Key technologies of new malicious code developments and defensive measures in communication networks

[1]  Jürgen Quittek,et al.  On Spam over Internet Telephony (SPIT) Prevention , 2008, IEEE Communications Magazine.

[2]  C. Burrell,et al.  Rapid detection of influenza A virus in clinical samples using an ion channel switch biosensor. , 2008, Biosensors & bioelectronics.

[3]  Min Yang,et al.  The Epidemic Threshold of a More General Epidemic Spreading Model for Network Viruses , 2007, Third International Conference on Natural Computation (ICNC 2007).

[4]  Jianhua Sun,et al.  A Virus Immunization Model Based on Communities in Large Scale Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[5]  John Case,et al.  Cautious virus detection in the extreme , 2007, PLAS '07.

[6]  Tao Li,et al.  An Immune-Based Model for Computer Virus Detection , 2005, CANS.

[7]  Greg Hoglund,et al.  Rootkits: Subverting the Windows Kernel , 2005 .

[8]  Sihan Qing,et al.  A survey and trends on Internet worms , 2005, Comput. Secur..

[9]  Hwang Shin-Jia,et al.  A proxy automatic signature scheme using a compiler in distributed systems for (unknown) virus detection , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).

[10]  Matthew C. Elder,et al.  Recent worms: a survey and trends , 2003, WORM '03.

[11]  Jau-Hwang Wang,et al.  Virus detection using data mining techinques , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..

[12]  Sotiris Ioannidis,et al.  Efficient packet monitoring for network management , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).

[13]  Roger A. Grimes,et al.  Malicious Mobile Code: Virus Protection for Windows , 2001 .

[14]  Stuart McClure,et al.  Hacking Exposed; Network Security Secrets and Solutions , 1999 .

[15]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[16]  Fred Cohen,et al.  Computational aspects of computer viruses , 1989, Comput. Secur..

[17]  Lance J. Hoffman,et al.  Smoking out the bad actors: Risk analysis in the age of the microcomputer , 1989, Comput. Secur..

[18]  Chengyu Song,et al.  Studying Malicious Websites and the Underground Economy on the Chinese Web , 2008, WEIS.

[19]  Zhang Bao,et al.  A Proactive-Defense Network Transmission System , 2005 .