Notice of RetractionThe research and development of worm defense strategies
暂无分享,去创建一个
[1] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[2] Dawn Xiaodong Song,et al. Dynamic quarantine of Internet worms , 2004, International Conference on Dependable Systems and Networks, 2004.
[3] George Kesidis,et al. Evaluation of Collaborative Worm Containments on DETER Testbed , 2007, DETER.
[4] Karl N. Levitt,et al. A hybrid quarantine defense , 2004, WORM '04.
[5] Peng Liu,et al. Evaluation of collaborative worm containment on the DETER testbed , 2007 .
[6] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[7] Matthew M. Williamson,et al. Throttling viruses: restricting propagation to defeat malicious mobile code , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[8] Vern Paxson,et al. How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.
[9] David Moore,et al. Internet quarantine: requirements for containing self-propagating code , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[10] Angelos D. Keromytis,et al. A cooperative immunization system for an untrusting Internet , 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003..
[11] Phillip A. Porras,et al. Microscopic simulation of a group defense strategy , 2005, Workshop on Principles of Advanced and Distributed Simulation (PADS'05).
[12] Yong Tang,et al. Slowing down Internet worms , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[13] David M. Nicol,et al. Comparing passive and active worm defenses , 2004, First International Conference on the Quantitative Evaluation of Systems, 2004. QEST 2004. Proceedings..
[14] D. Song,et al. Taxonomy and Effectiveness of Worm Defense Strategies , 2005 .
[15] Karl N. Levitt,et al. Towards a framework for worm-defense evaluation , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[16] Stuart E. Schechter,et al. Fast Detection of Scanning Worm Infections , 2004, RAID.