Mapping the Most Significant Computer Hacking Events to a Temporal Computer Attack Model
暂无分享,去创建一个
[1] M. E. Kabay,et al. Computer Security Handbook , 2002 .
[2] Gus W Weiss,et al. The Farewell Dossier , 1996 .
[3] I Burke,et al. Classifying network attack scenarios using an ontology , 2012 .
[4] Stephen D. Wolthusen,et al. Critical Infrastructure Protection , 2012, Lecture Notes in Computer Science.
[5] Thomas M. Chen,et al. Worm epidemics in high-speed networks , 2004, Computer.
[6] Matt Bishop,et al. Analysis of the ILOVEYOU Worm , 2000 .
[7] Philippe Beaucamps,et al. Advanced Metamorphic Techniques in Computer Viruses , 2007 .
[8] S. R. Subramanya,et al. Computer viruses , 2001 .
[9] Rain Ottis,et al. Estonia after the 2007 Cyber Attacks: Legal, Strategic and Organisational Changes in Cyber Security , 2011, Int. J. Cyber Warf. Terror..
[10] Hilarie K. Orman,et al. The Morris Worm: A Fifteen-Year Perspective , 2003, IEEE Secur. Priv..
[11] Bernhard Plattner,et al. Host behaviour based early detection of worm outbreaks in Internet backbones , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[12] Deirdre K. Mulligan,et al. The Magnificence of the Disaster: Reconstructing the Sony Bmg Rootkit Incident , 2008 .
[13] Priti Desai. Towards an Undetectable Computer Virus , 2008 .
[14] Lee Garber. Melissa Virus Creates a New Type of Threat , 1999, Computer.
[15] Peter Lonsdale,et al. Mobile technologies and learning , 2004 .
[16] Vishrut Sharma. An Analytical Survey of Recent Worm Attacks , 2011 .
[17] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[18] Karen Mercedes Goertzel. Software Survivability: Where Safety and Security Converge , 2009 .
[19] Donald F. Towsley,et al. Code red worm propagation modeling and analysis , 2002, CCS '02.
[20] S. Cass. Anatomy of malice [computer viruses] , 2001 .
[21] Robin A. Gandhi,et al. Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political , 2011, IEEE Technology and Society Magazine.
[22] Piotr Bania. Evading network-level emulation , 2009, ArXiv.