Early Detection of Active Internet Worms
暂无分享,去创建一个
[1] Stefan Savage,et al. The Spread of the Sapphire/Slammer Worm , 2003 .
[2] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[3] Sergey Bratus,et al. The Kerf toolkit for intrusion analysis , 2004, IEEE Security & Privacy Magazine.
[4] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[5] Richard A. Brown,et al. Introduction to random signals and applied kalman filtering (3rd ed , 2012 .
[6] Eugene H. Spafford,et al. The internet worm: crisis and aftermath , 1989 .
[7] David M. Nicol,et al. A mixed abstraction level simulation model of large-scale Internet worm infestations , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.
[8] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[9] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[10] Donald F. Towsley,et al. Monitoring and early warning for internet worms , 2003, CCS '03.
[11] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[12] Eugene H. Spafford,et al. Crisis and aftermath , 1989, Commun. ACM.
[13] Donald Reid. An algorithm for tracking multiple targets , 1978 .
[14] Jon A. Rochlis,et al. With microscope and tweezers: an analysis of the Internet virus of November 1988 , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[15] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[16] Salvatore J. Stolfo,et al. Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.
[17] Jeffrey O. Kephart,et al. Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[18] Hakim Weatherspoon,et al. Netbait: a Distributed Worm Detection Service , 2003 .