-
1
-
-
0003545819
-
The Internet worm program: An analysis
-
Eugene SH (1988) The Internet worm program: an analysis. Technical report, CSD-TR-823, pp 1-29
-
(1988)
Technical Report, CSD-TR-823
, pp. 1-29
-
-
Eugene, S.H.1
-
5
-
-
77954950954
-
Symantec global Internet security threat report trends for 2009
-
Symantec
-
Symantec (2010) Symantec global Internet security threat report trends for 2009. Technical report, XV
-
(2010)
Technical Report, XV
-
-
-
8
-
-
19944374456
-
A survey and trends on Internet worms
-
doi:10.1016/j.cose.2004.10.001
-
Qing S, Wen W (2005) A survey and trends on Internet worms. Comput Secur 24:334-346. doi:10.1016/j.cose.2004.10.001
-
(2005)
Comput Secur
, vol.24
, pp. 334-346
-
-
Qing, S.1
Wen, W.2
-
9
-
-
0023294949
-
Computer viruses: Theory and experiments
-
doi:10.1016/0167-4048(87)90122-2
-
Cohen F (1987) Computer viruses: theory and experiments. Comput Secur 6(1):22-35. doi:10.1016/0167-4048(87)90122-2
-
(1987)
Comput Secur
, vol.6
, Issue.1
, pp. 22-35
-
-
Cohen, F.1
-
18
-
-
26844518826
-
Epidemiological models applied to viruses in computer networks
-
Piqueira JRC, Navarro BF, Monteiro LHA (2005) Epidemiological models applied to viruses in computer networks. J Comput Sci 1(1):31-34
-
(2005)
J Comput Sci
, vol.1
, Issue.1
, pp. 31-34
-
-
Piqueira, J.R.C.1
Navarro, B.F.2
Monteiro, L.H.A.3
-
19
-
-
34547208045
-
The impact of stochastic variance on worm propagation and detection
-
doi:10.1145/1179542.1179555
-
Nicol DM (2006) The impact of stochastic variance on worm propagation and detection. In: Proceedings of the 4th ACM workshop on recurring malcode, pp 57-64. doi:10.1145/1179542.1179555
-
(2006)
Proceedings of the 4th ACM Workshop on Recurring Malcode
, pp. 57-64
-
-
Nicol, D.M.1
-
20
-
-
33646150900
-
On the performance of Internet worm scanning strategies
-
doi:10.1016/j.peva.2005.07.032
-
Zou CC, Towsley D, Gong W (2006) On the performance of Internet worm scanning strategies. J Perform Eval 63(7):700-723. doi:10.1016/j.peva.2005.07. 032
-
(2006)
J Perform Eval
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
21
-
-
51249101344
-
Modeling and analysis of worm interactions (war of the worms)
-
Tanachaiwiwat S, Helmy A (2007) Modeling and analysis of worm interactions (war of the worms). In: Proceedings of BROADNETS'07, pp 649-658
-
(2007)
Proceedings of BROADNETS'07
, pp. 649-658
-
-
Tanachaiwiwat, S.1
Helmy, A.2
-
22
-
-
34249894205
-
Functional similarities between computer worms and biological pathogens
-
doi:10.1016/j.cose.2006.12.002
-
Li J, Knickerbocker P (2007) Functional similarities between computer worms and biological pathogens. Comput Secur 26(4):338-347. doi:10.1016/j.cose. 2006.12.002
-
(2007)
Comput Secur
, vol.26
, Issue.4
, pp. 338-347
-
-
Li, J.1
Knickerbocker, P.2
-
23
-
-
55949131751
-
Network virus-epidemic model with the point-to-group information propagation
-
doi:10.1016/j.amc.2008.09.025
-
Yuan H, Chen G (2008) Network virus-epidemic model with the point-to-group information propagation. Appl Comput Math 206(1):357-367. doi:10.1016/j.amc.2008.09.025
