-
1
-
-
0038289959
-
-
CERT Advisory CA-1999-04, CERT, Pittsburgh, PA, USA, Mar.
-
Melissa macro virus. CERT Advisory CA-1999-04, CERT, Pittsburgh, PA, USA, Mar. 1999.
-
(1999)
Melissa Macro Virus
-
-
-
2
-
-
34547185428
-
On the impact of dynamic addressing on malware propagation
-
New York, NY, USA, ACM
-
M. Abu Rajab, F. Monrose, and A. Terzis. On the impact of dynamic addressing on malware propagation. In Proceedings of the 4th ACM workshop on Recurring malcode, pages 51-56, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 4th ACM Workshop on Recurring Malcode
, pp. 51-56
-
-
Abu Rajab, M.1
Monrose, F.2
Terzis, A.3
-
3
-
-
78651396454
-
Advances in Information Security
-
Springer Science+Business Media, LLC
-
J. Aycock. Computer Ciruses and Malware. Advances in Information Security. Springer Science+Business Media, LLC, 2006.
-
(2006)
Computer Ciruses and Malware
-
-
Aycock, J.1
-
4
-
-
62849110811
-
Noisy defenses: Subverting malware's OODA loop
-
New York, NY, USA, ACM
-
D. Bilar. Noisy defenses: Subverting malware's OODA loop. In Proceedings of the 4th annual workshop on Cyber security and information intelligence research, number 9, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 4th Annual Workshop on Cyber Security and Information Intelligence Research
, Issue.9
-
-
Bilar, D.1
-
7
-
-
48349110924
-
-
Technical Report TR-06-004, International Computer Science Institute, Berkeley, CA, USA, Sep.
-
W. Cui, V. Paxson, and N. C. Weaver. GQ: Realizing a system to catch worms in a quarter million places. Technical Report TR-06-004, International Computer Science Institute, Berkeley, CA, USA, Sep. 2006.
-
(2006)
GQ: Realizing a System to Catch Worms in a Quarter Million Places
-
-
Cui, W.1
Paxson, V.2
Weaver, N.C.3
-
10
-
-
78651407112
-
Dichotomy: Double trouble
-
May
-
E. Kaspersky. Dichotomy: Double trouble. Virus Bulletin, pages 8-9, May 1994.
-
(1994)
Virus Bulletin
, pp. 8-9
-
-
Kaspersky, E.1
-
11
-
-
78651390797
-
RMNS - The perfect couple
-
May
-
E. Kaspersky. RMNS - the perfect couple. Virus Bulletin, pages 8-9, May 1995.
-
(1995)
Virus Bulletin
, pp. 8-9
-
-
Kaspersky, E.1
-
12
-
-
0029488806
-
MCF: A malicious code filter
-
Nov.
-
R. W. Lo, K. N. Levitt, and R. A. Olsson. MCF: a malicious code filter. Computers & Security, 14(6):541-566, Nov. 1995.
-
(1995)
Computers & Security
, vol.14
, Issue.6
, pp. 541-566
-
-
Lo, R.W.1
Levitt, K.N.2
Olsson, R.A.3
-
13
-
-
34547299999
-
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams
-
New York, NY, USA, ACM
-
S. Mathew, R. Giomundo, S. Upadhyaya, M. Sudit, and A. Stotz. Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. In Proceedings of the 3rd international workshop on Visualization for computer security, pages 1-6, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 3rd International Workshop on Visualization for Computer Security
, pp. 1-6
-
-
Mathew, S.1
Giomundo, R.2
Upadhyaya, S.3
Sudit, M.4
Stotz, A.5
-
14
-
-
84969506768
-
Applications of hidden markov models to detecting multi-stage network attacks
-
D. Ourston, S. Matzner, W. Stump, and B. Hopkins. Applications of hidden markov models to detecting multi-stage network attacks. In Proceedings of the 36th Hawaii International Conference on Systems Sciences, Los Alamitos, CA, USA, 2003 2003. IEEE Comput. Soc. 36th Hawaii International Conference on Systems Sciences, 6-9 January 2003, Big Island, HI, USA.
-
Proceedings of the 36th Hawaii International Conference on Systems Sciences, Los Alamitos, CA, USA, 2003 2003. IEEE Comput. Soc. 36th Hawaii International Conference on Systems Sciences, 6-9 January 2003, Big Island, HI, USA
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
15
-
-
0004145058
-
-
Technical report, Secure Networks, Inc., Jan.
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., Jan. 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
16
-
-
0016555241
-
The protection of information in computer systems
-
Sep.
-
J. J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sep. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.J.1
Schroeder, M.2
-
19
-
-
0034593179
-
A requires/provides model for computer attacks
-
New York, NY, USA, ACM
-
S. J. Templeton and K. Levitt. A requires/provides model for computer attacks. In Proceedings of the 2000 workshop on New security paradigms, pages 31-38, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the 2000 Workshop on New Security Paradigms
, pp. 31-38
-
-
Templeton, S.J.1
Levitt, K.2
|