-
3
-
-
79952920957
-
-
CERT, CERT/CC Advisories, http://www.cert.org/advisories/, 2010.
-
(2010)
CERT/CC Advisories
-
-
-
5
-
-
79952936592
-
-
W32/MyDoom. B Virus, http://www.us-cert.gov/cas/techalerts/TA04-028A. html, 2010.
-
(2010)
-
-
-
6
-
-
79952950526
-
-
W32. Sircam. Worm@mm, http://www.symantec.com/avcenter/venc/data/w32. sircam.worm@mm.html, 2010.
-
(2010)
-
-
-
7
-
-
79952904474
-
-
Worm. ExploreZip, http://www.symantec.com/avcenter/venc/data/worm. explore.zip.html, 2010.
-
(2010)
-
-
-
19
-
-
26844510250
-
Monitoring and early detection for internet worms
-
Oct
-
C. Zou, W. B. Gong, D. Towsley, and L. X. Gao, "Monitoring and Early Detection for Internet Worms, " Proc. 10th ACM Conf. Computer and Comm. Security (CCS), Oct. 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS)
-
-
Zou, C.1
Gong, W.B.2
Towsley, D.3
Gao, L.X.4
-
20
-
-
33749864044
-
New streaming algorithms for superspreader detection
-
Feb
-
S. Venkataraman, D. Song, P. Gibbons, and A. Blum, "New Streaming Algorithms for SuperSpreader Detection, " Proc. 12th IEEE Network and Distributed Systems Security Symp. (NDSS), Feb. 2005.
-
(2005)
Proc. 12th IEEE Network and Distributed Systems Security Symp. (NDSS)
-
-
Venkataraman, S.1
Song, D.2
Gibbons, P.3
Blum, A.4
-
25
-
-
34248995311
-
Modeling and simulation study of the propagation and defense of internet e-mail worm
-
Apr.-June
-
C. C. Zou, D. Towsley, and W. Gong, "Modeling and Simulation Study of the Propagation and Defense of Internet E-Mail Worm, " IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 105-118, Apr.-June 2007.
-
(2007)
IEEE Trans. Dependable and Secure Computing
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
27
-
-
24344483199
-
Peer-to-peer system-based active worm attacks: Modeling and analysis
-
May
-
W. Yu, S. Chellappan, C. Boyer, and D. Xuan, "Peer-to-Peer System-Based Active Worm Attacks: Modeling and Analysis, " Proc. IEEE Int'l Conf. Comm. (ICC), May 2005.
-
(2005)
Proc. IEEE Int'l Conf. Comm. (ICC)
-
-
Yu, W.1
Chellappan, S.2
Boyer, C.3
Xuan, D.4
-
29
-
-
14944380936
-
The top speed of flash worms
-
Oct
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver, "The Top Speed of Flash Worms, " Proc. Second ACM Conf. Computer and Comm. Security (CCS) Workshop Rapid Malcode (WORM), Oct. 2004.
-
(2004)
Proc. Second ACM Conf. Computer and Comm. Security (CCS) Workshop Rapid Malcode (WORM)
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
31
-
-
77952395098
-
On the trade-off between speed and resiliency of flash worms and similar malcodes
-
Oct
-
D. Ha and H. Ngo, "On the Trade-Off between Speed and Resiliency of Flash Worms and Similar Malcodes, " Proc. Fifth ACM Workshop Recurring Malcode (WORM), Oct. 2007.
-
(2007)
Proc. Fifth ACM Workshop Recurring Malcode (WORM)
-
-
Ha, D.1
Ngo, H.2
-
32
-
-
57349091683
-
Improving sensor network immunity under worm attacks: A software diversity approach
-
May
-
Y. Yang, S. Zhu, and G. Cao, "Improving Sensor Network Immunity under Worm Attacks: A Software Diversity Approach, " Proc. ACM MobiHoc, May 2008.
-
(2008)
Proc. ACM MobiHoc
-
-
Yang, Y.1
Zhu, S.2
Cao, G.3
-
34
-
-
51349114948
-
Polymorphic blending attacks
-
Aug
-
R. Perdisci, O. Kolesnikov, P. Fogla, M. Sharif, and W. Lee, "Polymorphic Blending Attacks, " Proc. 15th USENIX Security Symp. (SECURITY), Aug. 2006.
-
(2006)
Proc. 15th USENIX Security Symp. (SECURITY)
-
-
Perdisci, R.1
Kolesnikov, O.2
Fogla, P.3
Sharif, M.4
Lee, W.5
-
37
-
-
12244279567
-
Learning to detect malicious executables in the wild
-
Aug
-
J. Z. Kolter and M. A. Maloof, "Learning to Detect Malicious Executables in the Wild, " Proc. 10th ACM SIGKDD, Aug. 2004.
-
(2004)
Proc. 10th ACM SIGKDD
-
-
Kolter, J.Z.1
Maloof, M.A.2
-
38
-
-
51349109687
-
Detecting worms via mining dynamic program execution
-
Sept
-
X. Wang, W. Yu, A. Champion, X. Fu, and D. Xuan, "Detecting Worms via Mining Dynamic Program Execution, " Proc. IEEE Int'l Conf. Security and Privacy in Comm. Networks (SECURECOMM), Sept. 2007.
