2.1. Internet
-
-
Faistenhammer, T.1
Klöck, M.2
Klotz, K.3
Krüger, T.4
Reinisch, P.5
Wagner, J.6
-
13
-
-
70350622131
-
Combinatorial optimisation of worm propagation on an unknown network
-
(last access: March 7, 2008)
-
Filiol, É., Franc, E., Gubbioli, A., Moquet, B., Roblot, G.: Combinatorial optimisation of worm propagation on an unknown network. Int. J. Comput. Sci. 2(2), 124-131. http://vx.netlux.org (last access: March 7, 2008) (2007).
-
(2007)
Int. J. Comput. Sci.
, vol.2
, Issue.2
, pp. 124-131
-
-
Filiol, É.1
Franc, E.2
Gubbioli, A.3
Moquet, B.4
Roblot, G.5
-
14
-
-
84926306857
-
Is it an agent, or just a program?: A taxonomy for autonomous agents
-
Springer, Berlin
-
Franklin, S., Graesser, A.: Is it an agent, or just a program?: a taxonomy for autonomous agents. Intelligent agents III. agent theories, architectures and languages (ATAL'96), vol. 1193. Springer, Berlin. http://citeseer.ist.psu.edu/franklin96is.html (1996).
-
(1996)
Intelligent Agents III. Agent Theories, Architectures and Languages (ATAL'96)
, vol.1193
, Issue.2
-
-
Franklin, S.1
Graesser, A.2
-
15
-
-
4544373958
-
Understanding code mobility
-
Fuggetta, A., Picco, G. P., Vigna, G.: Understanding code mobility. IEEE Trans. Software Eng. 24(5), 342-361. http://citeseer.ist.psu.edu/fuggetta98understanding.html (1998).
-
(1998)
IEEE Trans. Software Eng.
, vol.24
, Issue.5
, pp. 342-361
-
-
Fuggetta, A.1
Picco, G.P.2
Vigna, G.3
-
16
-
-
20444505381
-
Peep (the network auralizer): Monitoring your network with sound
-
USENIX Association, Berkeley, CA, USA
-
Gilfix, M., Couch, A. L.: Peep (the network auralizer): Monitoring your network with sound. In: Lisa '00: Proceedings of the 14th USENIX Conference on System Administration, pp. 109-118. USENIX Association, Berkeley, CA, USA (2000).
-
(2000)
Lisa '00: Proceedings of the 14th USENIX Conference on System Administration
, pp. 109-118
-
-
Gilfix, M.1
Couch, A.L.2
-
17
-
-
0030240880
-
Are good virus simulators still a bad idea?
-
Gordon S.: Are good virus simulators still a bad idea?. Network Security 1996(9), 7-13 (1996).
-
(1996)
Network Security
, vol.1996
, Issue.9
, pp. 7-13
-
-
Gordon, S.1
-
18
-
-
74849125268
-
Are good virus simulators still a bad idea?
-
Dartmouth College, Hanover, NH
-
Gray, R. S., Kotz, D., Cybenko, G., Rus, D.: Mobile agents: motivations and state-of-the-art systems (TR2000-365). Dartmouth College, Hanover, NH. http://citeseer.ist.psu.edu/gray00mobile.html (2000).
-
(2000)
Mobile Agents: Motivations and State-of-the-art Systems (TR2000-365)
-
-
Gray, R.S.1
Kotz, D.2
Cybenko, G.3
Rus, D.4
-
19
-
-
74849122552
-
A forum for supporters of the distributed network protocol
-
(last access: March 14, 2008) (December)
-
Group, D. U.: A forum for supporters of the distributed network protocol. Internet. http://www.dnp.org/ (last access: March 14, 2008) (2008, December).
-
(2008)
Internet
-
-
Group, D.U.1
-
20
-
-
74849123442
-
Virus simulation suite
-
Hirst, J.: Virus simulation suite. Internet (1990).
-
(1990)
Internet
-
-
Hirst, J.1
-
22
-
-
34247274420
-
-
Italy, European Commission, Joint Research Centre, Institute for the Protection and security of the Citizen, (June)
-
Leszczyna, R.: Evaluation of agent platforms Ispra, Italy: European Commission, Joint Research Centre, Institute for the Protection and security of the Citizen (2004, June).
