-
1
-
-
12244311689
-
Ataxonomy of computer worms
-
New York
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "Ataxonomy of computer worms, " in Proc. ACM Workshop Rapid Malcode, New York, 2003, pp. 11-18.
-
(2003)
Proc. ACM Workshop Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
2
-
-
84873820564
-
-
F-Secure Corp. Calculating The Size Of The Downadup Out- Break. [Online]
-
F-Secure Corp., Calculating the size of the downadup out- break. 2009. [Online]. Available: http://www.f-secure.com/we- blog/archives/00001584.html
-
(2009)
-
-
-
3
-
-
80053654839
-
Optimal quarantining of wire- less malware through power control
-
Feb.
-
M. Khouzani, E. Altman, and S. Sarkar, "Optimal quarantining of wire- less malware through power control, " in Proc. Inf. Theory Appl. Work- shop, Feb.2009, pp.301-310.
-
(2009)
Proc. Inf. Theory Appl. Work- Shop
, pp. 301-310
-
-
Khouzani, M.1
Altman, E.2
Sarkar, S.3
-
4
-
-
79955481246
-
How bad are selfish invest- ments in network security?
-
L. Jiang, V. Anantharam, and J. Walrand, "How bad are selfish invest- ments in network security?, " Proc. IEEE/ACM Trans. Netw., vol. 19, no.2, pp.549-560, 2011.
-
(2011)
Proc. IEEE/ACM Trans. Netw.
, vol.19
, Issue.2
, pp. 549-560
-
-
Jiang, L.1
Anantharam, V.2
Walrand, J.3
-
5
-
-
57349135233
-
Network externalities and the deployment of security features and protocols in the internet
-
New York
-
M. Lelarge and J. Bolot, "Network externalities and the deployment of security features and protocols in the internet, " in Pro. ACM SIG- METRICSInt. Conf.Meas. Model Comput. Syst., New York, 2008, pp. 37-48.
-
(2008)
Pro. ACM SIG- METRICSInt. Conf.Meas. Model Comput. Syst.
, pp. 37-48
-
-
Lelarge, M.1
Bolot, J.2
-
6
-
-
33746689683
-
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
-
J. Aspnes, K. Chang, and A. Yampolskiy, "Inoculation strategies for victims of viruses and the sum-of-squares partition problem, " J. Comput. Syst. Sci., vol. 72, no. 6, pp. 1077-1093, 2006.
-
(2006)
J. Comput. Syst. Sci.
, vol.72
, Issue.6
, pp. 1077-1093
-
-
Aspnes, J.1
Chang, K.2
Yampolskiy, A.3
-
7
-
-
33748677680
-
When selfish meets evil: Byzantine players in a virus inoculation game
-
New York
-
T. Moscibroda, S. Schmid, and R. Wattenhofer, "When selfish meets evil: Byzantine players in a virus inoculation game, " in Proc. 25th ACM Symp. Principles Distrib. Comput., New York, 2006, pp. 35-44.
-
(2006)
Proc. 25th ACM Symp. Principles Distrib. Comput.
, pp. 35-44
-
-
Moscibroda, T.1
Schmid, S.2
Wattenhofer, R.3
-
8
-
-
70449127856
-
Why anti-virus products slow down your machine?
-
San Francisco, CA, Aug.
-
W. Yan and N. Ansari, "Why anti-virus products slow down your machine?, " in Proc IEEE 18th Int. Conf. Comput. Commun. Netw., San Francisco, CA, Aug. 2009, pp. 1-6.
-
(2009)
Proc IEEE 18th Int. Conf. Comput. Commun. Netw.
, pp. 1-6
-
-
Yan, W.1
Ansari, N.2
-
9
-
-
84873831270
-
-
[Online]
-
B. Schneier, How to sell security. 2008. [Online]. Available: http:// www.schneier.com/blog/archives/2008/05/how to sell- sec.html
-
(2008)
How to Sell Security.
-
-
Schneier, B.1
-
10
-
-
0000125532
-
Prospecttheory:An analysis of de- cision under risk
-
D. Kahneman and A. Tversky, "Prospecttheory:An analysis of de- cision under risk, " Economet.: J. Economet. Soc., vol. 47, no. 2, pp. 263-291, 1979.
-
(1979)
Economet.: J. Economet. Soc.
, vol.47
, Issue.2
, pp. 263-291
-
-
Kahneman, D.1
Tversky, A.2
-
11
-
-
84873843056
-
-
United States Computer Emergency Readiness Team [Online].
-
United States Computer Emergency Readiness Team [Online]. Avail- able: http://www.us-cert.gov/
-
-
-
-
12
-
-
84873869927
-
-
F-Secure Corp. Mobile Malware Descriptions. [Online]
-
F-Secure Corp., Mobile malware descriptions. [Online]. Available: http://www.f-secure.com/v-descs/mobile-description-index.shtml
-
-
-
-
14
-
-
0034486891
-
The mathematics of infectious diseases
-
H. Hethcote, "The mathematics of infectious diseases, "SIAMRev., vol. 42, no. 4, pp. 599-653, 2000.
-
(2000)
SIAMRev.