-
(2007)
Proc. IEEE Int'l Conf. Security and Privacy in Comm. Networks (SECURECOMM)
-
-
Wang, X.1
Yu, W.2
Champion, A.3
Fu, X.4
Xuan, D.5
-
39
-
-
50049110702
-
Effective detection of active worms with varying scan rate
-
Aug
-
W. Yu, X. Wang, D. Xuan, and D. Lee, "Effective Detection of Active Worms with Varying Scan Rate, " Proc. IEEE Int'l Conf. Security and Privacy in Comm. Networks (SECURECOMM), Aug. 2006.
-
(2006)
Proc. IEEE Int'l Conf. Security and Privacy in Comm. Networks (SECURECOMM)
-
-
Yu, W.1
Wang, X.2
Xuan, D.3
Lee, D.4
-
42
-
-
85081770459
-
The internet motion sensor: A distributed blackhole monitoring system
-
Feb
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson, "The Internet Motion Sensor: A Distributed Blackhole Monitoring System, " Proc. 12th IEEE Network and Distributed Systems Security Symp. (NDSS), Feb. 2005.
-
(2005)
Proc. 12th IEEE Network and Distributed Systems Security Symp. (NDSS)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
44
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast Portscan Detection Using Sequential Hypothesis Testing, " Proc. 25th IEEE Symp. Security and Privacy (S&P), May 2004.
-
(2004)
Proc. 25th IEEE Symp. Security and Privacy (S&P)
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
46
-
-
33847742744
-
WormShield: Fast worm signature generation with distributed fingerprint aggregation
-
DOI 10.1109/TDSC.2007.1000
-
M. Cai, K. Hwang, J. Pan, and C. Papadopoulos, "Wormshield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation, " IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 88-104, Apr.-June 2007. (Pubitemid 46788336)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.2
, pp. 88-104
-
-
Cai, M.1
Hwang, K.2
Pan, J.3
Papadopoulos, C.4
-
47
-
-
34249008462
-
Fast worm containment using feedback control
-
DOI 10.1109/TDSC.2007.1002
-
R. Dantu, J. W. Cangussu, and S. Patwardhan, "Fast Worm Containment Using Feedback Control, " IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 119-136, Apr.-June 2007. (Pubitemid 46788337)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.2
, pp. 119-136
-
-
Dantu, R.1
Cangussu, J.W.2
Patwardhan, S.3
-
49
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Apr
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon, "Peer-to-Peer Botnets: Overview and Case Study, " Proc. USENIX Workshop Hot Topics in Understanding Botnets (HotBots), Apr. 2007.
-
(2007)
Proc. USENIX Workshop Hot Topics in Understanding Botnets (HotBots)
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
53
-
-
79952963637
-
-
MetaPHOR, http://securityresponse.symantec.com/avcenter/venc/data/w32. simile.html, 2010.
-
(2010)
-
-
-
54
-
-
77956173789
-
Zmist opportunities
-
P. Ferrie and P. S. Zmist, "Zmist Opportunities, " Virus Bull., http://www.virusbtn.com, 2010.
-
(2010)
Virus Bull.
-
-
Ferrie, P.1
Zmist, P.S.2
-
56
-
-
85156147536
-
Impeding malware analysis using conditional code obfuscation
-
Feb
-
M. Sharif, J. Giffin, W. Lee, and A. Lanzi, "Impeding Malware Analysis Using Conditional Code Obfuscation, " Proc. 15th IEEE Network and Distributed System Security Symp. (NDSS), Feb. 2008.
-
(2008)
Proc. 15th IEEE Network and Distributed System Security Symp. (NDSS)
-
-
Sharif, M.1
Giffin, J.2
Lee, W.3
Lanzi, A.4
-
59
-
-
51349164941
-
ILOC: An invisible localization attack to internet threat monitoring systems
-
Apr
-
X. Wang, W. Yu, X. Fu, D. Xuan, and W. Zhao, "iloc: An Invisible Localization Attack to Internet Threat Monitoring Systems, " Proc. 27th IEEE INFOCOM, Apr. 2008.
-
(2008)
Proc. 27th IEEE INFOCOM
-
-
Wang, X.1
Yu, W.2
Fu, X.3
Xuan, D.4
Zhao, W.5
-
62
-
-
79952973677
-
A schema-based model for phonemic restoration
-
Dept. of Computer Science and Eng., The State Univ., Jan
-
S. Soundararajan and D. L. Wang, "A Schema-Based Model for Phonemic Restoration, " Technical Report OSU-CISRC-1/04-TR03, Dept. of Computer Science and Eng., The State Univ., Jan. 2004.
-
(2004)
Technical Report OSU-CISRC-1/04-TR03
-
-
Soundararajan, S.1
Wang, D.L.2
-
64
-
-
11144286121
-
The spectral autocorrelation peak valley ratio (SAPVR) - A usable speech measure employed as a co-channel detection system
-
May
-
R. E. Yantorno, K. R. Krishnamachari, J. M. Lovekin, D. S. Benincasa, and S. J. Wenndt, "The Spectral AutoCorrelation Peak Valley Ratio (SAPVR)-A Usable Speech Measure Employed as a Co-Channel Detection System, " Proc. IEEE Int'l Workshop Intelligent Signal Processing (WISP), May 2001.
-
(2001)
Proc. IEEE Int'l Workshop Intelligent Signal Processing (WISP)
-
-
Yantorno, R.E.1
Krishnamachari, K.R.2
Lovekin, J.M.3
Benincasa, D.S.4
Wenndt, S.J.5
|