-
2
-
-
67650803219
-
An analysis of conficker's logic and rendezvous protocol
-
SRI International
-
P. Porras, H. Saidi, V. Yegneswaran, "An analysis of conficker's logic and rendezvous protocol", Technical report, SRI International (2009), http://mtc.sri.com/Conficker/.
-
(2009)
Technical Report
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
3
-
-
79955737221
-
The largest cloud in the world is owned by a criminal
-
Apr.
-
A. Williams, "The Largest Cloud in the World is Owned By A Criminal", Apr. 2010, http://www.readwriteweb.com/cloud/2010/04/ the-largest-cloud-in-the-world.php.
-
(2010)
-
-
Williams, A.1
-
4
-
-
79955721329
-
Symantec global internet security threat report trends for 2009
-
Apr.
-
Symantec, "Symantec Global Internet Security Threat Report Trends for 2009", Volume XV, Apr. 2010, http://www.symantec.com/business/ theme.jsp?themeid=threatreport.
-
(2010)
, vol.15
-
-
-
5
-
-
68649086619
-
Guidance for critical areas of focus in cloud computing.v2.1
-
Dec.
-
CSA, "Guidance for Critical Areas of Focus in Cloud Computing.v2.1", Dec. 2009, http://www.cloudsecurityalliance.org/guidance/ csaguide.v2.1.pdf.
-
(2009)
-
-
-
6
-
-
65949094156
-
Cloud security technologies
-
Feb.
-
I. Muttik, C. Barton, "Cloud security technologies", Information Security Technical Report, Volume 14(1), pp. 1-6, Feb. 2009.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.1
, pp. 1-6
-
-
Muttik, I.1
Barton, C.2
-
8
-
-
8644229619
-
The art of port scanning
-
Sep.
-
Fyodor, "The Art of port scanning", Phrack Magazine, vol. 7(51), pp:11-17, Sep. 1997.
-
(1997)
Phrack Magazine
, vol.7
, Issue.51
, pp. 11-17
-
-
Fyodor1
-
9
-
-
19944374456
-
A survey and trends on Internet worms
-
Jun.
-
S. Qing, W. Wen, "A survey and trends on Internet worms", Computers & Security Vol. 24(4), pp. 334-346, Jun. 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 334-346
-
-
Qing, S.1
Wen, W.2
-
10
-
-
85030321143
-
MapReduce: Simplified data processing on large clusters
-
Dec.
-
J. Dean, S. Ghemawat, "MapReduce: Simplified data processing on large clusters", Proc. of the 6th OSDI, Dec. 2004, pp. 137-150.
-
(2004)
Proc. of the 6th OSDI
, pp. 137-150
-
-
Dean, J.1
Ghemawat, S.2
-
11
-
-
21644437974
-
The Google file system
-
Dec.
-
S. Ghemawat, H. Gobioff, S.T. Leung, "The Google file system", Proc. of the 19th ACM SOSP, pp. 29-43, Dec.2003.
-
(2003)
Proc. of the 19th ACM SOSP
, pp. 29-43
-
-
Ghemawat, S.1
Gobioff, H.2
Leung, S.T.3
-
12
-
-
8644280743
-
Simulating and optimising worm propagation algorithms
-
Sep.
-
T. Vogt, "Simulating and optimising worm propagation algorithms", Sep. 2003 (Updated on Feb. 2004), http://web.lemuria.org/security/WormPropagation.pdf
-
-
-
Vogt, T.1
-
14
-
-
73449125776
-
Propagation of active worms: a survey
-
Y. Xiang, X. Fan, W. Zhu, "Propagation of active worms: a survey", International Journal of Computer Systems Science & Engineering, vol. 24 (2009), pp. 157-172.
-
(2009)
International Journal of Computer Systems Science & Engineering
, vol.24
, pp. 157-172
-
-
Xiang, Y.1
Fan, X.2
Zhu, W.3
-
15
-
-
0141762461
-
Code-red: a case study on the spread and victims of an internet worm
-
D. Moore, C. Shannon, J. Brown, "Code-red: a case study on the spread and victims of an internet worm", Proc. of IMW'02, pp. 273-284, 2002.
-
(2002)
Proc. of IMW'02
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
17
-
-
0033979874
-
Comparison of deterministic and stochastic SIS and SIR models in discrete time
-
L.J. Allen, A.M. Burgin, "Comparison of deterministic and stochastic SIS and SIR models in discrete time," Mathematical Biosciences, vol.163, pp. 1-33, 2000.
-
(2000)
Mathematical Biosciences
, vol.163
, pp. 1-33
-
-
Allen, L.J.1
Burgin, A.M.2
-
18
-
-
33646150900
-
On the performance of Internet worm scanning strategies
-
Jul.
-
C.C. Zou, D. Towsley, W. Gong, "On the performance of Internet worm scanning strategies", Elsevier Journal of Performance Evaluation, vol. 63, no. 7, pp. 700-723, Jul. 2006.
-
(2006)
Elsevier Journal of Performance Evaluation
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
19
-
-
84892612179
-
An effective architecture and algorithm for detecting worms with various scan techniques
-
J. Wu, S. Vangala, L. Gao, K. Kwiat, "An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques", Proc. of NDSS, 2004.
-
(2004)
Proc. of NDSS
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
-
21
-
-
79955724717
-
Confickers virtual machine detection
-
Confickers virtual machine detection: http://www.sophos.com/blogs/sophoslabs/?p=3744.
-
-
-
-
22
-
-
34249007032
-
Worm propagation strategies in an IPv6 Internet
-
Feb.
-
S. M. Bellovin, B. Cheswick, A. Keromytis, "Worm propagation strategies in an IPv6 Internet", vol. 31(1), pp. 70-76, Feb. 2006.
-
(2006)
, vol.31
, Issue.1
, pp. 70-76
-
-
Bellovin, S.M.1
Cheswick, B.2
Keromytis, A.3
|