-
1
-
-
33846856860
-
Simple models for containment of a pandemic
-
22 June
-
Arino, J., Brauer, F., Driessche, P., Watmough, J. and Wu, J. (2006) 'Simple models for containment of a pandemic', Journal of The Royal Society Interface, 22 June, Vol. 3, No. 8, pp.453-457.
-
(2006)
Journal of the Royal Society Interface
, vol.3
, Issue.8
, pp. 453-457
-
-
Arino, J.1
Brauer, F.2
Driessche, P.3
Watmough, J.4
Wu, J.5
-
2
-
-
0000887798
-
Aligning simulation models: A case study and results
-
Axtell, R., Axelrod, R., Epstein, J.M. and Cohon, M. D. (1996) 'Aligning simulation models: a case study and results', Computational and Mathematical Organization Theory, Vol. 1, pp.123-141.
-
(1996)
Computational and Mathematical Organization Theory
, vol.1
, pp. 123-141
-
-
Axtell, R.1
Axelrod, R.2
Epstein, J.M.3
Cohon, M.D.4
-
3
-
-
84937340971
-
A plague of viruses: Biological, computer and marketing
-
Boase, J. and Wellman, B. (2001) 'A plague of viruses: biological, computer and marketing', Current Sociology, Vol. 49, No. 6, pp.39-55.
-
(2001)
Current Sociology
, vol.49
, Issue.6
, pp. 39-55
-
-
Boase, J.1
Wellman, B.2
-
4
-
-
50049087364
-
On mobile viruses exploiting messaging and bluetooth services
-
August 28-September 1
-
Bose, A. and Shin, K.G. (2006) 'On mobile viruses exploiting messaging and Bluetooth services', Securecomm and Workshops, August 28-September 1, pp.1-10.
-
(2006)
Securecomm and Workshops
, pp. 1-10
-
-
Bose, A.1
Shin, K.G.2
-
5
-
-
36248962470
-
Taxonomy and effectiveness of worm defense strategies
-
Carnegie Mellon University, June
-
Brumley, D., Liu, L., Poosankam, P. and Song, D. (2005) 'Taxonomy and effectiveness of worm defense strategies', Carnegie Mellon University, School of Computer Science, Tech. Rep. CMU-CS-05-156, June.
-
(2005)
School of Computer Science, Tech. Rep. CMU-CS-05-156
-
-
Brumley, D.1
Liu, L.2
Poosankam, P.3
Song, D.4
-
6
-
-
0037599474
-
The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
-
IOS Press
-
Campbell, K., Gordon, L.A., Loeb, M.P. and Zhou, L. (2003) 'The economic cost of publicly announced information security breaches: empirical evidence from the stock market', Journal of Computer Security, IOS Press, Vol. 11, No. 3, pp.431-448.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 431-448
-
-
Campbell, K.1
Gordon, L.A.2
Loeb, M.P.3
Zhou, L.4
-
7
-
-
35048902548
-
Aligning simulation models of smallpox outbreaks
-
Lecture Notes in Computer Science, Vol. 3073/2004
-
Chen, L.C., Kaminsky, B., Tummino, T., Carley, K.M., Casman, E., Fridsma, D. and Yahja, A. (2004) 'Aligning simulation models of smallpox outbreaks', Intelligence and Security Informatics, Lecture Notes in Computer Science, Vol. 3073/2004, pp.1-16.
-
(2004)
Intelligence and Security Informatics
, pp. 1-16
-
-
Chen, L.C.1
Kaminsky, B.2
Tummino, T.3
Carley, K.M.4
Casman, E.5
Fridsma, D.6
Yahja, A.7
-
8
-
-
39549096209
-
Effectiveness of quarantine in worm epidemics
-
Istanbul, Turkey, 11-15 June
-
Chen, T. and Jamil, N. (2006) 'Effectiveness of quarantine in worm epidemics', ICC 2006, Istanbul, Turkey, 11-15 June.
-
(2006)
ICC 2006
-
-
Chen, T.1
Jamil, N.2
-
9
-
-
0042474227
-
Modeling the spread of active worms
-
9 July
-
Chen, Z., Gao, L. and Kwiat, K. (2003) 'Modeling the spread of active worms', INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies, 9 July, Vol. 3, p.1890.
