-
1
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
D. Moore, C. Shannon et al., "Code-red: a case study on the spread and victims of an internet worm," in Proc. 2nd ACM SIGCOMM Workshop on Internet measurment. ACM, 2002, pp. 273-284. [Online]. Available: http://dl.acm.org/citation.cfm?id=637244
-
(2002)
Proc. 2nd ACM SIGCOMM Workshop on Internet Measurment. ACM
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
-
2
-
-
84979745679
-
The code red worm
-
H. Berghel, "The code red worm," Commun. of the ACM, vol. 44, no. 12, pp. 15-19, 2001.
-
(2001)
Commun. of the ACM
, vol.44
, Issue.12
, pp. 15-19
-
-
Berghel, H.1
-
3
-
-
84893558081
-
-
New York, Springer-Verlag 1988
-
H. V. Poor, "An introduction to signal detection and estimation," New York, Springer-Verlag, 1988, 559 p., vol. 1, 1988.
-
(1988)
An Introduction to Signal Detection and Estimation
, vol.1
, pp. 559
-
-
Poor, H.V.1
-
4
-
-
24344477444
-
Colleges brace for the next worm
-
A. L. Foster, "Colleges brace for the next worm," The Chronicle of Higher Education, vol. 50, no. 28, p. A29, 2004.
-
(2004)
The Chronicle of Higher Education
, vol.50
, Issue.28
-
-
Foster, A.L.1
-
6
-
-
84901222181
-
-
Symantec.
-
Symantec. ( 2008) W32.downadup (win32/conficker). [Online]. Available: http://www.symantec.com/security-response/writeup.jsp?docid=2008-112203-2408-99
-
(2008)
W32.downadup (win32/conficker)
-
-
-
7
-
-
84901222175
-
-
(2010) W32.stuxnet, 2010. [Online]. Available: http://www.symantec.com/ security-response/writeup.jsp?docid=2010-071400-3123-99
-
(2010)
W32.stuxnet, 2010
-
-
Weafer, V.1
-
8
-
-
77954950954
-
Symantec internet security threat report trends for 2010
-
M. Fossi, G. Egan, K. Haley, E. Johnson, T. Mack, T. Adams, J. Blackbird, M. K. Low, D. Mazurek, D. McKinney et al., "Symantec internet security threat report trends for 2010," Volume, vol. 16, p. 20, 2011.
-
(2011)
Volume
, vol.16
, pp. 20
-
-
Fossi, M.1
Egan, G.2
Haley, K.3
Johnson, E.4
MacK, T.5
Adams, T.6
Blackbird, J.7
Low, M.K.8
Mazurek, D.9
McKinney, D.10
-
9
-
-
65249107163
-
A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection
-
J. Hu, X. Yu, D. Qiu, and H.-H. Chen, "A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection," IEEE Network, vol. 23, no. 1, pp. 42-47, 2009. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=4804323
-
(2009)
IEEE Network
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Yu, X.2
Qiu, D.3
Chen, H.-H.4
-
11
-
-
0042474227
-
Modeling the spread of active worms
-
IEEE
-
Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in INFOCOM 2003. 22nd Annu. Joint Conf. IEEE Comput. Commun. IEEE Societies, vol. 3. IEEE, 2003, pp. 1890-1900. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=1209211
-
(2003)
INFOCOM 2003. 22nd Annu. Joint Conf. IEEE Comput. Commun. IEEE Societies
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
12
-
-
58849141571
-
Modeling propagation dynamics of bluetooth worms (extended version)
-
G. Yan and S. Eidenbenz, "Modeling propagation dynamics of bluetooth worms (extended version)," IEEE Trans. Mobile Computing, vol. 8, no. 3, pp. 353-368, 2009. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all. jsp?arnumber=4624266
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.3
, pp. 353-368
-
-
Yan, G.1
Eidenbenz, S.2
-
13
-
-
77955517954
-
Modeling the propagation of peer-to-peer worms
-
X. Fan and Y Xiang, "Modeling the propagation of peer-to-peer worms," Future generation computer systems, vol. 26, no. 8, pp. 1433-1443, 2010. [Online]. Available: http://www.sciencedirect.com/science/article/pii/ S0167739X10000737
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.8
, pp. 1433-1443
-
-
Fan, X.1
Xiang, Y.2
-
14
-
-
34248995311
-
Modeling and simulation study of the propagation and defense of internet e-mail worms
-
C. C. Zou, D. Towsley, and W. Gong, "Modeling and simulation study of the propagation and defense of internet e-mail worms," IEEE Trans. Dependable and Secure Computing, vol. 4, no. 2, pp. 105-118, 2007. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=4198176
-
(2007)
IEEE Trans. Dependable and Secure Computing
, vol.4
, Issue.2
, pp. 105-118
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
16
-
-
33846607334
-
Importance-scanning worm using vulnerable-host distribution
-
IEEE
-
Z. Chen and C. Ji, "Importance-scanning worm using vulnerable-host distribution," in IEEE Global Telecommunications Conf, 2005. GLOBECOM'05., vol. 3. IEEE, 2005, pp. 6-pp. [Online]. Available: http://ieeexplore.ieee.org/ xpls/abs-all.jsp?arnumber=1577955
-
(2005)
IEEE Global Telecommunications Conf, 2005. GLOBECOM'05.