-
(2008)
Appl Comput Math
, vol.206
, Issue.1
, pp. 357-367
-
-
Yuan, H.1
Chen, G.2
-
24
-
-
55649121612
-
Dynamic models for computer viruses
-
doi:10.1016/j.cose.2008.07.006
-
Piqueira JRC, Vasconcelos AA, Gabriel CECJ, Araujo VO (2008) Dynamic models for computer viruses. Comput Secur 27(7-8):355-359. doi:10.1016/j.cose. 2008.07.006
-
(2008)
Comput Secur
, vol.27
, Issue.7-8
, pp. 355-359
-
-
Piqueira, J.R.C.1
Vasconcelos, A.A.2
Gabriel, C.E.C.J.3
Araujo, V.O.4
-
25
-
-
77956567216
-
Modeling and analysis of Internet worm propagation
-
doi:10.1016/S1005-8885(09)60489-1
-
Su F, Lin Z, Ma Y (2010) Modeling and analysis of Internet worm propagation. J China Univ Post Telecommun 17(4):63-68. doi:10.1016/S1005- 8885(09)60489-1
-
(2010)
J China Univ Post Telecommun
, vol.17
, Issue.4
, pp. 63-68
-
-
Su, F.1
Lin, Z.2
Ma, Y.3
-
26
-
-
79957686762
-
On detecting active worms with varying scan rate
-
doi:10.1016/j.comcom.2010.10.014
-
Yu W, Wang X, Champion A, Xuan D, Lee D (2011) On detecting active worms with varying scan rate. Comput Commun 34(11):1269-1282. doi:10.1016/j.comcom. 2010.10.014
-
(2011)
Comput Commun
, vol.34
, Issue.11
, pp. 1269-1282
-
-
Yu, W.1
Wang, X.2
Champion, A.3
Xuan, D.4
Lee, D.5
-
29
-
-
1642434224
-
Using sensor networks and data fusion for early detection of active worms
-
doi:10.1117/12.500849
-
Berk VH, Gray RS, Bakos G (2003) Using sensor networks and data fusion for early detection of active worms. Proc SPIE 2003:92-104. doi:10.1117/12. 500849
-
(2003)
Proc SPIE 2003
, pp. 92-104
-
-
Berk, V.H.1
Gray, R.S.2
Bakos, G.3
-
30
-
-
0742276097
-
Inside the slammer worm
-
doi:10.1109/MSECP.2003.1219056
-
Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N (2003) Inside the slammer worm. IEEE Secur Priv 1(4):33-39. doi:10.1109/MSECP.2003. 1219056
-
(2003)
IEEE Secur Priv
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
32
-
-
0004204717
-
The design of GrIDS: A graph-based intrusion detection system
-
Accessed 15 September 2010
-
Cheung S, Hoagland J, Levitt K, Rowe J, Staniford S et al (1999) The design of GrIDS: a graph-based intrusion detection system. Technical report, CSE-99-2. http://citeseer.nj.nec.com/cheung99design.html. Accessed 15 September 2010
-
(1999)
Technical Report, CSE-99-92
-
-
Cheung, S.1
Hoagland, J.2
Levitt, K.3
Rowe, J.4
Staniford, S.5
-
34
-
-
71649092323
-
The dark oracle: Perspective-aware unused and unreachable address
-
Cooke E, Bailey M, Jahanian F, Mortier R (2006) The dark oracle: perspective-aware unused and unreachable address. In: Proceedings of the 3rd conference on networked systems design & implementation, vol 3, pp 8
-
(2006)
Proceedings of the 3rd Conference on Networked Systems Design & Implementation
, vol.3
, pp. 8
-
-
Cooke, E.1
Bailey, M.2
Jahanian, F.3
Mortier, R.4
-
36
-
-
71649112409
-
Worm virulence estimation for the containment of local worm outbreak
-
doi:10.1016/j.cose.2009.07.002
-
Choi Y, Li L, Liu P, Kesidis G (2010) Worm virulence estimation for the containment of local worm outbreak. Comput Secur 29:104-123. doi:10.1016/j.cose.2009.07.002