-
(2003)
INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies
, vol.3
, pp. 1890
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
10
-
-
84873390829
-
-
Department of Homeland Security, USA, November [online], [accessed 6 September 2012]
-
Department of Homeland Security (2009) 'A roadmap for cybersecurity research', Department of Homeland Security, USA, November [online] http://www.cyber.st.dhs.gov/docs/DHSCybersecurity-Roadmap.pdf [accessed 6 September 2012].
-
(2009)
A Roadmap for Cybersecurity Research', Department of Homeland Security
-
-
-
12
-
-
0042474229
-
Modeling malware spreading dynamics
-
IEEE Societies, 9 July
-
Garetto, M., Gong, W. and Towsley, D. (2003) 'Modeling malware spreading dynamics', INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, IEEE Societies, 9 July, Vol. 3, pp.1869-1879.
-
(2003)
Infocom 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications
, vol.3
, pp. 1869-1879
-
-
Garetto, M.1
Gong, W.2
Towsley, D.3
-
13
-
-
84855260734
-
Genetic algorithm based internet worm propagation strategy modeling
-
Technologija, ISSN 1392-124X
-
Goranin, N. and Cenys, A. (2008) 'Genetic algorithm based internet worm propagation strategy modeling', Information Technology and Control, Technologija, ISSN 1392-124X.
-
(2008)
Information Technology and Control
-
-
Goranin, N.1
Cenys, A.2
-
14
-
-
84873326186
-
-
InfoSecurity.com, 3 April [online], [accessed 6 March 2011]
-
InfoSecurity.com (2009) 'IBM warns over four percent Conficker infection rate', InfoSecurity.com, 3 April [online] http://www.infosecurity-magazine.com/ view/1065/ibm-warns-over-fourpercent-conficker-infection-rate/[accessed 6 March 2011].
-
(2009)
IBM Warns over Four Percent Conficker Infection Rate
-
-
-
15
-
-
77950793246
-
Modeling modern network attacks and countermeasures using attack graphs
-
7 December
-
Ingols, K., Chu, M., Lippmann, R., Webster, S. and Boyer, S. (2009) 'Modeling modern network attacks and countermeasures using attack graphs', Computer Security Applications Conference, ACSAC '09, 7 December, p.117.
-
(2009)
Computer Security Applications Conference, ACSAC '09
, pp. 117
-
-
Ingols, K.1
Chu, M.2
Lippmann, R.3
Webster, S.4
Boyer, S.5
-
16
-
-
0000998185
-
A contribution to the mathematical theory of epidemics
-
Kermack, W.O. and McKendrick, A.G. (1927) 'A contribution to the mathematical theory of epidemics', Proceedings of the Royal Society of London, Series A, Vol. 115, pp.700-721.
-
(1927)
Proceedings of the Royal Society of London, Series A
, vol.115
, pp. 700-721
-
-
Kermack, W.O.1
McKendrick, A.G.2
-
17
-
-
77953159974
-
An agent-based modeling for pandemic influenza in Egypt
-
28-30 March
-
Khalil, K.M., Abdel-Aziz, M., Nazmy, T.T., Salem, A.B.M. (2010) 'An agent-based modeling for pandemic influenza in Egypt', The 7th International Conference on Informatics and Systems (INFOS), 28-30 March.
-
(2010)
The 7th International Conference on Informatics and Systems (INFOS)
-
-
Khalil, K.M.1
Abdel-Aziz, M.2
Nazmy, T.T.3
Salem, A.B.M.4
-
18
-
-
57049183421
-
-
Software Engineering Institute, Carnegie Mellon University and Department of Homeland Security National Cyber Security Division, 19 December [online], [accessed 9 March 2011]
-
Killcrece, G. (2005) 'Incident management', Software Engineering Institute, Carnegie Mellon University and Department of Homeland Security National Cyber Security Division, 19 December [online] https://buildsecurityin. us-cert.gov/bsi/articles/best-practices/incident/223-BSI.html [accessed 9 March 2011].
-
(2005)
Incident Management
-
-
Killcrece, G.1
-
19
-
-
33646162672
-
-
CERT, Software Engineering Institute, Carnegie Mellon University, October [online], [accessed 2 March 2011]
-
Killcrece, G., Kossakowski, K., Ruefle, R. and Zjicek, M. (2011) 'State of the practice of computer security incident response teams (CSIRTs)', CERT, Software Engineering Institute, Carnegie Mellon University, October [online] http://www.sei.cmu.edu/library/abstracts/reports/03tr001.cfm [accessed 2 March 2011].