-
(2004)
Evaluation of Agent Platforms Ispra
-
-
Leszczyna, R.1
-
23
-
-
84923309529
-
Malsim-mobile agent malware simulator
-
Association for Computing Machinery (ACM) Press, New York, (March)
-
Leszczyna, R., Fovino, I. N., Masera, M.: Malsim-mobile agent malware simulator. In: Proceedings of First International Conference on Simulation Tools and Techniques for Communications, Networks and Systems (SIMUTools 2008). Association for Computing Machinery (ACM) Press, New York (2008a, March).
-
(2008)
Proceedings of First International Conference on Simulation Tools and Techniques for Communications, Networks and Systems (SIMUTools 2008)
-
-
Leszczyna, R.1
Fovino, I.N.2
Masera, M.3
-
24
-
-
57849146549
-
Security evaluation of IT systems underlying critical networked infrastructures
-
Gdansk, Poland, 18-21 May 2008)
-
Leszczyna, R., Fovino, I. N., Masera, M.: Security evaluation of IT systems underlying critical networked infrastructures. (Accepted for First International IEEE Conference on Information Technology (IT 2008), Gdansk, Poland, 18-21 May 2008) (2008b).
-
(2008)
Accepted for First International IEEE Conference on Information Technology (IT 2008)
-
-
Leszczyna, R.1
Fovino, I.N.2
Masera, M.3
-
25
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
Liljenstam, M., Nicol, D. M., Berk, V. H., Gray, R. S.: Simulating realistic network worm traffic for worm warning system design and testing. In: Worm '03: Proceedings of the 2003 ACM workshop on rapid malcode, pp. 24-33 (2003).
-
(2003)
Worm '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 24-33
-
-
Liljenstam, M.1
Nicol, D.M.2
Berk, V.H.3
Gray, R.S.4
-
26
-
-
84880028758
-
A mixed abstraction level simulation model of large-scale internet worm infestations
-
IEEE Computer Society, Washington, DC, USA
-
Liljenstam, M., Yuan, Y., Premore, B., Nicol, D.: A mixed abstraction level simulation model of large-scale internet worm infestations. In: Mascots '02: Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (mascots'02), p. 109. IEEE Computer Society, Washington, DC, USA (2002).
-
(2002)
Mascots '02: Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems (mascots'02)
, pp. 109
-
-
Liljenstam, M.1
Yuan, Y.2
Premore, B.3
Nicol, D.4
-
27
-
-
74849085426
-
-
(last access: January 18, 2008)
-
McAfee. McAfee virus information. Website. (http://uk.mcafee.com/virusInfo/ (last access: January 18, 2008)).
-
McAfee. McAfee Virus Information
-
-
-
28
-
-
0002586020
-
Trend wars: Mobile agent applications
-
Milojicic, D. S.: Trend wars: Mobile agent applications. IEEE Concurrency 7(3), 80-90. http://dlib.computer.org/pd/books/pd1999/pdf/p3080.pdf (1999).
-
(1999)
IEEE Concurrency
, vol.7
, Issue.3
, pp. 80-90
-
-
Milojicic, D.S.1
-
29
-
-
0141495690
-
-
Mischel Internet Security, Trojan simulator., (last access: October 29, 2007)
-
Mischel Internet Security. Trojan simulator. Internet. http://www.misec.net/trojansimulator/ (last access: October 29, 2007) (2003).
-
(2003)
Internet
-
-
-
30
-
-
74849140931
-
Modbus-IDA
-
(last access: March 14, 2008)
-
Modbus-IDA. MODBUS application protocol specification v1. 1b. http://www.modbus.org/specs.php (last access: March 14, 2008) (2006).
-
(2006)
MODBUS Application Protocol Specification V1.1b
-
-
-
31
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
(April)
-
Moore, D., Shannon, C., Voelker, G. M., Savage, S.: Internet quarantine: Requirements for containing self-propagating code. In: Infocom 2003. Twenty-Second Annual Joint Conference of the Ieee Computer and Communications Societies, vol. 3, pp. 1901-1910 (2003, April).