, vol.3
, pp. 6
-
-
Chen, Z.1
Ji, C.2
-
17
-
-
34548366188
-
Optimal worm-scanning method using vulnerable-host distributions
-
"Optimal worm-scanning method using vulnerable-host distributions," Int. J. Secur. Netw., vol. 2, no. 1/2, pp. 71-80, 2007.
-
(2007)
Int. J. Secur. Netw.
, vol.2
, Issue.1-2
, pp. 71-80
-
-
Chen, Z.1
Ji, C.2
-
18
-
-
51249086020
-
A closed-form expression for static worm-scanning strategies
-
Z. Chen and C. Chen, "A closed-form expression for static worm-scanning strategies," in IEEE Int. Conf. Commun., 2008. ICC'08. IEEE, 2008, pp. 1573-1577. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs- all.jsp?arnumber=4533340
-
(2008)
IEEE Int. Conf. Commun., 2008. ICC'08. IEEE
, pp. 1573-1577
-
-
Chen, Z.1
Chen, C.2
-
19
-
-
36348997064
-
Understanding localized-scanning worms
-
DOI 10.1109/PCCC.2007.358894, 4197930, 27th IEEE International Performance Computing and Communications Conference, IPCCC 07
-
Z. Chen, C. Chen, and C. Ji, "Understanding localized-scanning worms," in IEEE Int. Performance, Computing, and Commun. Conf, 2007. IPCCC 2007. IEEE, 2007, pp. 186-193. [Online]. Available: http://ieeexplore.ieee.org/ xpls/abs-all.jsp?arnumber=4197930 (Pubitemid 350139297)
-
(2007)
Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
, pp. 186-193
-
-
Chen, Z.1
Chen, C.2
Ji, C.3
-
20
-
-
79551643155
-
On the robustness of the botnet topology formed by worm infection
-
Q. Wang, Z. Chen, C. Chen, and N. Pissinou, "On the robustness of the botnet topology formed by worm infection," in 2010 IEEE Global Telecommunications Conf. (GLOBECOM 2010). IEEE, 2010, pp. 1-6. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=5684002
-
(2010)
2010 IEEE Global Telecommunications Conf. (GLOBECOM 2010). IEEE
, pp. 1-6
-
-
Wang, Q.1
Chen, Z.2
Chen, C.3
Pissinou, N.4
-
21
-
-
39049123320
-
On detecting camouflaging worm
-
DOI 10.1109/ACSAC.2006.36, 4041170, Proceedings - Annual Computer Security Applications Conference, ACSAC
-
W. Yu, X. Wang, P. Calyam, D. Xuan, and W. Zhao, "On detecting camouflaging worm," in Computer Security Applications Conf, 2006. ACSAC'06. 22nd Annu. IEEE, 2006, pp. 235-244. [Online]. Available: http://ieeexplore. ieee.org/xpls/abs-all.jsp?arnumber=4041170 (Pubitemid 351232918)
-
(2006)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, pp. 235-244
-
-
Yu, W.1
Wang, X.2
Calyam, P.3
Xuan, D.4
Zhao, W.5
-
22
-
-
79952954563
-
Modeling and detection of camouflaging worm
-
"Modeling and detection of camouflaging worm," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 3, pp. 377-390, 2011. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=5444887
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.8
, Issue.3
, pp. 377-390
-
-
Yu, W.1
Wang, X.2
Calyam, P.3
Xuan, D.4
Zhao, W.5
-
23
-
-
73449125776
-
Propagation of active worms: A survey
-
Y Xiang, X. Fan, and W Zhu, "Propagation of active worms: a survey," Int. J. Comput. Systems Science & Engineering, vol. 24, no. 3, pp. 157-172, 2009.