-
(2011)
State of the Practice of Computer Security Incident Response Teams (CSIRTs)
-
-
Killcrece, G.1
Kossakowski, K.2
Ruefle, R.3
Zjicek, M.4
-
20
-
-
77954948381
-
Threat analysis of incubation period in malware epidemics
-
Taipei, Taiwan, May
-
Kim, S.W., Park, J.H., Lee, E.D., Choi, M.E. and Seo, S.W. (2010) 'Threat analysis of incubation period in malware epidemics', IEEE 71st Vehicular Technology Conference (VTC'10), Taipei, Taiwan, May.
-
(2010)
IEEE 71st Vehicular Technology Conference (VTC'10)
-
-
Kim, S.W.1
Park, J.H.2
Lee, E.D.3
Choi, M.E.4
Seo, S.W.5
-
21
-
-
58049169669
-
Multi-agent model analysis of the containment strategy for avian influenza (AI) in South Korea
-
3-5 November
-
Kim, T., Hwang, W., Zhang, A., Sen, S. and Ramanathan, M. (2008) 'Multi-agent model analysis of the containment strategy for avian influenza (AI) in South Korea', Bioinformatics and Biomedicine, BIBM '08, 3-5 November, p.335.
-
(2008)
Bioinformatics and Biomedicine, BIBM '08
, pp. 335
-
-
Kim, T.1
Hwang, W.2
Zhang, A.3
Sen, S.4
Ramanathan, M.5
-
23
-
-
77957662699
-
Threshold smart walk for the containment of local worm outbreak
-
30 November
-
Li, L., Liu, P. and Kesidis, G. (2008) 'Threshold smart walk for the containment of local worm outbreak', Global Telecommunications Conference, 30 November, pp.1-5.
-
(2008)
Global Telecommunications Conference
, pp. 1-5
-
-
Li, L.1
Liu, P.2
Kesidis, G.3
-
24
-
-
15744393608
-
Bitten by a bug: A case study in malware infection
-
Logan, P.Y. and Logan, S.W. (2003) 'Bitten by a bug: a case study in malware infection', Journal of Information Systems Education, Vol. 14, No. 4, pp.301-306.
-
(2003)
Journal of Information Systems Education
, vol.14
, Issue.4
, pp. 301-306
-
-
Logan, P.Y.1
Logan, S.W.2
-
26
-
-
70349739389
-
A testbed for power system security evaluation
-
2009
-
Nicol, D.M., Davis, C.M. and Overbye, T. (2009) 'A testbed for power system security evaluation', International Journal of Information and Computer Security, Vol. 3, No. 2/2009, pp.114-131.
-
(2009)
International Journal of Information and Computer Security
, vol.3
, Issue.2
, pp. 114-131
-
-
Nicol, D.M.1
Davis, C.M.2
Overbye, T.3
-
27
-
-
78349231501
-
Artificial intelligence in malware - cop or culprit?
-
The University of Western Australia, Perth, Australia
-
Pan, J. and Fung, C.C. (2008) 'Artificial intelligence in malware - cop or culprit?', The Ninth Postgraduate Electrical Engineering & Computing Symposium PEECS 2008, The University of Western Australia, Perth, Australia.
-
(2008)
The Ninth Postgraduate Electrical Engineering & Computing Symposium PEECS 2008
-
-
Pan, J.1
Fung, C.C.2
-
28
-
-
78349246329
-
Devious Chatbots - interactive malware with a plot
-
Pan, J., Fung, C.C. and Koh, W.W. (2009) 'Devious Chatbots - interactive malware with a plot', FIRA 2009, CCIS 44, pp.110-118.
-
(2009)
FIRA 2009, CCIS 44
, pp. 110-118
-
-
Pan, J.1
Fung, C.C.2
Koh, W.W.3
-
29
-
-
84873358575
-
-
1 September [online], [accessed 6 March 2011]
-
Porras, P., Saidi, H. and Yegneswaran, V. (2010) 'Malware pandemics', Storming Media, 1 September [online] http://www.stormingmedia.us/66/6611/ A661135.html[accessed 6 March 2011].
