-
2
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Cliff, C. Z., Weibo, G., Don, T., "Code red worm propagation modeling and analysis", Proceedings of the 9th ACM conference on Computer and communications security, pp. 138-147, 2002.
-
(2002)
Proceedings of the 9th ACM conference on Computer and communications security
, pp. 138-147
-
-
Cliff, C.Z.1
Weibo, G.2
Don, T.3
-
3
-
-
43149085067
-
-
Rohloff, K., Bacar, T., Deterministic and stochastic models for the detection of random constant scanning worms, ACM Transactions on Modeling and Computer Simulation (TOMACS), 18, Issue. 2, No. 8, 2008
-
Rohloff, K., Bacar, T., "Deterministic and stochastic models for the detection of random constant scanning worms", ACM Transactions on Modeling and Computer Simulation (TOMACS), Vol. 18, Issue. 2, No. 8, 2008
-
-
-
-
4
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
Moore, D., Shannon, C., Brown, J., "Code-Red: A case study on the spread and victims of an Internet worm", Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurement, pp. 273-284, 2002
-
(2002)
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurement
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
6
-
-
17444378633
-
Email worm modeling and defense
-
Cliff, C. Z., Weibo G., Don, T., "Email worm modeling and defense", Proceedings of 13th International Conference Computer Communications and Networks, pp. 409-414, 2004.
-
(2004)
Proceedings of 13th International Conference Computer Communications and Networks
, pp. 409-414
-
-
Cliff, C.Z.1
Weibo, G.2
Don, T.3
-
7
-
-
54949092786
-
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
-
Wei, Y., Sriram, C., "Peer-to-peer system-based active worm attacks: Modeling, analysis and defense", ACM journal Computer Communication, Vol. 31, No. 17, pp. 4005-4017 , 2008
-
(2008)
ACM journal Computer Communication
, vol.31
, Issue.17
, pp. 4005-4017
-
-
Wei, Y.1
Sriram, C.2
-
8
-
-
77950156152
-
The ghost in the browser analysis of Web-based malware
-
Niels, P., Dean, M., Panayiotis M, Wang K., "The ghost in the browser analysis of Web-based malware", Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets. 2008
-
(2008)
Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
-
-
Niels, P.1
Dean, M.2
Panayiotis, M.3
Wang, K.4
-
9
-
-
35148824612
-
XSS Application Worms: New Internet Infestation and Optimized Protective Measures
-
Shanmugam, J. Ponnavaikko, M. , "XSS Application Worms: New Internet Infestation and Optimized Protective Measures", Proceeding of 8th Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Conference, pp 1164-1169, 2007
-
(2007)
Proceeding of 8th Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing Conference
, pp. 1164-1169
-
-
Shanmugam, J.1
Ponnavaikko, M.2
-
10
-
-
77950138464
-
-
Shanmugam, J. Ponnavaikko, M. , Cross Site Scripting-Latest developments and solutions: A survey, Int. J. Open Problems Compt. Math., 1, No. 2, pp 101-121, 2008
-
Shanmugam, J. Ponnavaikko, M. , "Cross Site Scripting-Latest developments and solutions: A survey", Int. J. Open Problems Compt. Math., Vol. 1, No. 2, pp 101-121, 2008
-
-
-
-
12
-
-
56649085023
-
Antisocial Networks: Turning a Social Network into a Botnet
-
Athanasopoulos, E., Makridakis, A, Antonatos, S., "Antisocial Networks: Turning a Social Network into a Botnet.", Proceeding of Information Security Conference / Workshop (ISC/ISW) 2008, pp. 146-160, 2008
-
(2008)
Proceeding of Information Security Conference / Workshop (ISC/ISW)
, pp. 146-160
-
-
Athanasopoulos, E.1
Makridakis, A.2
Antonatos, S.3
-
13
-
-
34547381072
-
Puppetnets: Misusing Web browsers as a distributed attack infrastructure
-
Lam, V. T., Antonatos, S., Akritidis, P., Anagnostakis, K. G., "Puppetnets: misusing Web browsers as a distributed attack infrastructure", Proceedings of the 13th ACM conference on Computer and communications security, pp. 221 - 234, 2006
-
(2006)