-
(2009)
Int. J. Comput. Systems Science & Engineering
, vol.24
, Issue.3
, pp. 157-172
-
-
Xiang, Y.1
Fan, X.2
Zhu, W.3
-
24
-
-
76549110008
-
Defending against the propagation of active worms
-
X. Fan and Y Xiang, "Defending against the propagation of active worms," The Journal of Supercomputing, vol. 51, no. 2, pp. 167-200, 2010. [Online]. Available: http://link.springer.com/article/10.1007/s11227-009-0283-8
-
(2010)
The Journal of Supercomputing
, vol.51
, Issue.2
, pp. 167-200
-
-
Fan, X.1
Xiang, Y.2
-
25
-
-
71849119546
-
Concept, characteristics and defending mechanism of worms
-
T. Yong, L. Jiaqing, X. Bin, and W. Guiyi, "Concept, characteristics and defending mechanism of worms," IEICE TRANS. Information and Systems, vol. 92, no. 5, pp. 799-809, 2009. [Online]. Available: http://search.ieice.org/ bin/summary.php?id=e92-d-5-799
-
(2009)
IEICE TRANS. Information and Systems
, vol.92
, Issue.5
, pp. 799-809
-
-
Yong, T.1
Jiaqing, L.2
Bin, X.3
Guiyi, W.4
-
26
-
-
77953145744
-
A survey of internet worm detection and containment
-
P. Li, M. Salour, and X. Su, "A survey of internet worm detection and containment," IEEE Commun. Surveys & Tutorials, vol. 10, no. 1, pp. 20-35, 2008. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp? arnumber=4483668
-
(2008)
IEEE Commun. Surveys & Tutorials
, vol.10
, Issue.1
, pp. 20-35
-
-
Li, P.1
Salour, M.2
Su, X.3
-
27
-
-
12244311689
-
A taxonomy of computer worms
-
WORM'03 - Proceedings of the 2003 ACM Workshop on Rapid Malcode
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A taxonomy of computer worms," in Proc. 2003 ACM workshop on Rapid malcode. ACM, 2003, pp. 11-18. [Online]. Available: http://dl.acm.org/citation.cfm?id=948190 (Pubitemid 40681805)
-
(2003)
WORM'03 - Proceedings of the 2003 ACM Workshop on Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
28
-
-
17444431614
-
Worm propagation and generic attacks
-
DOI 10.1109/MSP.2005.57
-
E. Levy, "Worm propagation and generic attacks," IEEE Security & Privacy, vol. 3, no. 2, pp. 63-65, 2005. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=1423964 (Pubitemid 40542064)
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.2
, pp. 63-65
-
-
Levy, E.1
-
29
-
-
4344627335
-
The spread of the witty worm
-
C. Shannon and D. Moore, "The spread of the witty worm," IEEE Security & Privacy, vol. 2, no. 4, pp. 46-50, 2004. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=1324598
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
30
-
-
21844451704
-
-
Symantec.
-
Symantec. (2004) W32.sasser.worm. [Online]. Available: http://www.symantec.com/security-response/writeup.jsp?docid=2004-050116-1831-99.
-
(2004)
W32.sasser.worm
-
-
-
32
-
-
84901222173
-
-
F-Secure.
-
F-Secure. (2011) Love letter virus. [Online]. Available: http://www.f-secure.com/v-descs/love.shtml.
-
(2011)
Love Letter Virus
-
-
-
33
-
-
84901222174
-
-
Iloveyou virus lessons learned report. Army Forces Command
-
Iloveyou virus lessons learned report. Army Forces Command. [Online]. Available: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA415104&Location= U2&doc=GetTRDoc.pdf
-
-
-
-
34
-
-
84901222165
-
-
Symantec.
