-
1
-
-
84976720856
-
The "worm" programs - early experiments with a distributed computation
-
March
-
J. Shoch and J. Hupp, "The "worm" programs - early experiments with a distributed computation," Communications of the ACM, vol. 22, no. 3, pp. 172-180, March 1982.
-
(1982)
Communications of the ACM
, vol.22
, Issue.3
, pp. 172-180
-
-
Shoch, J.1
Hupp, J.2
-
3
-
-
85084162258
-
How to Own the Internet in Your Spare Time
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in Your Spare Time," in Proceedings of the USENIX Security Symposium, August 2002, pp. 149-167.
-
Proceedings of the USENIX Security Symposium, August 2002
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
4
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in Proceedings of 22nd Annual Joint Conference of IEEE Computer and Communcation societies (INFOCOM 2003), April 2003.
-
Proceedings of 22nd Annual Joint Conference of IEEE Computer and Communcation Societies (INFOCOM 2003), April 2003
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
6
-
-
84949487368
-
On Computer Viral Infection and the Effect of Immunization
-
C. Wang, J. C. Knight, and M. C. Elder, "On Computer Viral Infection and the Effect of Immunization," in Proceedings of the 16th Annual Computer Security Applications Conference, 2000, pp. 246-256.
-
Proceedings of the 16th Annual Computer Security Applications Conference, 2000
, pp. 246-256
-
-
Wang, C.1
Knight, J.C.2
Elder, M.C.3
-
8
-
-
0023294949
-
Computer Viruses: Theory and Practice
-
Feb.
-
F. Cohen, "Computer Viruses: Theory and Practice," Computers & Security, vol. 6, pp. 22-35, Feb. 1987.
-
(1987)
Computers & Security
, vol.6
, pp. 22-35
-
-
Cohen, F.1
-
11
-
-
0038349210
-
Code Red Worm Propagation Modeling and Analysis
-
C. C. Zou, W. Gong, and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," in Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002, pp. 138-147.
-
Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
12
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
D. Moore, C. Shanning, and K. Claffy, "Code-Red: a case study on the spread and victims of an Internet worm," in Proceedings of the 2nd Internet Measurement Workshop, November 2002, pp. 273-284.
-
Proceedings of the 2nd Internet Measurement Workshop, November 2002
, pp. 273-284
-
-
Moore, D.1
Shanning, C.2
Claffy, K.3
-
13
-
-
0242624600
-
MET: An Experimental System for Malicious Email Tracking
-
M. Bhattacharyya, M. G. Schultz, E. Eskin, S. Hershkop, and S. J. Stolfo, "MET: An Experimental System for Malicious Email Tracking," in Proceedings of the New Security Paradigms Workshop, September 2002, pp. 1-12.
-
Proceedings of the New Security Paradigms Workshop, September 2002
, pp. 1-12
-
-
Bhattacharyya, M.1
Schultz, M.G.2
Eskin, E.3
Hershkop, S.4
Stolfo, S.J.5
-
15
-
-
79958832243
-
Open Packet Monitoring on FLAME: Safety, Performance and Applications
-
K. G. Anagnostakis, M. B. Greenwald, S. Ioannidis, and S. Miltchev, "Open Packet Monitoring on FLAME: Safety, Performance and Applications," in Proceedings of the 4rd International Working Conference on Active Networks (IWAN'02), December 2002.
-
Proceedings of the 4rd International Working Conference on Active Networks (IWAN'02), December 2002
-
-
Anagnostakis, K.G.1
Greenwald, M.B.2
Ioannidis, S.3
Miltchev, S.4
|