Proceedings of the 13th ACM conference on Computer and communications security
, pp. 221-234
-
-
Lam, V.T.1
Antonatos, S.2
Akritidis, P.3
Anagnostakis, K.G.4
-
14
-
-
37849052827
-
Protecting the Intranet Against JavaScript Malware and Related Attacks
-
Jones, M., Winter, J., "Protecting the Intranet Against JavaScript Malware and Related Attacks", Proceeding of ACM Detection of Intrusions and Malware, and Vulnerability Assessment, Vol. 4579 (2007), pp. 40-59., 2007
-
(2007)
Proceeding of ACM Detection of Intrusions and Malware, and Vulnerability Assessment
, vol.4579
, pp. 40-59
-
-
Jones, M.1
Winter, J.2
-
15
-
-
48349136934
-
On JavaScript Malware and related threats : WWWWeb page based attacks revisited
-
Johns, M., "On JavaScript Malware and related threats : WWWWeb page based attacks revisited", Springer Journal in Computer Virology, Vol. 4, No. 3, pp. 161-178, 2008
-
(2008)
Springer Journal in Computer Virology
, vol.4
, Issue.3
, pp. 161-178
-
-
Johns, M.1
-
18
-
-
57349153984
-
Static detection of cross-site scripting vulnerabilities
-
Leipzig, Germany
-
Gary Wassermann, Zhendong Su, "Static detection of cross-site scripting vulnerabilities", Proceedings of the 30th international conference on Software engineering, ICSE '08, Leipzig, Germany. 2008
-
(2008)
Proceedings of the 30th international conference on Software engineering, ICSE '08
-
-
Wassermann, G.1
Su, Z.2
-
21
-
-
35348871999
-
Analysis of topological characteristics of huge online social networking services
-
Yong-Yeol, A., Seungyeop, Kaok, H., Moon, S., Jeong, H., "Analysis of topological characteristics of huge online social networking services", Proceeding of the 16th International conference on World Wide Web, pp. 835-844, 2007.
-
(2007)
Proceeding of the 16th International conference on World Wide Web
, pp. 835-844
-
-
Yeol, Y.1
Seungyeop, A.2
Kaok, H.3
Moon, S.4
Jeong, H.5
-
23
-
-
41349104828
-
-
Holme, P., Beom J., Growing scale-free networks with tunable clustering, Phys. Rev. E 65, pp. 026107-1:4, 2002
-
Holme, P., Beom J., "Growing scale-free networks with tunable clustering", Phys. Rev. E 65, pp. 026107-1:4, 2002
-
-
-
-
24
-
-
4243206713
-
-
Davidsen, J., Ebel, H., and Bornholdt, S., Emergence of a Small World from Local Interactions: Modeling Acquaintance Networks, Physical Review Letters, 88, No. 12, pp. 128701-1:4.
-
Davidsen, J., Ebel, H., and Bornholdt, S., "Emergence of a Small World from Local Interactions: Modeling Acquaintance Networks," Physical Review Letters, Vol. 88, No. 12, pp. 128701-1:4.
-
-
-
-
25
-
-
33645299698
-
The structural phase transition among fixed cardinal networks
-
Kawachi, Y., Murata, K., Yoshi, S., Kakazu, Y., "The structural phase transition among fixed cardinal networks.", Proceeding of 7th Conference on Complex Systems Asia-Pacific, pp 247-255, 2004.
-
(2004)
Proceeding of 7th Conference on Complex Systems Asia-Pacific
, pp. 247-255
-
-
Kawachi, Y.1
Murata, K.2
Yoshi, S.3
Kakazu, Y.4
-
26
-
-
26844487796
-
Efficient and Simple Generation of Random Simple Connected Graphs with Prescribed Degree Sequence
-
Viger, F., Latapy, F., "Efficient and Simple Generation of Random Simple Connected Graphs with Prescribed Degree Sequence", Lecture notes in computer science, Vol. 3595, pp. 440-449.
-
Lecture notes in computer science
, vol.3595
, pp. 440-449
-
-
Viger, F.1
Latapy, F.2
-
27
-
-
0033196289
-
Networks, Dynamics, and the Small-World Phenomenon
-
Watts, D.J., "Networks, Dynamics, and the Small-World Phenomenon" American Journal of Sociology, Vol. 105, No. 2, pp 493-527, 1999.
-
(1999)
American Journal of Sociology
, vol.105
, Issue.2
, pp. 493-527
-
-
Watts, D.J.1
-
28
-
-
24744469980
-
-
[Newman, M., Power laws, Pareto distributions and Zipf's law, Contemporary Physics, 46, Issue 5, pp. 323-351, 2005.
-
[Newman, M., "Power laws, Pareto distributions and Zipf's law", Contemporary Physics, vol. 46, Issue 5, pp. 323-351, 2005.
-
-
-
|