-
Symantec. (2001) W32.sircam.worm. [Online]. Available: http://www.symantec.com/security-response/writeup.jsp?docid=2001-071720-1640- 99&tabid=2
-
(2001)
W32.sircam.worm
-
-
-
35
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the slammer worm," IEEE Security & Privacy, vol. 1, no. 4, pp. 33-39, 2003. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all. jsp?arnumber=1219056
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
37
-
-
33646150900
-
On the performance of internet worm scanning strategies
-
C. C. Zou, D. Towsley, and W. Gong, "On the performance of internet worm scanning strategies," Performance Evaluation, vol. 63, no. 7, pp. 700-723, 2006. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S0166531605001112
-
(2006)
Performance Evaluation
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
38
-
-
26844507894
-
Routing worm: A fast, selective attack worm based on IP address information
-
Proceedings - Workshop on Principles of Advanced and Distributed Simulation, PADS 2005
-
C. C. Zou, D. Towsley, W. Gong, and S. Cai, "Routing worm: A fast, selective attack worm based on ip address information," in Proc. 19th Workshop on Principles of Advanced and Distributed Simulation. IEEE Computer Society, 2005, pp. 199-206. [Online]. Available: http://dl.acm.org/citation.cfm? id=1070175 (Pubitemid 41451138)
-
(2005)
Proceedings - Workshop on Principles of Advanced and Distributed Simulation, PADS
, pp. 199-206
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
39
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
C. C. Zou, W Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in Proc. 9th ACM conference on Computer and communications security. ACM, 2002, pp. 138-147. [Online]. Available: http://dl.acm.org/citation.cfm?id=586130
-
(2002)
Proc. 9th ACM Conference on Computer and Communications Security. ACM
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
40
-
-
33748372756
-
Stochastic behavior of random constant scanning worms
-
DOI 10.1109/ICCCN.2005.1523881, 1523881, Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005
-
K. R. Rohloff and T. Basar, "Stochastic behavior of random constant scanning worms," in Comput. Commun. Netw., 2005. ICCCN 2005. Proc. 14th Int. Conf. IEEE, 2005, pp. 339-344. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=1523881 (Pubitemid 44335336)
-
(2005)
Proceedings - International Conference on Computer Communications and Networks, ICCCN
, vol.2005
, pp. 339-344
-
-
Rohloff, K.R.1
Basar, T.2
-
41
-
-
43649100273
-
Modeling and automated containment of worms
-
DOI 10.1109/TDSC.2007.70230, 4358715
-
S. H. Sellke, N. B. Shroff, and S. Bagchi, "Modeling and automated containment of worms," IEEE Trans. Dependable and Secure Computing, vol. 5, no. 2, pp. 71-86, 2008. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=4358715 (Pubitemid 351681550)
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.2
, pp. 71-86
-
-
Sellke, S.H.1
Shroff, N.B.2
Bagchi, S.3
-
42
-
-
80053479500
-
The microcosmic model of worm propagation
-
2011
-
Y Wang, S. Wen, S. Cesare, W Zhou, and Y Xiang, "The microcosmic model of worm propagation," The Computer Journal, vol. 54, no. 10, pp. 1700-1720, 2011. [Online]. Available: http://comjnl.oxfordjournals.org/content/ 54/10/1700.short
-
The Computer Journal
, vol.54
, Issue.10
, pp. 1700-1720
-
-
Wang, Y.1
Wen, S.2
Cesare, S.3
Zhou, W.4
Xiang, Y.5
-
44
-
-
84901222167
-
A brief history of the worm
-
N. Weaver, "A brief history of the worm," Security Focus Online, vol. 26, 2001.
-
(2001)
Security Focus Online
, vol.26
-
-
Weaver, N.1
-
45
-
-
39049092655
-
Epidemiological modelling of peer-to-peer viruses and pollution
-
R. W. Thommes and M. Coates, "Epidemiological modelling of peer-to-peer viruses and pollution." in INFOCOM, vol. 6, 2006, pp. 1-12.
-
(2006)
INFOCOM
, vol.6
, pp. 1-12
-
-
Thommes, R.W.1
Coates, M.2
-
46
-
-
78649317337
-
Online social networksparadise of computer viruses
-
2011
-
W. Fan and K. Yeung, "Online social networksparadise of computer viruses," Physica A: Statistical Mechanics and its Applications, vol. 390, no. 2, pp. 189-197, 2011. [Online]. Available: http://www.sciencedirect.com/ science/article/pii/S0378437110008344
-
Physica A: Statistical Mechanics and Its Applications
, vol.390
, Issue.2
, pp. 189-197
-
-
Fan, W.1
Yeung, K.2
-
47
-
-
84901222168
-
-
W32.koobface
-
W32.koobface. [Online]. Available: http://www.symantec.com/security- response/writeup.jsp?docid=2008-080315-0217-99.
-
-
-
-
50
-
-
2942562709
-
Epidemic spreading in complex networks with degree correlations
-
M. Boguná, R. Pastor-Satorras, and A. Vespignani, "Epidemic spreading in complex networks with degree correlations," Statistical Mechanics of Complex Networks-Lectures Notes in Physics, vol. 625, 2003.
