-
2
-
-
0742276097
-
Inside the Slammer Worm
-
July
-
D. Moore, V. Paxson, and S. Savage, "Inside the Slammer Worm," IEEE Magazine of Security and Privacy, vol. 4, no. 1, pp. 33-39, July 2003.
-
(2003)
IEEE Magazine of Security and Privacy
, vol.4
, Issue.1
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
-
3
-
-
33750328206
-
Opportunistic measurement: Extracting insight from spurious traffic
-
Nov.
-
M. Casado, T. Garfinkel, W. Cui, V. Paxson, and S. Savage, "Opportunistic Measurement: Extracting Insight from Spurious Traffic," Proc. Fourth ACM SIGCOMM HotNets Workshop (Hot- Nets), Nov. 2005.
-
(2005)
Proc. Fourth ACM SIGCOMM HotNets Workshop (Hot- Nets)
-
-
Casado, M.1
Garfinkel, T.2
Cui, W.3
Paxson, V.4
Savage, S.5
-
14
-
-
33749864044
-
New streaming algorithms for superspreader detection
-
Feb.
-
S. Venkataraman, D. Song, P. Gibbons, and A. Blum, "New Streaming Algorithms for Superspreader Detection," Proc. 12th IEEE Network and Distributed Systems Security Symp. (NDSS), Feb. 2005.
-
(2005)
Proc. 12th IEEE Network and Distributed Systems Security Symp. (NDSS)
-
-
Venkataraman, S.1
Song, D.2
Gibbons, P.3
Blum, A.4
-
15
-
-
27544495684
-
Worm origin identification using random moonwalks
-
May
-
Y. Xie, V. Sekar, D.A. Maltz, M.K. Reiter, and H. Zhang, "Worm Origin Identification Using Random Moonwalks," Proc. IEEE Symp. Security and Privacy (S&P), May 2005.
-
(2005)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Xie, Y.1
Sekar, V.2
Maltz, D.A.3
Reiter, M.K.4
Zhang, H.5
-
18
-
-
34547261222
-
Packet vaccine: Black-box exploit detection and signature generation
-
Oct./ Nov.
-
X.F. Wang, Z. Li, J. Xu, M. Reiter, C. Kil, and J. Choi, "Packet Vaccine: Black-Box Exploit Detection and Signature Generation," Proc. 13th ACM Conf. Computer and Comm. Security (CCS), Oct./ Nov. 2006.
-
(2006)
Proc. 13th ACM Conf. Computer and Comm. Security (CCS)
-
-
Wang, X.F.1
Li, Z.2
Xu, J.3
Reiter, M.4
Kil, C.5
Choi, J.6
-
20
-
-
3543086916
-
Formalizing sensitivity in static analysis for intrusion detection
-
May
-
H.H. Feng, J.T. Giffin, Y. Huang, S. Jha, W. Lee, and B.P. Miller, "Formalizing Sensitivity in Static Analysis for Intrusion Detection," Proc. IEEE Symp. Security and Privacy (S&P), May 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Feng, H.H.1
Giffin, J.T.2
Huang, Y.3
Jha, S.4
Lee, W.5
Miller, B.P.6
-
21
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
May
-
M.G. Schultz, E. Eskin, E. Zadok, and S.J. Stolfo, "Data Mining Methods for Detection of New Malicious Executables," Proc. IEEE Symp. Security and Privacy (S&P), May 2001.
-
(2001)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
22
-
-
27544433210
-
Semantics-Aware malware detection
-
May
-
M. Christodorescu, S. Jha, S.A. Seshia, D. Song, and R.E. Bryant, "Semantics-Aware Malware Detection," Proc. IEEE Symp. Security and Privacy (S&P), May 2005.
-
(2005)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
23
-
-
77956178420
-
-
SANS, Internet Storm Center, http://isc.sans.org/, 2004.
-
(2004)
-
-
-
26
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter- packet delays
-
Nov.
-
X. Wang and D.S. Reeves, "Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Manipulation of Inter- Packet Delays," Proc. ACM Conf. Computer and Comm. Security (CCS), Nov. 2003.
-
(2003)
Proc. ACM Conf. Computer and Comm. Security (CCS)
-
-
Wang, X.1
Reeves, D.S.2
-
27
-
-
34548755641
-
Dsss-Based flow marking technique for invisible traceback
-
May
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "Dsss-Based Flow Marking Technique for Invisible Traceback," Proc. IEEE Symp. Security and Privacy (S&P), May 2007.
