Worm Meets Beehive
暂无分享,去创建一个
[1] Donald F. Towsley,et al. The monitoring and early detection of Internet worms , 2005, IEEE/ACM Transactions on Networking.
[2] Herbert W. Hethcote,et al. The Mathematics of Infectious Diseases , 2000, SIAM Rev..
[3] Yihong Du,et al. The Logistic Equation , 2006 .
[4] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[5] Yong Tang,et al. Slowing down Internet worms , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[6] H. Summerton. Who cares? , 2000, Nursing times.
[7] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[8] Vern Paxson,et al. Proceedings of the 13th USENIX Security Symposium , 2022 .
[9] Matthew M. Williamson,et al. Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.
[10] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[11] Helen J. Wang,et al. Shield: vulnerability-driven network filters for preventing known vulnerability exploits , 2004, SIGCOMM.
[12] Xuxian Jiang,et al. Collapsar: A VM-Based Architecture for Network Attack Detention Center , 2004, USENIX Security Symposium.
[13] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[14] SpitznerLance. The Honeynet Project , 2003, S&P 2003.
[15] Xuxian Jiang,et al. Protection mechanisms for application service hosting platforms , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[16] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[17] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[18] Jon Crowcroft,et al. Honeycomb , 2004, Comput. Commun. Rev..
[19] Vinod Yegneswaran,et al. On the Design and Use of Internet Sinks for Network Abuse Monitoring , 2004, RAID.