-
(2010)
Comput Secur
, vol.29
, pp. 104-123
-
-
Choi, Y.1
Li, L.2
Liu, P.3
Kesidis, G.4
-
38
-
-
14844308379
-
Containment of scanning worm in an enterprise networks
-
Staniford S (2004) Containment of scanning worm in an enterprise networks. Journal of Computer Security
-
(2004)
Journal of Computer Security
-
-
Staniford, S.1
-
41
-
-
33646386296
-
Modeling and analysis on the interaction between the Internet worm and anti-worm
-
Yang F, Duan H, Li X (2004) Modeling and analysis on the interaction between the Internet worm and anti-worm. J Sci China Ser E, Inf Sci 34(8):841-856
-
(2004)
J Sci China ser E, Inf Sci
, vol.34
, Issue.8
, pp. 841-856
-
-
Yang, F.1
Duan, H.2
Li, X.3
-
42
-
-
34047267176
-
Anti-worm based on hybrid confronting technology
-
Wang C, Qing S, He J (2007) Anti-worm based on hybrid confronting technology. J Commun 28(1):28-34
-
(2007)
J Commun
, vol.28
, Issue.1
, pp. 28-34
-
-
Wang, C.1
Qing, S.2
He, J.3
-
43
-
-
34948870917
-
Modeling and analysis of active benign worms and hybrid benign worms containing the spread of worms
-
doi:10.1109/ICN.2007.58
-
Zhou H, Wen Y, Zhao H (2007) Modeling and analysis of active benign worms and hybrid benign worms containing the spread of worms. In: Proceedings of the sixth international conference on networking. doi:10.1109/ICN.2007.58
-
(2007)
Proceedings of the Sixth International Conference on Networking
-
-
Zhou, H.1
Wen, Y.2
Zhao, H.3
-
44
-
-
66549105472
-
Passive benign worm propagation modeling with dynamic quarantine defense
-
Toutonji O, Yoo S-M (2009) Passive benign worm propagation modeling with dynamic quarantine defense. KSII Trans Internet Inf Syst 3(1):96-107
-
(2009)
KSII Trans Internet Inf Syst
, vol.3
, Issue.1
, pp. 96-107
-
-
Toutonji, O.1
Yoo, S.-M.2
-
45
-
-
67650528765
-
Modeling and analysis of divide-and-rule-hybrid-benign worms
-
Zhou H, Zhao H, Wen Y (2009) Modeling and analysis of divide-and-rule-hybrid-benign worms. J Comput Res Dev 46(7):1110-1116
-
(2009)
J Comput Res Dev
, vol.46
, Issue.7
, pp. 1110-1116
-
-
Zhou, H.1
Zhao, H.2
Wen, Y.3
-
48
-
-
84870628970
-
-
Accessed 23 March 2003
-
Kem M (2003) CRClean. http://archives.neohapsis.com/archives/vuln-dev/ 2001-q3/0577.html. Accessed 23 March 2003
-
(2003)
CRClean
-
-
Kem, M.1
-
49
-
-
77956159972
-
-
Accessed 8 May 2003
-
Hexxer H (2003) CodeGreen beta release. http://online.securityfocus.com/ archive/. 82/211462. Accessed 8 May 2003
-
(2003)
CodeGreen Beta Release
-
-
Hexxer, H.1
-
51
-
-
79955741619
-
A novel Cloud-based worm propagation model
-
Zheng X, Li T, Yang H (2011) A novel Cloud-based worm propagation model. J Comput Inf Syst 7(4):1082-1091
-
(2011)
J Comput Inf Syst
, vol.7
, Issue.4
, pp. 1082-1091
-
-
Zheng, X.1
Li, T.2
Yang, H.3
-
52
-
-
84870630276
-
-
Accessed 12 April 2004
-
Messmer E (2004) Themyth of the good worm. http://www.wormblog.com/2004/ 11/the-myth-of-the.html. Accessed 12 April 2004
-
(2004)
Themyth of the Good Worm
-
-
Messmer, E.1
|