-
(2003)
Statistical Mechanics of Complex Networks-Lectures Notes in Physics
, vol.625
-
-
Boguná, M.1
Pastor-Satorras, R.2
Vespignani, A.3
-
51
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and analysis of online social networks," in Proc. 7th ACM SIGCOMM conf. Internet measurement. ACM, 2007, pp. 29-42. [Online]. Available: http://dl.acm.org/citation.cfm?id=1298311
-
(2007)
Proc. 7th ACM SIGCOMM Conf. Internet Measurement. ACM
, pp. 29-42
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
52
-
-
34147159602
-
Impact of non-poissonian activity patterns on spreading processes
-
A. Vazquez, B. Racz, A. Lukacs, and A.-L. Barabasi, "Impact of non-poissonian activity patterns on spreading processes," Physical review letters, vol. 98, no. 15, p. 158702, 2007. [Online]. Available: http://prl.aps.org/abstract/PRL/v98/i15/e158702
-
(2007)
Physical Review Letters
, vol.98
, Issue.15
, pp. 158702
-
-
Vazquez, A.1
Racz, B.2
Lukacs, A.3
Barabasi, A.-L.4
-
53
-
-
0030410559
-
Short paths in expander graphs
-
J. Kleinberg and R. Rubinfeld, "Short paths in expander graphs," in Foundations of Computer Science, 1996. Proc, 37th Annu. Symp. IEEE, 1996, pp. 86-95. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs- all.jsp?arnumber=548467
-
(1996)
Foundations of Computer Science, 1996. Proc, 37th Annu. Symp. IEEE
, pp. 86-95
-
-
Kleinberg, J.1
Rubinfeld, R.2
-
54
-
-
84990671447
-
A critical point for random graphs with a given degree sequence
-
wiley.com/doi/10.1002/rsa.3240060204/full
-
M. Molloy and B. Reed, "A critical point for random graphs with a given degree sequence," Random structures & algorithms, vol. 6, no. 2-3, pp. 161-180, 1995. [Online]. Available: http://onlinelibrary.wiley.com/doi/ 10.1002/rsa.3240060204/full
-
(1995)
Random Structures & Algorithms
, vol.6
, Issue.2-3
, pp. 161-180
-
-
Molloy, M.1
Reed, B.2
-
55
-
-
0032286776
-
The Size of the Giant Component of a Random Graph with a Given Degree Sequence
-
"The size of the giant component of a random graph with a given degree sequence," Combinatorics probability and computing, vol. 7, no. 3, pp. 295-305, 1998. [Online]. Available: http://journals.cambridge.org/ production/action/cjoGetFulltext?fulltextid =46636 (Pubitemid 128480814)
-
(1998)
Combinatorics Probability and Computing
, vol.7
, Issue.3
, pp. 295-305
-
-
Molloy, M.1
Reed, B.2
-
56
-
-
0032482432
-
Collective dynamics of small-worldnetworks
-
D. J. Watts and S. H. Strogatz, "Collective dynamics of small-worldnetworks," nature, vol. 393, no. 6684, pp. 440-442, 1998. [Online]. Available: http://www.nature.com/nature/journal/v393/n6684/abs/ 393440a0.html
-
(1998)
Nature
, vol.393
, Issue.6684
, pp. 440-442
-
-
Watts, D.J.1
Strogatz, S.H.2
-
57
-
-
79956032303
-
Malware propagation in online social networks: Nature, dynamics, and defense implications
-
G. Yan, G. Chen, S. Eidenbenz, and N. Li, "Malware propagation in online social networks: nature, dynamics, and defense implications," in Proc. 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011, pp. 196-206. [Online]. Available: http://dl.acm.org/citation.cfm?id= 1966939
-
(2011)
Proc. 6th ACM Symposium on Information, Computer and Communications Security. ACM
, pp. 196-206
-
-
Yan, G.1
Chen, G.2
Eidenbenz, S.3
Li, N.4
-
58
-
-
70849133146
-
Analysis of a location-based social network
-
IEEE
-
N. Li and G. Chen, "Analysis of a location-based social network," in Computational Science and Engineering, 2009. CSE'09. Int. Conf, vol. 4. IEEE, 2009, pp. 263-270. [Online]. Available: http://ieeexplore. ieee.org/xpls/abs-all.jsp?arnumber=5284112
-
(2009)
Computational Science and Engineering, 2009. CSE'09. Int. Conf
, vol.4
, pp. 263-270
-
-
Li, N.1
Chen, G.2
-
59
-
-
11444254729
-
Modeling peer-to-peer network topologies through small-world models and power laws
-
M. Jovanovic, F. Annexstein, and K. Berman, "Modeling peer-to-peer network topologies through small-world models and power laws," in IX Telecommunications Forum, TELFOR, 2001, pp. 1-4.
