-
1
-
-
80053546649
-
-
Symantec Global Internet Security Threat Report. (12 August 2011, date online accessed)
-
(2010) Symantec Global Internet Security Threat Report. http://eval.symantec.com/mktginfo/enterprise/white-papers/bwhitepaper-internet- security-threat-report-xv-04-2010. enus.pdf. (12 August 2011, date online accessed).
-
(2010)
-
-
-
2
-
-
79951860494
-
-
Wipro Report,Wipro Technologies, Bangalore, India
-
Forbath, T., Kalaher, P. and O'Grady, T. (2005) The Total Cost of Security Patch Management.Wipro Report,Wipro Technologies, Bangalore, India.
-
(2005)
The Total Cost of Security Patch Management
-
-
Forbath, T.1
Kalaher, P.2
O'Grady, T.3
-
3
-
-
54249132169
-
Fresh phish
-
Schneider, D. (2008) Fresh phish. IEEE Spectr., 45, 34-38.
-
(2008)
IEEE Spectr.
, vol.45
, pp. 34-38
-
-
Schneider, D.1
-
7
-
-
85084162258
-
How to own the internet in your spare time
-
San Francisco, CA, USA, August 5-9. USENIX Association, Berkeley
-
Staniford, S., Paxson, V. and Weaver, N. (2002) How to Own the Internet in Your Spare Time. Proc. 11th USENIX Security Symp. (Security '02), San Francisco, CA, USA, August 5-9, pp. 149-167. USENIX Association, Berkeley.
-
(2002)
Proc. 11th USENIX Security Symp. (Security '02)
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
9
-
-
17444402134
-
Measurement and analysis of worm propagation on internet network topology
-
Chicago, IL, USA, October 11-13, IEEE, Piscataway
-
Kim, J., Radhakrishnan, S. and Dhall, S. (2004) Measurement and Analysis of Worm Propagation on Internet Network Topology. Proc. 13th Int. Conf. Computer Communications and Networks (ICCCN'04), Chicago, IL, USA, October 11-13, pp. 495-500. IEEE, Piscataway.
-
(2004)
Proc. 13th Int. Conf. Computer Communications and Networks (ICCCN'04)
, pp. 495-500
-
-
Kim, J.1
Radhakrishnan, S.2
Dhall, S.3
-
10
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
Washington, DC, USA, November 17-21 ACM Press, USA
-
Zou, C., Gong, W. and Towsley, D. (2002) Code Red Worm Propagation Modeling and Analysis. Proc. 9th ACM Conf. Computer and Communications Security (CCS'02),Washington, DC, USA, November 17-21, pp. 138-147. ACM Press, USA.
-
(2002)
Proc. 9th ACM Conf. Computer and Communications Security (CCS'02)
, pp. 138-147
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
11
-
-
34248995311
-
Modeling and simulation study of the propagation and defense of internet email worms
-
Zou, C., Towsley, D. and Gong, W. (2007) Modeling and simulation study of the propagation and defense of internet email worms. IEEE Trans. Dependable Secure Comput., 4, 105-118.
-
(2007)
IEEE Trans. Dependable Secure Comput.
, vol.4
, pp. 105-118
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
-
12
-
-
84949487368
-
On computer viral infection and the effect of immunization
-
New Orleans, LA, December 11-15, IEEE Computer Society, USA
-
Wang, C., Knight, C. and Elder, C. (2000) On Computer Viral Infection and the Effect of Immunization. 16th Annual Computer Security Applications Conf. (ACSAC'00), New Orleans, LA, December 11-15, pp. 246-256. IEEE Computer Society, USA.
-
(2000)
16th Annual Computer Security Applications Conf. (ACSAC'00)
, pp. 246-256
-
-
Wang, C.1
Knight, C.2
Elder, C.3
-
13
-
-
77955517954
-
Modeling the propagation of peer-to-peer worms
-
Fan, X. and Xiang, Y. (2010) Modeling the propagation of peer-to-peer worms. Future Gener. Comput. Syst. J., 26, 1433-1443.
-
(2010)
Future Gener. Comput. Syst. J.
, vol.26
, pp. 1433-1443
-
-
Fan, X.1
Xiang, Y.2
-
14
-
-
0141762461
-
Code-Red:A case study on the spread and victims of an internetworm
-
Marseille, France, November 6-8. ACM Press, USA
-
Moore, D., Shannon, C. and Brown, J. (2002) Code-Red:A Case Study on the Spread and Victims of an InternetWorm. Proc. 2nd ACMSIGCOMMWorkshop on Internet Measurement, Marseille, France, November 6-8, pp. 273-284. ACM Press, USA.
-
(2002)
Proc. 2nd ACMSIGCOMMWorkshop on Internet Measurement
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
16
-
-
0042035473
-
-
CAIDA. (12 August 2011, date online accessed)
-
CAIDA. CAIDA analysis of code-red. http://www.caida.org/analysis/ security/code-red/. (12 August 2011, date online accessed).
-
CAIDA Analysis of Code-Red
-
-
-
17
-
-
33646150900
-
On the performance of internet worm scanning strategies
-
Zou, C., Towsley, D. and Gong,W. (2006) On the performance of internet worm scanning strategies. Perform. Eval., 63, 700-723.
-
(2006)
Perform. Eval.
