1 |
S. Staniford, V. Paxson and N. Weaver, 'How to Own the Internet in Your Spare Time,' Proceedings of the 11 th USENIX Security Symposium, 2002.
|
2 |
D. Moore, C. Shannon, G. M. Voelker and S. Savage, 'Internet Quarantine : Requirements for Containing Self-Propagating Code', INFOCOM, 2003
|
3 |
한국 전산원, '2006 국가 정보화 백서', p.247, 2006
|
4 |
S. Singh, C. Estan, G. Varghese, S. Savage, 'The EarlyBird System for Real-time Detection of Unknown Worms', Technical Report CS2003-0761, UCSD, 2003
|
5 |
C. C. Zou, W. Gong and D. Towsley, 'Code Red Worm Propagation Modeling and Analysis,' In Proceedings of the 9th ACM conference on Computer and communications security, 2002
|
6 |
J.O. Kephart and S.R. White, 'Measuring and Modeling Computer Virus Prevalence,' Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, Oakland, CA,May 1993
|
7 |
David Moore, et al., 'The Spread of the Sapphire / Slammer Worm' available at http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
|
8 |
임재명, 윤종호, '슬래머 웜 전파과정 분석을 위한 네트워크 모델링 및 시물레이터 구현', 한국통신학회논문지, 2007
과학기술학회마을
|
9 |
방사청, '육군전술지휘정보체계(ATCIS) 체계소개 및 운용가이드', 2006. 11.30
|
10 |
Darrell M. Kienzle, Matthew C. Elder, 'Recent worms : a survey and trends', Proceedings of the 2003 ACM workshop on Rapid malcode, 2003
|
11 |
Kevin Fall, Kannan Varadhan, 'The ns Manual', 2007.
|