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.1
-
15
-
-
0026156688
-
Directed-graph epidemiological models of computer viruses
-
Oakland, CA
-
J. O. Kephart and S. R. White, "Directed-graph epidemiological models of computer viruses, " in Proc IEEE Comput. Soc Symp Res. Security Privacy, Oakland, CA, 1991, pp. 343-359.
-
(1991)
Proc IEEE Comput. Soc Symp Res. Security Privacy
, pp. 343-359
-
-
Kephart, J.O.1
White, S.R.2
-
16
-
-
54549088710
-
On the race of worms, alerts, patches
-
Oct
-
M. Vojnovic and A. Ganesh, "On the race of worms, alerts, patches, " IEEE/ACM Trans. Netw., vol. 16, no. 5, pp. 1066-1079, Oct. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.5
, pp. 1066-1079
-
-
Vojnovic, M.1
Ganesh, A.2
-
17
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
New York
-
C C Zou, W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis, " in Proc. 9th ACM Conf. Comput. Commun. Security, New York, 2002, pp. 138-147.
-
(2002)
Proc. 9th ACM Conf. Comput. Commun. Security
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
18
-
-
0742276097
-
Inside the slammer worm
-
Jul
-
D. Moore, V. Paxson, S. Savage, C Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm, " IEEE Security Privacy, vol. 1, no. 4, pp. 33-39, Jul. 2003.
-
(2003)
IEEE Security Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
19
-
-
25844439630
-
The effect of network topology on the spread of epidemics
-
Miami, FL, Mar.
-
A. Ganesh, L. Massoulie, and D. Towsley, "The effect of network topology on the spread of epidemics, " in INFOCOM'05: Proc. IEEE 24th Annu. Int. Conf. Comput. Commun., Miami, FL, Mar. 2005, vol. 2, pp. 1455-1466.
-
(2005)
INFOCOM'05: Proc. IEEE 24th Annu. Int. Conf. Comput. Commun.
, vol.2
, pp. 1455-1466
-
-
Ganesh, A.1
Massoulie, L.2
Towsley, D.3
-
22
-
-
0141680332
-
Evolutionary game dynamics
-
J. Hofbauer and K. Sigmund, "Evolutionary game dynamics, " Bull. Amer. Math. Soc., vol. 40, no. 4, pp. 479-519, 2003.
-
(2003)
Bull. Amer. Math. Soc.
, vol.40
, Issue.4
, pp. 479-519
-
-
Hofbauer, J.1
Sigmund, K.2
-
25
-
-
84873837800
-
-
[Online]
-
G. Theodorakopoulos, J.-Y. Le Boudec, and J. S. Baras, EPFL, Selfish response to epidemic propagation, Tech. Rep. 167508, 2011. [Online]. Available:http://infoscience.epfl.ch/record/167508
-
(2011)
EPFL, Selfish Response to Epidemic Propagation, Tech. Rep.
, pp. 167508
-
-
Theodorakopoulos, G.1
Le Boudec, J.-Y.2
Baras, J.S.3
-
28
-
-
0000014716
-
Strong convergence of a stochastic approximation algo- rithm
-
L. Ljung, "Strong convergence of a stochastic approximation algo- rithm, "Ann. Stat., vol. 6, no. 3, pp. 680-696, 1978.
-
(1978)
Ann. Stat.
, vol.6
, Issue.3
, pp. 680-696
-
-
Ljung, L.1
-
29
-
-
0001541813
-
Recherche des cycles limites
-
H. Dulac, "Recherche des cycles limites, " CRAcad Sci. Paris, vol. 204, pp. 1703-1706, 1937.
-
(1937)
CRAcad Sci. Paris
, vol.204
, pp. 1703-1706
-
-
Dulac, H.1
-
30
-
-
77951164538
-
-
(v. 2006-09-15) Sep. 2006. [Online]
-
J. Scott, R. Gass, J. Crowcroft, P. Hui, C Diot, and A. Chaintreau, CRAWDAD Data Set Cambridge/Haggle (v. 2006-09-15) Sep. 2006. [Online]. Available: http://crawdad.cs.dartmouth.edu/cam- bridge/haggle
-
CRAWDAD Data Set Cambridge/Haggle
-
-
Scott, J.1
Gass, R.2
Crowcroft, J.3
Hui, P.4
Diot, C.5
Chaintreau, A.6
-
31
-
-
11144344876
-
Deworming the internet
-
D. Barnes, "Deworming the internet, " Texas Law Rev., vol. 83, pp. 279-329, 2004.
-
(2004)
Texas Law Rev.
, vol.83
, pp. 279-329
-
-
Barnes, D.1
|