1 |
S. Staniford, V. Paxon and N. Weaver, 'How to Own the Internet in Your Spare Time', 11th Usenix Security Symposium, San Francisco, August, 2002
|
2 |
Webopedia, 'Virus', Webopedia URL:http://www.webopedia.com/TERM/v/virus.html, Feb. 2005
|
3 |
Cliff Changchun Zou, Don Towsley, Weibo Gong, On the Performance of Internet Worm Scanning Strategies, Tech. Report: TR-03-CSE-07, Department of Computer Science, Univ. of Massachusetts, Amherst, USA.
|
4 |
David J. Albanese, Michael J. Wiacek, Christopher M. Salter, and jeffrey A. Six, The Case for Using Layered Defenses to Stop Worms, Report #C43-002R-2004, Version 1.0, June 18, 2004, National Security Agency
|
5 |
httpt//www.tracking-hackers.com
|
6 |
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, 'A Taxonomy of Computer Wormsn', ACM WORM'03, Washington DC, USA, Oct. 2003
|
7 |
J. C. Frauenthal, Mathematical Modeling in Epidemiology, Springer-Verlag, New York, 1980
|
8 |
J. Y. Jung, S. Schechter, and Arthur W. Berger, 'Fast Detection of Scanning Worm Infections', RAID 2004, Sophia Antipolis, France, Sep. 2004
|
9 |
Xuan Chen and John Heidemann, Detecting Early Worm Propagation through Packet Matching, Technical Report ISI-TR-2004-585, 2004
|
10 |
J. O. Kephart, D. M. Chess and S. R. White, 'Computers and Epidemiology', IEEE Spectrum, 1993
|
11 |
J. O. Kephart and S. R. White, 'Directed-graph Epidemiological Models of Computer Viruses', Proc. of the IEEE Symposium on Security and Privacy, pp343-359, 1991
|
12 |
Arrigo Triulzi, 'Intrusion Detection Systems and IPv6', SPI2003
|
13 |
C. C. Zou, D. Towsley, W. Gong, and S. Cai, Routing Worm: a Fast, Selective Attack Worm based on IP Address Information, Univ. of Massachusetts Tech. Report TRCSE-03-06, Nov. 2003
|
14 |
Webopedia, 'Worm', Webopedia URL:http://www.webopedia.com/TERM/W/worm.html, Feb. 2005
|
15 |
Thomas M. Chen, Jean-marc Robert, 'Worm Epidemics in High-Speed Networks', IEEE Computer, pp48-53, June 2004
|
16 |
Z. Chen, L, Gao and K. Kwiat, 'Modeling the Spread of Active Worms', In Proc, of IEEE Infocom, 2003
|
17 |
Cliff Changchun Zou, Weibo Gong, Don Towsley, 'Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense', ACM WORMS' 03, Washington DC, USA, Oct. 2003
|
18 |
Glenn Gebhart, Worm Propagation and Countermeasures, SANS Institute, 2004
|
19 |
N. Weaver. Warhol Worms: The Potential for Very Fast Internet Plagues, http://www.cs.berkeley.edu/~nweaver/warhol.html
|
20 |
Cliff Changchun Zou, Weibo Gong, Don Towsley, 'Code Red Worm Propagation Modeling and Analysis', 9th ACM Conference on Computer and Communication Security (CCS' 02), Washington, DC, USA, Nov. 2002
|
21 |
Cliff Changchun Zou, Don Towsley, Weibo Gong, On the Performance of Internet Worm Scanning Strategies, Tech. Report: TR-03-CSE-07, Department of Computer Science, Univ. of Massachusetts, Amherst, USA
|
22 |
Jose Nazario, Defense and Detection Strategies against Internet Worms, Artech House, 2004
|
23 |
D. M. Kienzie and M. C. Elder, 'Recent Worms: A Survey and Trends'
|
24 |
Jing Yang, 'Fast Worm Propagation in IPv6 Networks'
|