A Study on Friends Model of a Computer Worm Defense System
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. The Internet Worm Incident , 1989, ESEC.
[2] Nicholas Weaver,et al. Potential Strategies for High Speed Active Worms : A Worst Case Analysis , 2002 .
[3] Jon A. Rochlis,et al. With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[4] Donn Seeley,et al. A Tour of the Worm , 1988 .
[5] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[6] Karl N. Levitt,et al. NetKuang - A Multi-Host Configuration Vulnerability Checker , 1996, USENIX Security Symposium.
[7] Karl N. Levitt,et al. Cooperative response strategies for large scale attack mitigation , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[8] Eugene H. Spafford,et al. The internet worm: crisis and aftermath , 1989 .
[9] Eugene H. Spafford,et al. The COPS Security Checker System , 1990, USENIX Summer.
[10] Eugene H. Spafford,et al. The internet worm program: an analysis , 1989, CCRV.
[11] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[12] John F. Shoch,et al. The “worm” programs—early experience with a distributed computation , 1982, CACM.
[13] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..