Observing Internet Worm and Virus Attacks with a Small Network Telescope
暂无分享,去创建一个
Jeremy T. Bradley | William J. Knottenbelt | Uli Harder | Matt W. Johnson | W. Knottenbelt | U. Harder | J. Bradley | Matt W. Johnson
[1] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[2] Walter Willinger,et al. On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.
[3] William H. Press,et al. Numerical Recipes in C, 2nd Edition , 1992 .
[4] George Kingsley Zipf,et al. Human behavior and the principle of least effort , 1949 .
[5] Stefan Savage,et al. Network Telescopes: Technical Report , 2004 .
[6] H. Stanley,et al. Quantification of scaling exponents and crossover phenomena in nonstationary heartbeat time series. , 1995, Chaos.
[7] C. Peng,et al. Mosaic organization of DNA nucleotides. , 1994, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[8] David M. Nicol,et al. Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure , 2003, Computer Performance Evaluation / TOOLS.
[9] D. Haar,et al. Statistical Physics , 1971, Nature.
[10] D. T. Kaplan,et al. A comparison of estimators for noise , 1998 .
[11] Vinod Yegneswaran,et al. Characteristics of internet background radiation , 2004, IMC '04.
[12] Sándor Molnár,et al. On the propagation of long-range dependence in the Internet , 2000, SIGCOMM.
[13] William H. Press,et al. Numerical recipes in C (2nd ed.): the art of scientific computing , 1992 .
[14] Vinod Yegneswaran,et al. On the Design and Use of Internet Sinks for Network Abuse Monitoring , 2004, RAID.
[15] The SASSER Event: History and Implications , 2004 .
[16] Maya Paczuski,et al. Correlated dynamics in human printing behavior , 2004, ArXiv.
[17] William H. Press,et al. Numerical recipes in C , 2002 .
[18] Peter G. Harrison,et al. Measurement and modelling of self-similar traffic in computer networks , 2004 .
[19] S. Havlin,et al. Detecting long-range correlations with detrended fluctuation analysis , 2001, cond-mat/0102214.
[20] Hyogon Kim,et al. Real-time visualization of network attacks on high-speed links , 2004, IEEE Network.
[21] Van-Hau Pham,et al. Understanding threats: a prerequisite to enhance survivability of computing systems , 2008, Int. J. Crit. Infrastructures.