-
(2007)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
31
-
-
27544467640
-
Toward a framework for internet forensic analysis
-
Nov.
-
V. Sekar, Y. Xie, D. Maltz, M. Reiter, and H. Zhang, "Toward a Framework for Internet Forensic Analysis," Proc. Third Workshop Hot Topics in Networks (HotNets), Nov. 2004.
-
(2004)
Proc. Third Workshop Hot Topics in Networks (HotNets)
-
-
Sekar, V.1
Xie, Y.2
Maltz, D.3
Reiter, M.4
Zhang, H.5
-
32
-
-
27744442107
-
-
Wiley and Sons
-
R.L. Allen and D.W. Mills, Signal Analysis: Time, Frequency, Scale, and Structure. Wiley and Sons, 2004.
-
(2004)
Signal Analysis: Time, Frequency, Scale, and Structure
-
-
Allen, R.L.1
Mills, D.W.2
-
33
-
-
21844443617
-
A wavelet-based approach to detect shared congestion
-
M.S. Kim, T. Kim, Y.J. Shin, S.S. Lam, and E.J. Powers, "A Wavelet-Based Approach to Detect Shared Congestion," ACM SIGCOMM Computer Comm. Rev., vol. 34, no. 4, pp. 293-306, 2004.
-
(2004)
ACM SIGCOMM Computer Comm. Rev.
, vol.34
, Issue.4
, pp. 293-306
-
-
Kim, M.S.1
Kim, T.2
Shin, Y.J.3
Lam, S.S.4
Powers, E.J.5
-
34
-
-
34548325869
-
Towards unbiased end-to-end network diagnosis
-
Sept.
-
Y. Zhao, Y. Chen, and D. Bindel, "Towards Unbiased End-to-End Network Diagnosis," Proc. ACM SIGCOMM, Sept. 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Zhao, Y.1
Chen, Y.2
Bindel, D.3
-
35
-
-
0000615530
-
An integrated congestion management architecture for internet hosts
-
Sept.
-
H. Balakrishnan, S. Seshan, and H. Rahul, "An Integrated Congestion Management Architecture for Internet Hosts," Proc. ACM SIGCOMM, Sept. 1999.
-
(1999)
Proc. ACM SIGCOMM
-
-
Balakrishnan, H.1
Seshan, S.2
Rahul, H.3
-
36
-
-
11144286121
-
The spectral autocorrelation peak valley ratio (sapvr)-a usable speech measure employed as a co-channel detection system
-
May
-
R.E. Yantorno, K.R. Krishnamachari, J.M. Lovekin, D.S. Benincasa, and S.J. Wenndt, "The Spectral Autocorrelation Peak Valley Ratio (Sapvr)-a Usable Speech Measure Employed as a Co-Channel Detection System," Proc. IEEE Int'l Workshop Intelligent Signal Processing (WISP), May 2001.
-
(2001)
Proc. IEEE Int'l Workshop Intelligent Signal Processing (WISP)
-
-
Yantorno, R.E.1
Krishnamachari, K.R.2
Lovekin, J.M.3
Benincasa, D.S.4
Wenndt, S.J.5
-
38
-
-
51349114948
-
Polymorphic blending attacks
-
Aug.
-
R. Perdisci, O. Kolesnikov, P. Fogla, M. Sharif, and W. Lee, "Polymorphic Blending Attacks," Proc. 15th USENIX Security Symp. (SECURITY), Aug. 2006.
-
(2006)
Proc. 15th USENIX Security Symp. (SECURITY)
-
-
Perdisci, R.1
Kolesnikov, O.2
Fogla, P.3
Sharif, M.4
Lee, W.5
-
40
-
-
77956179606
-
-
MetaPHOR
-
MetaPHOR, http://securityresponse.symantec.com/avcenter/ venc/data/w32.simile.html, 2010.
-
(2010)
-
-
-
43
-
-
85156147536
-
Impeding malware analysis using conditional code obfuscation
-
Feb.
-
M. Sharif, J. Giffin, W. Lee, and A. Lanzi, "Impeding Malware Analysis Using Conditional Code Obfuscation," Proc. 15th IEEE Network and Distributed System Security Symp. (NDSS), Feb. 2008.
