메뉴 건너뛰기




Volumn , Issue , 2013, Pages 878-885

Spatio-temporal mining of software adoption and penetration

Author keywords

Data analysis; Internet security; Malware propagation

Indexed keywords

COMPUTER CRIME; DATA REDUCTION; DATABASE SYSTEMS; IMPORTANCE SAMPLING; RESEARCH; SOCIAL NETWORKING (ONLINE);

EID: 84893242447     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2492517.2500244     Document Type: Conference Paper
Times cited : (20)

References (32)
  • 1
    • 0020335555 scopus 로고
    • Coevolution of hosts and parasites
    • RM Anderson and RM May. Coevolution of hosts and parasites. Parasitology, 85(02):411-426, 1982.
    • (1982) Parasitology , vol.85 , Issue.2 , pp. 411-426
    • Anderson, R.M.1    May, R.M.2
  • 2
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling random networks
    • October
    • A. L. Barabasi and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509-512, October 1999.
    • (1999) Science , vol.286 , Issue.5439 , pp. 509-512
    • Barabasi, A.L.1    Albert, R.2
  • 5
    • 85064176806 scopus 로고    scopus 로고
    • Measuring pay-per-install: The commoditization of malware distribution
    • USENIX Association
    • Juan Caballero, Chris Grier, Christian Kreibich, and Vern Paxson. Measuring pay-per-install: The commoditization of malware distribution. In USENIX Security Symposium. USENIX Association, 2011.
    • (2011) USENIX Security Symposium
    • Caballero, J.1    Grier, C.2    Kreibich, C.3    Paxson, V.4
  • 8
    • 57349194232 scopus 로고    scopus 로고
    • Robust dynamic classes revealed by measuring the response function of a social system
    • R. Crane and D. Sornette. Robust dynamic classes revealed by measuring the response function of a social system. Proceedings of the National Academy of Sciences, 105(41):15649-15653, 2008.
    • (2008) Proceedings of the National Academy of Sciences , vol.105 , Issue.41 , pp. 15649-15653
    • Crane, R.1    Sornette, D.2
  • 9
    • 0030149554 scopus 로고    scopus 로고
    • Self-similarity in world wide web traffic, evidence and possible causes
    • M. Crovella and A. Bestavros. Self-similarity in world wide web traffic, evidence and possible causes. Sigmetrics, pages 160-169, 1996.
    • (1996) Sigmetrics , pp. 160-169
    • Crovella, M.1    Bestavros, A.2
  • 11
    • 0033204106 scopus 로고    scopus 로고
    • On powerlaw relationships of the internet topology
    • Aug-Sept
    • Michalis Faloutsos, Petros Faloutsos, and Christos Faloutsos. On powerlaw relationships of the internet topology. SIGCOMM, pages 251-262, Aug-Sept. 1999.
    • (1999) SIGCOMM , pp. 251-262
    • Faloutsos, M.1    Faloutsos, P.2    Faloutsos, C.3
  • 12
    • 33750322737 scopus 로고    scopus 로고
    • Planet scale software updates
    • In Luigi Rizzo, Thomas E. Anderson, and Nick McKeown, editors ACM
    • Christos Gkantsidis, Thomas Karagiannis, and Milan Vojnovic. Planet scale software updates. In Luigi Rizzo, Thomas E. Anderson, and Nick McKeown, editors, SIGCOMM, pages 423-434. ACM, 2006.
    • (2006) SIGCOMM , pp. 423-434
    • Gkantsidis, C.1    Karagiannis, T.2    Vojnovic, M.3
  • 13
    • 0034486891 scopus 로고    scopus 로고
    • The mathematics of infectious diseases
    • H.W. Hethcote. The mathematics of infectious diseases. SIAM review, 42(4):599-653, 2000.
    • (2000) SIAM Review , vol.42 , Issue.4 , pp. 599-653