-
(2003)
Infocom 2003. Twenty-Second Annual Joint Conference of the Ieee Computer and Communications Societies
, vol.3
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
33
-
-
74849105753
-
-
Rosenthal Engineering, Internet
-
Rosenthal Engineering. Rosenthal virus simulator. Internet (1997).
-
(1997)
Rosenthal Virus Simulator
-
-
-
34
-
-
67649855890
-
-
SecurityFocus, last access: January 17
-
SecurityFocus. SecurityFocus vulnerability database. http://www. securityfocus. com/bid (last access: January 17, 2008).
-
(2008)
SecurityFocus Vulnerability Database
-
-
-
35
-
-
26844467276
-
Comparative study between analytical models and packet-level worm simulations
-
IEEE Computer Society, Washington, DC, USA
-
Sharif, M. I., Riley, G. F., Lee, W.: Comparative study between analytical models and packet-level worm simulations. In: Pads '05: Proceedings of the 19th workshop on principles of advanced and distributed simulation, pp. 88-98. IEEE Computer Society, Washington, DC, USA (2005).
-
(2005)
Pads '05: Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
, pp. 88-98
-
-
Sharif, M.I.1
Riley, G.F.2
Lee, W.3
-
36
-
-
20444443538
-
-
Prentice Hall Professional Technical Reference, Upper Saddle River, New Jersey, USA
-
Skoudis, E., Zeltser, L.: Malware: Fighting malicious code. Prentice Hall Professional Technical Reference, Upper Saddle River, New Jersey, USA (2003).
-
(2003)
Malware: Fighting Malicious Code
-
-
Skoudis, E.1
Zeltser, L.2
-
37
-
-
74849090945
-
-
(last access: January 18
-
Symantec. Symantec security response. (http://www. symantec. com/security_response/ (last access: January 18, 2008).
-
(2008)
Symantec Security Response
-
-
-
38
-
-
74849137054
-
-
Symantec Research Labs
-
Symantec Research Labs 2005. Symantec worm simulator. Internet.
-
(2005)
Symantec Worm Simulator
-
-
-
39
-
-
33646414637
-
-
Addison Wesley Professional, Reading, MA, USA
-
Szor, P.: The art of computer virus research and defense, 1st edn. Addison Wesley Professional, Reading, MA, USA (2005).
-
(2005)
The Art of Computer Virus Research and Defense, 1st Edn
-
-
Szor, P.1
-
41
-
-
18844395616
-
Experiences with worm propagation simulations
-
ACM, New York, NY, USA
-
Wagner, A., Dübendorfer, T., Plattner, B., Hiestand, R.: Experiences with worm propagation simulations. In: Worm '03: Proceedings of the 2003 ACM workshop on rapid malcode, pp. 34-41. ACM, New York, NY, USA (2003).
-
(2003)
Worm '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 34-41
-
-
Wagner, A.1
Dübendorfer, T.2
Plattner, B.3
Hiestand, R.4
-
42
-
-
26844560830
-
Distributed worm simulation with a realistic internet model
-
IEEE Computer Society, Washington, DC, USA
-
Wei, S., Mirkovic, J., Swany, M.: Distributed worm simulation with a realistic internet model. In: Pads '05: Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation, pp. 71-79. IEEE Computer Society, Washington, DC, USA (2005).
-
(2005)
Pads '05: Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
, pp. 71-79
-
-
Wei, S.1
Mirkovic, J.2
Swany, M.3
-
43
-
-
0043223775
-
A sanctuary for mobile agents
-
Monterey, USA, (last access: May 08, 2006) (1997, March)
-
Yee, B. S.: A sanctuary for mobile agents. In: Proceedings of the DARPA Workshop on Foundations for Secure Mobile Code. Monterey, USA. http://citeseer. ist. psu. edu/article/yee97sanctuary. html (last access: May 08, 2006) (1997, March).
-
(1997)
Proceedings of the DARPA Workshop on Foundations for Secure Mobile Code
-
-
Yee, B.S.1
-
44
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
ACM, New York, NY, USA
-
Zou, C. C., Gong, W., Towsley, D.: Worm propagation modeling and analysis under dynamic quarantine defense. In: Worm '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp. 51-60. ACM, New York, NY, USA (2003).
-
Worm '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 51-60
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
|