Combinatorial Optimisation of Worm Propagation on an Unknown Network
暂无分享,去创建一个
Eric Filiol | Edouard Franc | Alessandro Gubbioli | Benoit Moquet | Guillaume Roblot | E. Filiol | G. Roblot | Edouard Franc | Alessandro Gubbioli | Benoit Moquet
[1] Nicholas Weaver,et al. Potential Strategies for High Speed Active Worms : A Worst Case Analysis , 2002 .
[2] R. K. Shyamasundar,et al. Introduction to algorithms , 1996 .
[3] Implementing Aggregation / Broadcast over Distributed Hash Tables , 2003 .
[4] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[5] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[6] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[7] Dan Boneh,et al. Proceedings of the 11th USENIX Security Symposium , 2002 .
[8] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.