-
(2001)
IX Telecommunications Forum, TELFOR
, pp. 1-4
-
-
Jovanovic, M.1
Annexstein, F.2
Berman, K.3
-
60
-
-
33847164488
-
A social network caught in the web
-
L. Adamic, O. Buyukkokten, and E. Adar, "A social network caught in the web," First Monday, vol. 8, no. 6, 2003. [Online]. Available: http://ojs-prod-lib.cc.uic.edu/ojs/index.php/fm/article/view/1057
-
(2003)
First Monday
, vol.8
, Issue.6
-
-
Adamic, L.1
Buyukkokten, O.2
Adar, E.3
-
61
-
-
79960530721
-
Structure and evolution of online social networks
-
Springer
-
R. Kumar, J. Novak, and A. Tomkins, "Structure and evolution of online social networks," in Link Mining: Models, Algorithms, and Applications. Springer, 2010, pp. 337-357. [Online]. Available: http://link.springer.com/chapter/10.1007/978-1-4419-6515-8-13
-
(2010)
Link Mining: Models, Algorithms, and Applications
, pp. 337-357
-
-
Kumar, R.1
Novak, J.2
Tomkins, A.3
-
62
-
-
35348871999
-
Analysis of topological characteristics of huge online social networking services
-
DOI 10.1145/1242572.1242685, 16th International World Wide Web Conference, WWW2007
-
Y.-Y. Ahn, S. Han, H. Kwak, S. Moon, and H. Jeong, "Analysis of topological characteristics of huge online social networking services," in Proc. 16th int. conf. on World Wide Web. ACM, 2007, pp. 835-844. [Online]. Available: http://dl.acm.org/citation.cfm?id=1242685 (Pubitemid 47582313)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 835-844
-
-
Ahn, Y.-Y.1
Han, S.2
Kwak, H.3
Moon, S.4
Jeong, H.5
-
63
-
-
84874263116
-
Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships
-
Y Li, W. Chen, Y Wang, and Z.-L. Zhang, "Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships," in Proc. 6th ACM int. conf. on Web search and data mining. ACM, 2013, pp. 657-666. [Online]. Available: http://dl.acm.org/citation.cfm?id= 2433478
-
(2013)
Proc. 6th ACM Int. Conf. on Web Search and Data Mining. ACM
, pp. 657-666
-
-
Li, Y.1
Chen, W.2
Wang, Y.3
Zhang, Z.-L.4
-
64
-
-
84867844406
-
On modeling product advertisement in large-scale online social networks
-
2012
-
Y Li, B. Q. Zhao, and J. Lui, "On modeling product advertisement in large-scale online social networks," IEEE/ACM Trans. Netw. (TON), vol. 20, no. 5, pp. 1412-1425, 2012. [Online]. Available: http://dl.acm.org/citation.cfm? id=2428703
-
IEEE/ACM Trans. Netw. (TON)
, vol.20
, Issue.5
, pp. 1412-1425
-
-
Li, Y.1
Zhao, B.Q.2
Lui, J.3
-
66
-
-
0033297068
-
Trawling the web for emerging cyber-communities
-
R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins, "Trawling the web for emerging cyber-communities," Computer networks, vol. 31, no. 11, pp. 1481-1493, 1999. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S1389128699000407
-
(1999)
Computer Networks
, vol.31
, Issue.11
, pp. 1481-1493
-
-
Kumar, R.1
Raghavan, P.2
Rajagopalan, S.3
Tomkins, A.4
-
67
-
-
0038483826
-
Emergence of scaling in random networks
-
A.-L. Barabási and R. Albert, "Emergence of scaling in random networks," science, vol. 286, no. 5439, pp. 509-512, 1999. [Online]. Available: http://www.sciencemag.org/content/286/5439/509.short
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabási, A.-L.1
Albert, R.2
-
68
-
-
26844473415
-
Spatial-temporal modeling of malware propagation in networks
-
DOI 10.1109/TNN.2005.853425
-
Z. Chen and C. Ji, "Spatial-temporal modeling of malware propagation in networks," IEEE Trans. Neural Netw., vol. 16, no. 5, pp. 1291-1303, 2005. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber= 1510727 (Pubitemid 41444629)
-
(2005)
IEEE Transactions on Neural Networks
, vol.16
, Issue.5
, pp. 1291-1303
-
-
Chen, Z.1
Ji, C.2
-
69
-
-
84862814724
-
Locating defense positions for thwarting the propagation of topological worms
-
2012
-
S. Wen, W. Zhou, Y Wang, W Zhou, and Y Xiang, "Locating defense positions for thwarting the propagation of topological worms," IEEE Commun. Lett., vol. 16, no. 4, pp. 560-563, 2012. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=6168149
-
IEEE Commun. Lett.