    • Hethcote, H.W.1
  • 16
    • 0000873069 scopus 로고
    • A method for the solution of certain non-linear problems in least squares
    • K. Levenberg. A method for the solution of certain non-linear problems in least squares. Quarterly Journal of Applied Mathmatics, II(2):164-168, 1944.
    • (1944) Quarterly Journal of Applied Mathmatics , vol.2 , Issue.2 , pp. 164-168
    • Levenberg, K.1
  • 17
    • 84893257277 scopus 로고    scopus 로고
    • Personal communication
    • Bruce Maggs. Personal communication, 2012.
    • (2012)
    • Maggs, B.1
  • 21
    • 0141762461 scopus 로고    scopus 로고
    • Code-red: A case study on the spread and victims of an internet worm
    • ACM
    • David Moore, Colleen Shannon, and Kimberly C. Claffy. Code-red: a case study on the spread and victims of an internet worm. In Internet Measurement Workshop, pages 273-284. ACM, 2002.
    • (2002) Internet Measurement Workshop , pp. 273-284
    • Moore, D.1    Shannon, C.2    Claffy, K.C.3
  • 22
    • 24744469980 scopus 로고    scopus 로고
    • Power laws, pareto distributions and zipf's law
    • M. E. J. Newman. Power laws, pareto distributions and zipf's law. Contemporary Physics, 46, 2005.
    • (2005) Contemporary Physics , vol.46
    • Newman, M.E.J.1
  • 23
    • 79958736290 scopus 로고    scopus 로고
    • Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE)
    • Salzburg, Austria Apr
    • Tudor Dumitraş and Darren Shou. Toward a standard benchmark for computer security research: The Worldwide Intelligence Network Environment (WINE). In EuroSys BADGERS Workshop, Salzburg, Austria, Apr 2011.
    • (2011) EuroSys BADGERS Workshop
    • Dumitras, T.1    Shou, D.2
  • 26
    • 14944380936 scopus 로고    scopus 로고
    • The top speed of flash worms
    • In Vern Paxson, editor, ACM Press
    • Stuart Staniford, David Moore, Vern Paxson, and Nicholas Weaver. The top speed of flash worms. In Vern Paxson, editor, WORM, pages 33-42. ACM Press, 2004.
    • (2004) WORM , pp. 33-42
    • Staniford, S.1    Moore, D.2    Paxson, V.3    Weaver, N.4
  • 29
    • 1642303213 scopus 로고    scopus 로고
    • Capturing the spatio-temporal behavior of real traffic data
    • Mengzhi Wang, Anastassia Ailamaki, and Christos Faloutsos. Capturing the spatio-temporal behavior of real traffic data. Perform. Eval., 49(1/4):147-163, 2002.
    • (2002) Perform. Eval , vol.49 , Issue.1-4 , pp. 147-163
    • Wang, M.1    Ailamaki, A.2    Faloutsos, C.3
  • 30
    • 0036206378 scopus 로고    scopus 로고
    • Data mining meets performance evaluation: Fast algorithms for modeling bursty traffic
    • February
    • Mengzhi Wang, Tara Madhyastha, Ngai Hang Chang, Spiros Papadimitriou, and Christos Faloutsos. Data mining meets performance evaluation: Fast algorithms for modeling bursty traffic. ICDE, February 2002.
    • (2002) ICDE
    • Wang, M.1    Madhyastha, T.2    Hang Chang, N.3    Papadimitriou, S.4    Faloutsos, C.5
  • 31
    • 14944365100 scopus 로고    scopus 로고
    • Reflections on witty: Analyzing the attacker
    • June
    • Nicholas Weaver and Dan Ellis. Reflections on Witty: Analyzing the attacker. ;login: The USENIX Magazine, 29(3):34-37, June 2004.
    • (2004) Login: The USENIX Magazine , vol.29 , Issue.3 , pp. 34-37
    • Weaver, N.1    Ellis, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.