A study of malware in peer-to-peer networks
暂无分享,去创建一个
[1] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[2] Stefan Saroiu,et al. Measurement and Analysis of Spyware in a University Environment , 2004, NSDI.
[3] Stefan Saroiu,et al. Measurement and analysis of spywave in a university environment , 2004 .
[4] Steve Chien,et al. A First Look at Peer-to-Peer Worms: Threats and Defenses , 2005, IPTPS.
[5] Xiaoning Ding,et al. Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.
[6] Krishna P. Gummadi,et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.
[7] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[8] Wei Yu. Analyze the worm-based attack in large scale P2P networks , 2004, Eighth IEEE International Symposium on High Assurance Systems Engineering, 2004. Proceedings..
[9] Rakesh Kumar,et al. The FastTrack overlay: A measurement study , 2006, Comput. Networks.
[10] Stefan Savage,et al. Inside the Slammer Worm , 2003, IEEE Secur. Priv..
[11] Steven D. Gribble,et al. A Crawler-based Study of Spyware in the Web , 2006, NDSS.
[12] Hari Balakrishnan,et al. Malware prevalence in the KaZaA file-sharing network , 2006, IMC '06.
[13] Steven D. Gribble,et al. Cutting through the Confusion: A Measurement Study of Homograph Attacks , 2006, USENIX Annual Technical Conference, General Track.