, vol.16
, Issue.4
, pp. 560-563
-
-
Wen, S.1
Zhou, W.2
Wang, Y.3
Zhou, W.4
Xiang, Y.5
-
71
-
-
84880054920
-
Modeling propagation dynamics of social network worms
-
S. Wen, W Zhou, J. Zhang, Y Xiang, and W. Jia, "Modeling propagation dynamics of social network worms," IEEE Trans. Parallel Distrib. Syst., 2012. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber= 6287505
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
-
-
Wen, S.1
Zhou, W.2
Zhang, J.3
Xiang, Y.4
Jia, W.5
-
72
-
-
0000494582
-
Epidemic outbreaks in complex heterogeneous networks
-
DOI 10.1007/s10051-002-8996-y
-
Y Moreno, R. Pastor-Satorras, and A. Vespignani, "Epidemic outbreaks in complex heterogeneous networks," The European Physical Journal B-Condensed Matter and Complex Systems, vol. 26, no. 4, pp. 521-529, 2002. [Online]. Available: http://link. springer.com/article/10.1140/epjb/e20020122 (Pubitemid 135698247)
-
(2002)
European Physical Journal B
, vol.26
, Issue.4
, pp. 521-529
-
-
Moreno, Y.1
Pastor-Satorras, R.2
Vespignani, A.3
-
73
-
-
79955073428
-
Network immunization and virus propagation in email networks: Experimental evaluation and analysis
-
2011
-
C. Gao, J. Liu, and N. Zhong, "Network immunization and virus propagation in email networks: experimental evaluation and analysis," Knowledge and information systems, vol. 27, no. 2, pp. 253-279, 2011. [Online]. Available: http://link.springer.com/article/10.1007/s10115-010-0321-0
-
Knowledge and Information Systems
, vol.27
, Issue.2
, pp. 253-279
-
-
Gao, C.1
Liu, J.2
Zhong, N.3
-
74
-
-
70350397571
-
Sisr-a new model for epidemic spreading of electronic threats
-
Springer
-
B. Rozenberg, E. Gudes, and Y Elovici, "Sisr-a new model for epidemic spreading of electronic threats," in Information Security. Springer, 2009, pp. 242-249. [Online]. Available: http://link.springer.com/ chapter/10.1007/978-3-642-04474-8-20
-
(2009)
Information Security
, pp. 242-249
-
-
Rozenberg, B.1
Gudes, E.2
Elovici, Y.3
-
75
-
-
80052853005
-
Eliminating errors in worm propagation models
-
2011
-
Y Wang, S. Wen, S. Cesare, W. Zhou, and Y Xiang, "Eliminating errors in worm propagation models," IEEE Commun. Lett., vol. 15, no. 9, pp. 1022-1024, 2011. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all. jsp?arnumber=5958564
-
IEEE Commun. Lett.
, vol.15
, Issue.9
, pp. 1022-1024
-
-
Wang, Y.1
Wen, S.2
Cesare, S.3
Zhou, W.4
Xiang, Y.5
-
76
-
-
33750290186
-
Systematic topology analysis and generation using degree correlations
-
DOI 10.1145/1151659.1159930
-
P. Mahadevan, D. Krioukov, K. Fall, and A. Vahdat, "Systematic topology analysis and generation using degree correlations," ACM SIGCOMM Comput. Commun. Review, vol. 36, no. 4, pp. 135-146, 2006. [Online]. Available: http://dl.acm.org/citation.cfm?id=1159930 (Pubitemid 44623722)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 135-146
-
-
Mahadevan, P.1
Krioukov, D.2
Fall, K.3
Vahdat, A.4
-
77
-
-
34548312516
-
Information survival threshold in sensor and P2P networks
-
DOI 10.1109/INFCOM.2007.156, 4215738, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
D. Chakrabarti, J. Leskovec, C. Faloutsos, S. Madden, C. Guestrin, and M. Faloutsos, "Information survival threshold in sensor and p2p networks," in INFOCOM 2007. 26th IEEE Int. Conf. Comput. Commun. IEEE, 2007, pp. 1316-1324. [Online]. Available: http://ieeexplore.ieee. org/xpls/abs-all.jsp?arnumber=4215738 (Pubitemid 47334356)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 1316-1324
-
-
Chakrabarti, D.1
Leskovec, J.2
Faloutsos, C.3
Madden, S.4
Guestrin, C.5
Faloutsos, M.6
-
79
-
-
0035794256
-
Epidemic spreading in scale-free networks
-
R. Pastor-Satorras and A. Vespignani, "Epidemic spreading in scale-free networks," Physical review letters, vol. 86, no. 14, p. 3200, 2001. [Online]. Available: http://prl.aps.org/abstract/PRL/v86/i14/p3200-1
-
(2001)
Physical Review Letters
, vol.86
, Issue.14
, pp. 3200
-
-
Pastor-Satorras, R.1
Vespignani, A.2
-
80
-
-
0242411922
-
Epidemic incidence in correlated complex networks
-
Y Moreno, J. B. Gomez, and A. F. Pacheco, "Epidemic incidence in correlated complex networks," Physical Review E, vol. 68, no. 3, p. 035103, 2003. [Online]. Available: http://pre.aps.org/abstract/PRE/v68/i3/e035103
-
(2003)
