References
- Analysis of the Sapphire Worm CAIDA
- NANOG presentation The spread of the Sapphire/Slammer worm D. Moore;V. Paxson;S. Savage;C. Shannon;S. Staniford;N. Weaver
- 11th USENIX Security Symposium How to Own the Internet in Your Spare Time Stuart Staniford;Vern Paxson;Nicholas Weaver
- IEEE Infocom Internet Quarantine: Requirements for Containing Self-Propagating Code D. Moore;C. Shannon;G. Voelker;S. Savage
- European Institute for Computer Antivirus Research (EICAR) International Conference The Complexities of Viral VB Scripts S. Taylor
- VBS Worm Generator
- CAIDA analysis of Code Red CAIDA
- RFC 1812 Requirements for IPv4 routers F. Baker
- Internet Protocol Version 4 Address Space IANA
- IEEE Globecom On the Effectiveness of Martian Address Filtering and its Extensions H. Kim;I. Kang
- NANOG presentation Internet Expansion, Refinement, and Churn A. Broido;E.Nemeth;K. C. Claffy
- Red Hat Linux
- RFC 2827 Network Ingress Filtering:Defeating Denial of Service Attacks which employ IP Source Address Spoofing P. Ferguson;D. Senie
- Trends in Denial of Service Attack Technology K. Houle;J. Weaver
- Technical Report Fast Classification, Calibration, and Visualization of DoS and Scan Attacks for Backbone Links H. Kim
- New Security Paradigms Workshop Predators:good will mobile codes combat against computer viruses H. Toyoizumi;A. Kara
- Newsbyte
- Code Green D. HexXer
- Sixth Symp. on Principles of Distributed Computing(Vancouver) Epidemic algorithms for replicated data management A. Demers(et al.)
- Techreport Demystifying the killer worm H. Kim