Network-worm-control technology based on the front buffer two-stage leaky bucket algorithm
暂无分享,去创建一个
[1] Karl N. Levitt,et al. The Design of GrIDS: A Graph-Based Intrusion Detection System , 2007 .
[2] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[3] John W. Lockwood,et al. Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware , 2003 .
[4] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[5] Wang Fen-fen. Detection of Internet Worm , 2009 .
[6] Robert K. Cunningham,et al. Large Scale Malicious Code: A Research Agenda , 2003 .
[7] Liu Si-wei. Approach for Early Detecting Internet Worm Based on Kalman Filtering , 2009 .
[8] Matthew M. Williamson,et al. Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.