, vol.63
, pp. 700-723
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
-
18
-
-
33748372756
-
Stochastic behavior of random constant scanning worms
-
San Diego, CA, USA, October 17-19. IEEE, USA
-
Rohloff, K. and Basar, T. (2005) Stochastic Behavior of Random Constant Scanning Worms. Proc. 14th Int. Conf. Computer Communications and Networks (ICCCN'05), San Diego, CA, USA, October 17-19, pp. 339-344. IEEE, USA.
-
(2005)
Proc. 14th Int. Conf. Computer Communications and Networks (ICCCN'05)
, pp. 339-344
-
-
Rohloff, K.1
Basar, T.2
-
19
-
-
27544467181
-
Modeling and automated containment of worms
-
Yokohama, Japan, June 28-July 1, IEEE Computer Society, USA
-
Sellke, S., Shroff, B. and Bagchi, S. (2005) Modeling and Automated Containment ofWorms. Proc. Int. Conf. Dependable Systems and Networks, Yokohama, Japan, June 28-July 1, pp. 528-537. IEEE Computer Society, USA.
-
(2005)
Proc. Int. Conf. Dependable Systems and Networks
, pp. 528-537
-
-
Sellke, S.1
Shroff, B.2
Bagchi, S.3
-
20
-
-
0042474227
-
Modeling the spread of active worms
-
San Franciso, CA, USA, March 30-April 3, IEEE, USA
-
Chen, Z., Gao, L. and Kwiat, K. (2003) Modeling the Spread of Active Worms. The 22th Annual Joint Conf. IEEE Computer and Communications (INFOCOM'03), San Franciso, CA, USA, March 30-April 3, pp. 1890-1900. IEEE, USA.
-
(2003)
The 22th Annual Joint Conf. IEEE Computer and Communications (INFOCOM'03)
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
21
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
Horng, J., Su, Y., Chen, H., Kao, W., Chen, J., Lai, L. and Perkasa, D. (2011) A novel intrusion detection system based on hierarchical clustering and support vector machines. Expert Syst. Appl., 38, 306-313.
-
(2011)
Expert Syst. Appl.
, vol.38
, pp. 306-313
-
-
Horng, J.1
Su, Y.2
Chen, H.3
Kao, W.4
Chen, J.5
Lai, L.6
Perkasa, D.7
-
22
-
-
24344436426
-
The blaster worm: Then and now
-
Bailey, M., Cooke, E., Jahanian, F., Watson, D. and Nazario, J. (2005) The blaster worm: then and now. IEEE Secur. Priv., 3, 26-31.
-
(2005)
IEEE Secur. Priv.
, vol.3
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Watson, D.4
Nazario, J.5
-
23
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
Washington, DC, USA, October 27, ACM, USA
-
Zou, C., Gong, W. and Towsley, D. (2003) Worm Propagation Modeling and Analysis Under Dynamic Quarantine Defense. Proc. ACMWorkshop on Rapid Malcode (WORM'03),Washington, DC, USA, October 27, pp. 51-60. ACM, USA.
-
(2003)
Proc. ACMWorkshop on Rapid Malcode (WORM'03)
, pp. 51-60
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
24
-
-
28044469549
-
The monitoring and early detection of Internet worms
-
Zou, C., Gong, W., Towsley, D. and Gao, L. (2005) The monitoring and early detection of Internet worms. IEEE/ACM Trans. Netw. (TON), 13, 961-974.
-
(2005)
IEEE/ACM Trans. Netw. (TON)
, vol.13
, pp. 961-974
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
Gao, L.4
-
25
-
-
0742276097
-
Inside the slammer worm
-
Moore, D., Paxson,V., Savage, S., Shannon, C., Staniford, S. and Weaver N. (2003) Inside the SlammerWorm. IEEE Secur. Priv., 1, 33-39.
-
(2003)
IEEE Secur. Priv.
, vol.1
, pp. 33-39
-
-
Moore D., PaxsonV.1
Savage, S.2
Shannon, C.3
Staniford, S.4
Weaver, N.5
-
26
-
-
84892612179
-
An efficient architecture and algorithm for detecting worms with various scan techniques
-
San Diego, CA, USA, February 5-6. The Internet Society, USA
-
Wu, J., Vangala, S., Gao, L. and Kwiat, K. (2004) An Efficient Architecture and Algorithm for Detecting Worms with Various Scan Techniques. Proc. 11th Annual Network and Distributed System Security Symposium (NDSS'04), San Diego, CA, USA, February 5-6, pp. 143-156. The Internet Society, USA.
-
(2004)
Proc. 11th Annual Network and Distributed System Security Symposium (NDSS'04)
, pp. 143-156
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
-
27
-
-
80053479504
-
-
Symantec Internet Security Threat Report. (12 August 2011, date online accessed)
-
(2010) Symantec Internet Security Threat Report. http://eval.symantec. com/mktginfo/enterprise/white-papers/b-whitepaper-lam-internet-security-threat- report-xv-04-2010.en-us.pdf. (12 August 2011, date online accessed).
-
(2010)
-
-
-
28
-
-
0242314805
-
-
CAIDA. (12 August 2011, date online accessed)
-
CAIDA. The Spread of the Sapphire/SlammerWorm. http://www. caida.org/publications/papers/2003/sapphire/sapphire.html. (12 August 2011, date online accessed).
-
The Spread of the Sapphire/Slammer Worm
-
-
|