-
(2010)
'Malware Pandemics
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
30
-
-
43649100273
-
Modeling and automated containment of worms
-
April
-
Sellke, S., Shroff, N.B. and Bagchi, S. (2008) 'Modeling and automated containment of worms', IEEE Transactions on Dependable and Secure Computing, April, Vol. 5, No. 2.
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.2
-
-
Sellke, S.1
Shroff, N.B.2
Bagchi, S.3
-
31
-
-
77953147385
-
Epidemic modelling: Validation of agent-based simulation by using simple mathematical models
-
Skvortsov, A., Connell, R.B., Dawson, P. and Gailis, R. (2007) 'Epidemic modelling: validation of agent-based simulation by using simple mathematical models', Proceedings of Land Warfare Conference 2007, pp.221-227.
-
(2007)
Proceedings of Land Warfare Conference 2007
, pp. 221-227
-
-
Skvortsov, A.1
Connell, R.B.2
Dawson, P.3
Gailis, R.4
-
33
-
-
77952903083
-
-
Verizon, 28 July [online], [accessed 2 March 2011]
-
Verizon (2010) '2010 data breach investigations report', Verizon Business, 28 July [online] http://www.verizonbusiness.com/go/ 2010databreachreport/[accessed 2 March 2011].
-
(2010)
2010 Data Breach Investigations Report
-
-
-
34
-
-
34547927497
-
PROMISing steps towards computer hygiene
-
Plymouth, UK, July
-
Vlachos, V., Raptis, A. and Spinellis, D. (2006) 'PROMISing steps towards computer hygiene', International Network Conference (INC2006), Plymouth, UK, July, pp.229-236.
-
(2006)
International Network Conference (INC2006)
, pp. 229-236
-
-
Vlachos, V.1
Raptis, A.2
Spinellis, D.3
-
35
-
-
33646554219
-
NGCE - network graphs for computer epidemiologists
-
Berlin, November
-
Vlachos, V., Vouzi, V., Chatziantoniou, D. and Spinellis, D. (2005) 'NGCE - network graphs for computer epidemiologists', Advances in Informatics: 10th Panhellenic Conference on Informatics, PCI 2005, Berlin, November, pp.672-683.
-
(2005)
Advances in Informatics: 10th Panhellenic Conference on Informatics, PCI 2005
, pp. 672-683
-
-
Vlachos, V.1
Vouzi, V.2
Chatziantoniou, D.3
Spinellis, D.4
-
36
-
-
84873341165
-
Effectiveness of proactive CSIRT services
-
Baltimore, Maryland, USA, 30 June
-
Wiik, J., Gonzalez, J.J. and Kossakowski, K. (2006) 'Effectiveness of proactive CSIRT services', 18th Annual First Conference, Baltimore, Maryland, USA, 30 June.
-
(2006)
18th Annual First Conference
-
-
Wiik, J.1
Gonzalez, J.J.2
Kossakowski, K.3
-
37
-
-
0141877349
-
-
Northwestern University, Evanston, IL [online], [accessed 1 March 2011]
-
Wilensky, U. (1999) 'NetLogo', Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL [online] http://ccl.northwestern.edu/netlogo/[accessed 1 March 2011].
-
(1999)
NetLogo
-
-
Wilensky, U.1
-
39
-
-
28044469549
-
The monitoring and early detection of internet worms
-
October
-
Zou, C.C., Gong, W., Towsley, D. and Gao, L. (2005) 'The monitoring and early detection of internet worms', IEEE/ACM Transactions on Networking, October, Vol. 13, No. 5.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.5
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
Gao, L.4
-
40
-
-
33646150900
-
On the performance of internet worm scanning strategies
-
July
-
Zou, C.C., Towsley, D. and Gong, W. (2006) 'On the performance of internet worm scanning strategies', Performance Evaluation, July, Vol. 63, No. 7.
-
(2006)
Performance Evaluation
, vol.63
, Issue.7
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
41
-
-
17444378633
-
Email worm modeling and defense
-
Chicago, USA, 11-13 October
-
Zou, C.C., Towsley, D. and Gong, W., (2004) 'Email worm modeling and defense', 13th International Conference on Computer Communications and Networks (ICCCN'04), Chicago, USA, 11-13 October, pp.409-414.
-
(2004)
13th International Conference on Computer Communications and Networks (ICCCN'04)
, pp. 409-414
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
|