References
- David Moore, et al., "The Spread of the Sapphire/Slammer Worm" available at http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
- 방사청, "육군전술지휘정보체계(ATCIS) 체계소개 및 운용가이드", 2006. 11. 30
- Kevin Fall, Kannan Varadhan, "The ns Manual", 2007
- 임재명, 윤종호, "슬래머 웜 전파과정 분석을 위 한 네트워크 모델링 및 시물레이터 구현", 한국통신학회논문지, 2007
- S. Staniford, V. Paxson and N. Weaver, "How to 0wn the Internet in Your Spare Time," Proceedings of the 11th USENIX Security Symposium, 2002
- C. C. Zou, W. Gong and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," In Proceedings of the 9th ACM conference on Computer and communications security, 2002
- J. O. Kephart and S. R. White, "Measuring and Modeling Computer Virus Prevalence," Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1993
- Darrell M. Kienzle, Matthew C. Elder, "Recent worms : a survey and trends", Proceedings of the 2003 ACM workshop on Rapid malcode, 2003
- D. Moore, C. Shannon, G. M. Voelker and S. Savage, "Internet Quarantine : Requirements for Containing Self-Propagating Code", INFOCOM, 2003
- 한국 전산원, "2006 국가 정보화 백서", p. 247, 2006
- S. Singh, C. Estan, G. Varghese, S. Savage, "The EarlyBird System for Real-time Detection of Unknown Worms", Technical Report CS2003-0761, UCSD, 2003