-
1
-
-
14944358991
-
Preliminary results using scaledown to explore worm dynamics
-
Oct
-
N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson, "Preliminary results using scaledown to explore worm dynamics," in Proc. ACM CCS WORM, Oct 2004.
-
(2004)
Proc. ACM CCS WORM
-
-
Weaver, N.1
Hamadeh, I.2
Kesidis, G.3
Paxson, V.4
-
3
-
-
0042474173
-
Internet quarantine: Requirements for containing selfpropagating code
-
Apr
-
David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage, "Internet quarantine: Requirements for containing selfpropagating code," in Proc. INFOCOM, Apr 2003.
-
(2003)
Proc. INFOCOM
-
-
Moore, David1
Shannon, Colleen2
Voelker, Geoffrey M.3
Savage, Stefan4
-
4
-
-
79953672829
-
Dynamic taint analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
Feb
-
James Newsome and Dawn Song, "Dynamic taint analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software," in Proc. NDSS, Feb 2005.
-
(2005)
Proc. NDSS
-
-
Newsome, James1
Song, Dawn2
-
5
-
-
33646042112
-
Can we contain Internet worms?
-
Nov
-
Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Colleen Shannon, and Jeffery Brown, "Can we contain Internet worms?," in Proc. HOTNETS, Nov 2004.
-
(2004)
Proc. HOTNETS
-
-
Costa, Manuel1
Crowcroft, Jon2
Castro, Miguel3
Rowstron, Antony4
Shannon, Colleen5
Brown, Jeffery6
-
7
-
-
4544303625
-
Dynamic Quarantine of Internet Worms
-
Jun
-
Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, and Gregory R. Ganger, "Dynamic Quarantine of Internet Worms," in Proc. DSN, Jun 2004.
-
(2004)
Proc. DSN
-
-
Wong, Cynthia1
Wang, Chenxi2
Song, Dawn3
Bielski, Stan4
Ganger, Gregory R.5
-
10
-
-
84892612179
-
An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques
-
Feb
-
J. Wu, S. Vangala, L. Gao, and K. Kwiat, "An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques," in Proc. NDSS, Feb 2004.
-
(2004)
Proc. NDSS
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
-
11
-
-
14844288427
-
Worms vs Perimeters: The Case for HardLANs
-
Aug
-
Nicholas Weaver, Dan Ellis, Stuart Staniford, and Vern Paxson, "Worms vs Perimeters: The Case for HardLANs," in Proc. Hot Interconnects, Aug 2004.
-
(2004)
Proc. Hot Interconnects
-
-
Weaver, Nicholas1
Ellis, Dan2
Staniford, Stuart3
Paxson, Vern4
-
13
-
-
84942234675
-
Cooperative Response Strategies for Large Scale Attack Mitigation
-
Apr
-
D. Nojiri, J. Rowe, and K. Levitt, "Cooperative Response Strategies for Large Scale Attack Mitigation," in Proc. DISCEX, Apr 2003.
-
(2003)
Proc. DISCEX
-
-
Nojiri, D.1
Rowe, J.2
Levitt, K.3
-
14
-
-
84890863223
-
A Cooperative Immunization System for an Untrusting Internet
-
Oct
-
K. G. Anagnostakis, M. B. Greenwald, S. Ioannidis, A. D. Keromytis, and D. Li, "A Cooperative Immunization System for an Untrusting Internet," in Proc. ICON, Oct 2003.
-
(2003)
Proc. ICON
-
-
Anagnostakis, K. G.1
Greenwald, M. B.2
Ioannidis, S.3
Keromytis, A. D.4
Li, D.5
-
16
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
May
-
Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in Proc. IEEE Security and Privacy, May 2004.
-
(2004)
Proc. IEEE Security and Privacy
-
-
Jung, Jaeyeon1
Paxson, Vern2
Berger, Arthur W.3
Balakrishnan, Hari4
-
17
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
Aug
-
H. A. Kim and B. Karp, "Autograph: Toward automated, distributed worm signature detection," in Proc. Usenix Security, Aug 2004.
-
(2004)
Proc. Usenix Security
-
-
Kim, H. A.1
Karp, B.2
-
19
-
-
85093077246
-
Hierarchically Controlled Co-operative Response Strategies for Internet Scale Attacks
-
June
-
C. G. Senthilkumar and K. Levitt, "Hierarchically Controlled Co-operative Response Strategies for Internet Scale Attacks," in Proc. DSN, June 2003.
-
(2003)
Proc. DSN
-
-
Senthilkumar, C. G.1
Levitt, K.2
-
21
-
-
85093104933
-
-
Tech. Rep. CSD-04-1359, UC Berkeley, Nov
-
Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Scott Shenker, and Randy Katz, "Cooperative containment of fast scanning worms," Tech. Rep. CSD-04-1359, UC Berkeley, Nov 2004.
-
(2004)
Cooperative containment of fast scanning worms
-
-
Kannan, Jayanthkumar1
Subramanian, Lakshminarayanan2
Stoica, Ion3
Shenker, Scott4
Katz, Randy5
-
22
-
-
14844308379
-
Containment of scanning worms in enterprise networks
-
(to appear)
-
S. Staniford, "Containment of scanning worms in enterprise networks," Journal of Computer Security, 2005 (to appear).
-
(2005)
Journal of Computer Security
-
-
Staniford, S.1
|