-
1
-
-
84886665570
-
-
National Security Agancy, June
-
Albanese, D., Wiacek, M., Salter, C. and Six, J. (2004) The Case for Using Layered Defenses to Stop Worms, National Security Agancy, June.
-
(2004)
The Case for Using Layered Defenses to Stop Worms
-
-
Albanese, D.1
Wiacek, M.2
Salter, C.3
Six, J.4
-
3
-
-
0034501876
-
Windows of vulnerability: A case study analysis
-
Arbaugh, W.A., Fithen, W.L. and McHugh, J. (2000) 'Windows of vulnerability: a case study analysis', IEEE Computer, Vol. 33, No. 12, pp.52-59.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 52-59
-
-
Arbaugh, W.A.1
Fithen, W.L.2
McHugh, J.3
-
4
-
-
0023294949
-
Computer viruses - Theory and experiments
-
Cohen, F. (1987) 'Computer viruses - theory and experiments', Computers and Security, Vol. 6, pp.22-35.
-
(1987)
Computers and Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
6
-
-
4544245846
-
Self-securing network interfaces: What, why, and how
-
CMU-CS-02-144, August
-
Ganger, G., Economou, G. and Bielski, S. (2002) 'Self-securing network interfaces: what, why, and how', Carnegie Mellon University Technical Report, CMU-CS-02-144, August.
-
(2002)
Carnegie Mellon University Technical Report
-
-
Ganger, G.1
Economou, G.2
Bielski, S.3
-
9
-
-
84880028758
-
A mixed abstraction level simulation model of large-scale internet worm infestations
-
October
-
Liljenstam, M., Yuan, Y., Premore, B. and Nicol, D. (2002) 'A mixed abstraction level simulation model of large-scale internet worm infestations', Proceedings of 10th IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), October.
-
(2002)
Proceedings of 10th IEEE/ACM Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)
-
-
Liljenstam, M.1
Yuan, Y.2
Premore, B.3
Nicol, D.4
-
10
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
April
-
Moore, D., Shannon, C., Voelker, G. and Savage, S. (2003) 'Internet quarantine: requirements for containing self-propagating code', Proceedings of 22nd Annual Joint Conference of IEEE Computer and Communication Societies (INFOCOM 2003), April.
-
(2003)
Proceedings of 22nd Annual Joint Conference of IEEE Computer and Communication Societies (INFOCOM 2003)
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
11
-
-
84886685452
-
The evolving virus threat
-
Baltimore, Maryland
-
Nachenberg, C. (2000) 'The evolving virus threat', Proceedings of 23rd NISSC, Baltimore, Maryland.
-
(2000)
Proceedings of 23rd NISSC
-
-
Nachenberg, C.1
-
12
-
-
33947541360
-
Future of internet worms
-
July
-
Nazario, J., Anderson, J., Walsh, R. and Connelly, C. (2001) 'Future of internet worms', Crimelabs Research, July.
-
(2001)
Crimelabs Research
-
-
Nazario, J.1
Anderson, J.2
Walsh, R.3
Connelly, C.4
-
15
-
-
14944384392
-
Containment of scanning worms in enterprise networks
-
to appear
-
Staniford, S. (2003) 'Containment of scanning worms in enterprise networks', Journal of Computer Security, to appear.
-
(2003)
Journal of Computer Security
-
-
Staniford, S.1
-
16
-
-
85084162258
-
How to own the internet in your spare time
-
San Francisco, August
-
Staniford, S., Paxson, V. and Weaver, N. (2002) 'How to own the internet in your spare time', Proceedings of 11th USENIX Security Symposium, San Francisco, August.
-
(2002)
Proceedings of 11th USENIX Security Symposium
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
17
-
-
84949487368
-
On computer viral infection and the effect of immunization
-
Wang, C., Knight, J.C. and Elder, M.C. (2000) 'On computer viral infection and the effect of immunization', Proceedings of the 16th Annual Computer Security Applications Conference, pp.246-256.
-
(2000)
Proceedings of the 16th Annual Computer Security Applications Conference
, pp. 246-256
-
-
Wang, C.1
Knight, J.C.2
Elder, M.C.3
-
19
-
-
4544303625
-
Dynamic quarantine of internet worms
-
Florence, Italy, June
-
Wong, C., Wang, C., Song, D., Bielski, S. and Granger, G.R. (2004) 'Dynamic quarantine of internet worms', Proceedings of the International Conference on Dependable Systems and Networks (DSN-2004), Florence, Italy, June.
-
(2004)
Proceedings of the International Conference on Dependable Systems and Networks (DSN-2004)
-
-
Wong, C.1
Wang, C.2
Song, D.3
Bielski, S.4
Granger, G.R.5
-
20
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
November
-
Zou, C.C., Gong, W. and Towsley, D. (2002) 'Code red worm propagation modeling and analysis', Proceedings of the Ninth ACM Conference on Computer and Communications Security(CCS), November, pp.138-147.
-
(2002)
Proceedings of the Ninth ACM Conference on Computer and Communications Security(CCS)
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
|