An improved traditional worm attack pattern
暂无分享,去创建一个
[1] David Watson,et al. The Blaster worm: then and now , 2005, IEEE Security & Privacy Magazine.
[2] Eduardo B. Fernández,et al. Attack Patterns: A New Forensic and Design Tool , 2007, IFIP Int. Conf. Digital Forensics.
[3] U. Flegel,et al. Detection of Intrusions and Malware & Vulnerability Assessment , 2004 .
[4] Y. Robiah,et al. New Multi-step Worm Attack Model , 2010, ArXiv.
[5] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[6] Andrew P. Moore,et al. Attack Modeling for Information Security and Survivability , 2001 .
[7] Gary McGraw,et al. Exploiting Software: How to Break Code , 2004 .
[8] Donald F. Towsley,et al. On the performance of Internet worm scanning strategies , 2006, Perform. Evaluation.