-
1
-
-
85180416841
-
-
Forescout
-
Forescout. Wormscout. http://www.forescout.com/wormscout.html.
-
Wormscout
-
-
-
2
-
-
85180414754
-
-
Mirage Networks. http://www.miragenetworks.com.
-
Mirage Networks
-
-
-
3
-
-
85180402825
-
-
Optixpro trojan horse. http://securityresponse1.symantec.com/sarc/sarc.nsf/html/backdoor.optixpro.12.html.
-
Optixpro trojan horse
-
-
-
4
-
-
85180413790
-
-
accessed on October 24, 2004
-
Secure Shell Protocol (secsh). http://www.ietf.org/html.charters/secsh-charter.html; accessed on October 24, 2004.
-
Secure Shell Protocol (secsh)
-
-
-
6
-
-
85180410284
-
-
August was Worst Month Ever for Viruses, Worms. Technet News, September
-
August was Worst Month Ever for Viruses, Worms. Technet News, September 2003.
-
(2003)
-
-
-
8
-
-
0003833905
-
-
March accessed October 22, 2004
-
M. Crispin. Internet Message Access Protocol. March 2003. http://www.ietf.org/rfc/rfc3501.txt?number=3501; accessed October 22, 2004.
-
(2003)
Internet Message Access Protocol
-
-
Crispin, M.1
-
10
-
-
4544245846
-
-
Technical report, Carnegie Mellon Iniversity, CMU-CS-02-144, May
-
G. Granger, G. Economou, and S. Bielski. Self-securing network interfaces: What, why and how. Technical report, Carnegie Mellon Iniversity, CMU-CS-02-144, May 2002.
-
(2002)
Self-securing network interfaces: What, why and how
-
-
Granger, G.1
Economou, G.2
Bielski, S.3
-
13
-
-
0003871309
-
-
RFC, March accessed October 24, 2004
-
D. Mills. Network Time Protocol (Version 3). RFC, March 1992. http://www.ietf.org/rfcs/rfc1305.txt?number=1305; accessed October 24, 2004.
-
(1992)
Network Time Protocol (Version 3)
-
-
Mills, D.1
-
14
-
-
0742276097
-
Inside the slammer worm
-
July/August
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. In IEEE Magazine of Security and Privacy, pages 33-39, July/August 2003.
-
(2003)
IEEE Magazine of Security and Privacy
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
15
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
San Francisco, CA, April
-
D. Moore, C. Shannon, G. Voelker, and S. Savage. Internet quarantine: Requirements for containing self-propagating code. In Proceedings of the 2003 IEEE Infocom Conference, San Francisco, CA, April 2003.
-
(2003)
Proceedings of the 2003 IEEE Infocom Conference
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
17
-
-
0003817787
-
-
RFC, November accessed on October 24, 2004
-
D. Plummer. An Ethernet Address Resolution Protocol. RFC, November 1982. http://www.ietf.org/rfc/rfc0826.txt?number= 826; accessed on October 24, 2004.
-
(1982)
An Ethernet Address Resolution Protocol
-
-
Plummer, D.1
-
18
-
-
0004246059
-
-
RFC, October accessed October 24, 2004
-
J. Postel and J. Reynolds. File Transfer Protocol (FTP). RFC, October 1985. http://www.ietf.org/rfc/rfc959. txt?number=959; accessed October 24, 2004.
-
(1985)
File Transfer Protocol (FTP)
-
-
Postel, J.1
Reynolds, J.2
-
20
-
-
14844308379
-
Containment of scanning worms in enterprise networks
-
to appear
-
S. Staniford. Containment of scanning worms in enterprise networks. In Journal of Computer Science, to appear, 2004.
-
(2004)
Journal of Computer Science
-
-
Staniford, S.1
-
26
-
-
85180405035
-
-
Technical report, School of Computer Science, Carleton University, October
-
D. Whyte, E. Kranakis, and P. C. van Oorschot. Arpbased detection of scanning worms in an enterprise network. Technical report, School of Computer Science, Carleton University, October 2004.
-
(2004)
Arpbased detection of scanning worms in an enterprise network
-
-
Whyte, D.1
Kranakis, E.2
van Oorschot, P. C.3
|