-
1
-
-
14944380936
-
The top speed of flash worms
-
NewYork,NY, USA: ACM Press
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver, "The top speed of flash worms," in WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcode. NewYork,NY, USA: ACM Press, 2004, pp. 33-42.
-
(2004)
WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
2
-
-
3042742908
-
An analysis of the slapper worm
-
I. Arce and E. Levy, "An analysis of the slapper worm," IEEE Security and Privacy, vol.1, no.1, pp. 82-87, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 82-87
-
-
Arce, I.1
Levy, E.2
-
3
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm," IEEE Security and Privacy, vol.1, no.4, pp. 33-39, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
4
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
New York, NY, USA: ACM Press
-
D. Moore, C. Shannon, and J. Brown, "Code-red: a case study on the spread and victims of an internet worm," in IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. New York, NY, USA: ACM Press, 2002, pp. 273-284.
-
(2002)
IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
5
-
-
4344627335
-
The spread of the witty worm
-
C. Shannon and D. Moore, "The spread of the witty worm," IEEE Security and Privacy Magazine, vol.2, no.4, pp. 46-50, 2004.
-
(2004)
IEEE Security and Privacy Magazine
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
6
-
-
0742276097
-
The spread of the sapphire/slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "The spread of the sapphire/slammer worm," CAIDA, pp. 33-39, 2003.
-
(2003)
CAIDA
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
7
-
-
0042474227
-
Modeling the spread of active worms
-
Mar 30 - Apr 3
-
Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, vol.3, Mar 30 - Apr 3 2003, pp. 1890-1900.
-
(2003)
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
8
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
New York, NY, USA: ACM Press
-
C. C. Zou, W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in CCS '02: Proceedings of the 9th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2002, pp. 138-147.
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
9
-
-
28044469549
-
The monitoring and early detection of internet worms
-
C. C. Zou, W. Gong, D. Towsley, and L. Gao, "The monitoring and early detection of internet worms," IEEE/ACM Trans. Netw., vol.13, no.5, pp. 961-974, 2005.
-
(2005)
IEEE/ACM Trans. Netw.
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
Gao, L.4
-
10
-
-
84942234675
-
Cooperative response strategies for large scale attack mitigation
-
D. Nojiri, J. Rowe, and K. Levitt, "Cooperative response strategies for large scale attack mitigation," in DARPA Information Survivability Conference and Exposition, 2003. Proceedings, vol.1, 2003, pp. 293-302.
-
(2003)
DARPA Information Survivability Conference and Exposition 2003. Proceedings
, vol.1
, pp. 293-302
-
-
Nojiri, D.1
Rowe, J.2
Levitt, K.3
-
11
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet quarantine: requirements for containing self-propagating code," in INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, vol.3, 2003, pp. 1901-1910.
-
(2003)
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE
, vol.3
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
12
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
New York, NY, USA: ACM Press
-
C. C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," in WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode. New York, NY, USA: ACM Press, 2003, pp. 51-60.
-
(2003)
WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 51-60
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
13
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
NewYork, NY, USA: ACM Press
-
M. Liljenstam, D. M. Nicol, V. H. Berk, and R. S. Gray, "Simulating realistic network worm traffic for worm warning system design and testing," in WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode. NewYork, NY, USA: ACM Press, 2003, pp. 24-33.
-
(2003)
WORM '03: Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 24-33
-
-
Liljenstam, M.1
Nicol, D.M.2
Berk, V.H.3
Gray, R.S.4
-
14
-
-
26844507894
-
Routing worm: A fast, selective attack worm based on ip address information
-
Washington, DC, USA: IEEE Computer Society
-
C. C. Zou, D. Towsley, W. Gong, and S. Cai, "Routing worm: A fast, selective attack worm based on ip address information," in PADS '05: Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation. Washington, DC, USA: IEEE Computer Society, 2005, pp. 199-206.
-
(2005)
PADS '05: Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
, pp. 199-206
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
15
-
-
85084162258
-
How to own the internet in your spare time
-
Berkeley,CA,USA: USENIX Association
-
S. Staniford, V. Paxson, and N. Weaver, "How to own the internet in your spare time," in Proceedings of the 11th USENIX Security Symposium. Berkeley,CA,USA: USENIX Association, 2002, pp. 149-167.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
17
-
-
77952378960
-
-
"http://www.icir.org/yoid/."
-
-
-
-
18
-
-
0034775826
-
A scalable content-addressable network
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker, "A scalable content-addressable network," in SIGCOMM 2001, 2001, pp. 161-172.
-
(2001)
SIGCOMM 2001
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Schenker, S.5
-
19
-
-
33744925665
-
Scalable application layer multicast
-
New York, NY, USA: ACM Press
-
S. Banerjee, B. Bhattacharjee, and C. Kommareddy, "Scalable application layer multicast," in SIGCOMM 2002. New York, NY, USA: ACM Press, 2002, pp. 205-217.
-
(2002)
SIGCOMM 2002
, pp. 205-217
-
-
Banerjee, S.1
Bhattacharjee, B.2
Kommareddy, C.3
-
20
-
-
1642535191
-
Data networks are lightly utilized, and will stay that way
-
September
-
A. Odlyzko, "Data networks are lightly utilized, and will stay that way," Review of Network Economics, vol.2, no.3, pp. 210-237, September 2003.
-
(2003)
Review of Network Economics
, vol.2
, Issue.3
, pp. 210-237
-
-
Odlyzko, A.1
-
21
-
-
77952348042
-
-
http://www.f-secure.com/v-descs/mssqlm.shtml.
-
-
-
-
22
-
-
77952354172
-
-
http://www.f-secure.com/v-descs/witty.shtml.
-
-
-
-
23
-
-
84888896341
-
-
CAIDA, "Skitter datasets," http://www.caida.org/tools/ measurement/skitter/.
-
Skitter Datasets
-
-
-
24
-
-
0038446831
-
Extractors: Optimal up to constant factors
-
New York: ACM, (electronic)
-
C.-J. Lu, O. Reingold, S. Vadhan, and A. Wigderson, "Extractors: optimal up to constant factors," in Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing. New York: ACM, 2003, pp. 602-611 (electronic).
-
(2003)
Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing
, pp. 602-611
-
-
Lu, C.-J.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
25
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2004, pp. 211-225.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
26
-
-
77952349152
-
-
http://www.honeynet.org.
-
-
-
-
28
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
Washington, DC, USA: IEEE Computer Society
-
M. M. Williamson, "Throttling viruses: Restricting propagation to defeat malicious mobile code," in ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society, 2002, p. 61.
-
(2002)
ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference
, pp. 61
-
-
Williamson, M.M.1
|