All About Malwares (Malicious Codes)
暂无分享,去创建一个
Hossein Rouhani Zeidanloo | Payam Vahdani Amoli | Atefeh Tajpour | P. V. Amoli | Farzaneh Tabatabaei | A. Tajpour | F. Tabatabaei | Atefeh Tajpour
[1] Somesh Jha,et al. A semantics-based approach to malware detection , 2008, TOPL.
[2] Iván Arce,et al. An Analysis of the Slapper Worm , 2003, IEEE Secur. Priv..
[3] Sven Dietrich,et al. Analysis of the Storm and Nugache Trojans: P2P Is Here , 2007, login Usenix Mag..
[4] John F. Shoch,et al. The “worm” programs—early experience with a distributed computation , 1982, CACM.
[5] Vinod Yegneswaran,et al. An Inside Look at Botnets , 2007, Malware Detection.
[6] Peter J. Denning,et al. Computers under attack: intruders, worms, and viruses , 1991 .
[7] 方人. 计算机病毒(computer virus) , 1994 .
[8] Felix C. Freiling,et al. Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.
[9] Brian Rexroad,et al. Wide-Scale Botnet Detection and Characterization , 2007, HotBots.
[10] Aaron Hackworth,et al. Botnets as a Vehicle for Online Crimes , 2006 .
[11] Farnam Jahanian,et al. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.
[12] Vinod Yegneswaran,et al. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.
[13] Ken Chiang,et al. A Case Study of the Rustock Rootkit and Spam Bot , 2007, HotBots.
[14] Neil Daswani,et al. The Anatomy of Clickbot.A , 2007, HotBots.
[15] Nicolas Ianelli,et al. Botnets as a Vehicle for Online Crime , 2007 .
[16] Shi-Jinn Horng,et al. A Surveillance Spyware Detection System Based on Data Mining Methods , 2006, 2006 IEEE International Conference on Evolutionary Computation.
[17] Thomas Johnson,et al. Computer Security Incident Handling Guide , 2005 .
[18] Andreas Terzis,et al. A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.
[19] Eugene H. Spafford,et al. The Internet Worm Incident , 1989, ESEC.
[20] Guanhua Yan,et al. On the effectiveness of structural detection and defense against P2P-based botnets , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[21] T. Grance,et al. Computer Security Incident Handling Guide , 2004 .
[22] Jarkko Oikarinen,et al. Internet Relay Chat Protocol , 1993, RFC.
[23] Somesh Jha,et al. A semantics-based approach to malware detection , 2007, POPL '07.
[24] Guofei Gu,et al. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.
[25] Vesselin Bontchev. Methodology of computer anti-virus research , 1998 .