Physical Review e
, vol.68
, Issue.3
, pp. 035103
-
-
Moreno, Y.1
Gomez, J.B.2
Pacheco, A.F.3
-
81
-
-
2442553392
-
-
The Cooperate Association for Internet Data Analysis
-
D. Moore, "Caida analysis of code-red," The Cooperate Association for Internet Data Analysis, 2001.
-
(2001)
Caida Analysis of Code-red
-
-
Moore, D.1
-
87
-
-
84949487368
-
On computer viral infection and the effect of immunization
-
C. Wang, J. C. Knight, and M. C. Elder, "On computer viral infection and the effect of immunization," in Computer Security Applications, 2000. ACSAC'00. 16th Annu. Conf. IEEE, 2000, pp. 246-256. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=898879
-
(2000)
Computer Security Applications, 2000. ACSAC'00. 16th Annu. Conf. IEEE
, pp. 246-256
-
-
Wang, C.1
Knight, J.C.2
Elder, M.C.3
-
88
-
-
0042526015
-
Measuring the size of the internet via importance sampling
-
S. Xing and B.-P. Paris, "Measuring the size of the internet via importance sampling," IEEE J. Sel. Areas Commun., vol. 21, no. 6, pp. 922-933, 2003. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp? arnumber=1217278
-
(2003)
IEEE J. Sel. Areas Commun.
, vol.21
, Issue.6
, pp. 922-933
-
-
Xing, S.1
Paris, B.-P.2
-
89
-
-
84891429894
-
Modeling botnet propagation using time zones
-
D. Dagon, C. C. Zou, and W. Lee, "Modeling botnet propagation using time zones." in NDSS, vol. 6, 2006, pp. 2-13.
-
(2006)
NDSS
, vol.6
, pp. 2-13
-
-
Dagon, D.1
Zou, C.C.2
Lee, W.3
-
90
-
-
84857094853
-
Detecting computer worms in the cloud
-
Springer
-
S. Biedermann and S. Katzenbeisser, "Detecting computer worms in the cloud," in Open Problems in Network Security. Springer, 2012, pp. 43-54. [Online]. Available: http://link.springer.com/chapter/10.1007/978-3-642-27585-2- 4
-
(2012)
Open Problems in Network Security
, pp. 43-54
-
-
Biedermann, S.1
Katzenbeisser, S.2
-
91
-
-
84944386303
-
When virtual is harder than real: Security challenges in virtual machine based computing environments
-
T. Garfinkel and M. Rosenblum, "When virtual is harder than real: Security challenges in virtual machine based computing environments." in HotOS, 2005.
-
(2005)
HotOS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
92
-
-
84872795827
-
Modeling and restraining mobile virus propagation
-
C. Gao and J. Liu, "Modeling and restraining mobile virus propagation," IEEE Trans. Mob. Compu, 2013. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=6138859
-
(2013)
IEEE Trans. Mob. Compu
-
-
Gao, C.1
Liu, J.2
-
93
-
-
27644462218
-
Epidemic spreading in real networks: An eigenvalue viewpoint
-
Proceedings - 22nd International Symposium on Reliable Distributed Systems, SRDS 2003
-
Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, "Epidemic spreading in real networks: An eigenvalue viewpoint," in Reliable Distributed Systems, 2003. Proc. 22nd Int. Symp. IEEE, 2003, pp. 25-34. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber= 1238052 (Pubitemid 41554102)
-
(2003)
Proceedings of the IEEE Symposium on Reliable Distributed Systems
, pp. 25-34
-
-
Wang, Y.1
Chakrabarti, D.2
Wang, C.3
Faloutsos, C.4
|