-
(2008)
Proc. 15th IEEE Network and Distributed System Security Symp. (NDSS)
-
-
Sharif, M.1
Giffin, J.2
Lee, W.3
Lanzi, A.4
-
49
-
-
77952395098
-
On the trade-off between speed and resiliency of flash worms and similar malcodes
-
Oct.
-
D. Ha and H. Ngo, "On the Trade-Off between Speed and Resiliency of Flash Worms and Similar Malcodes," Proc. Fifth ACM Workshop Recurring Malcode (WORM), Oct. 2007.
-
(2007)
Proc. Fifth ACM Workshop Recurring Malcode (WORM)
-
-
Ha, D.1
Ngo, H.2
-
50
-
-
57349091683
-
Improving sensor network immunity under worm attacks: A software diversity approach
-
May
-
Y. Yang, S. Zhu, and G. Cao, "Improving Sensor Network Immunity under Worm Attacks: A Software Diversity Approach," Proc. ACM MobiHoc, May 2008.
-
(2008)
Proc. ACM MobiHoc
-
-
Yang, Y.1
Zhu, S.2
Cao, G.3
-
51
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
May
-
J. Jung, V. Paxson, A.W. Berger, and H. Balakrishnan, "Fast Portscan Detection Using Sequential Hypothesis Testing," Proc. IEEE Symp. Security and Privacy (S&P), May 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
52
-
-
26844510250
-
Monitoring and early detection for internet worms
-
Oct.
-
C. Zou, W.B. Gong, D. Towsley, and L.X. Gao, "Monitoring and Early Detection for Internet Worms," Proc. 10th ACM Conf. Computer and Comm. Security (CCS), Oct. 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS)
-
-
Zou, C.1
Gong, W.B.2
Towsley, D.3
Gao, L.X.4
-
54
-
-
21644482790
-
Worm detection, early warning, and response based on local victim information
-
Dec.
-
G.F. Gu, D. Dagon, M.I. Sharif, X.Z. Qin, W. Lee, and G.F. Riley, "Worm Detection, Early Warning, and Response Based on Local Victim Information," Proc. 20th Ann. Computer Security Applications Conf. (ACSAC), Dec. 2004.
-
(2004)
Proc. 20th Ann. Computer Security Applications Conf. (ACSAC)
-
-
Gu, G.F.1
Dagon, D.2
Sharif, M.I.3
Qin, X.Z.4
Lee, W.5
Riley, G.F.6
-
56
-
-
4444372495
-
The session token protocol for forensics and traceback
-
B. Carrier and C. Shields, "The Session Token Protocol for Forensics and Traceback," ACM Trans. Information and System Security (TISSEC), vol. 7, no. 3, pp. 332-362, 2004.
-
(2004)
ACM Trans. Information and System Security (TISSEC)
, vol.7
, Issue.3
, pp. 332-362
-
-
Carrier, B.1
Shields, C.2
-
57
-
-
16644384919
-
Incentive-based modeling and inference of attacker intent, objectives, and strategies
-
P. Liu and W.Y.M. Yu, "Incentive-Based Modeling and Inference of Attacker Intent, Objectives, and Strategies," ACM Trans. Information System and Security, vol. 8, no. 1, pp. 78-118, 2005.
-
(2005)
ACM Trans. Information System and Security
, vol.8
, Issue.1
, pp. 78-118
-
-
Liu, P.1
Yu, W.Y.M.2
-
58
-
-
33947628137
-
Game theoretic analysis of cooperation stimulation and security in autonomous mobile ad hoc networks
-
May
-
W. Yu and K.J.R. Liu, "Game Theoretic Analysis of Cooperation Stimulation and Security in Autonomous Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 507-521, May 2007.
-
(2007)
IEEE Trans. Mobile Computing
, vol.6
, Issue.5
, pp. 507-521
-
-
Yu, W.1
Liu, K.J.R.2
-
61
-
-
33845765242
-
-
Prentice-Hall, Inc
-
J. Farlow, J.E. Hall, J.M. McDill, and B.H. West, Differential Equations and Linear Algebra. Prentice-Hall, Inc., 2002.
-
(2002)
Differential Equations and Linear Algebra
-
-
Farlow, J.1
Hall, J.E.2
McDill, J.M.3
West, B.H.4
|