1 |
David Moore, et al., 'The Spread of the Sapphire/ Slammer Worm.' available at http://www.caida.org/ publications/ papers/2003/sapphire/sapphire.html
|
2 |
Stefan Misslinger, 'Internet Worm Propagation,' Technische University Munchen, 2003
|
3 |
Kevin Fall, Kannan Varadhan, 'The ns Manual'
|
4 |
S. Staniford, V. Paxson, N. Weaver, 'How to 0wn the internetin your spare time,' Proceedings of the 11th USENIX Security Symposium (Security '02), 2002
|
5 |
'Analysis of the Sapphire Worm.' A joint effort of CAIDA, ICSI, Silicon Defense, UC Berkeley EECS and UC San Diego, 2003
|
6 |
주요국내외정보화현황(2004년)
|
7 |
'정보통신망 침해사고 조사결과,' 정보통신망 침해 사고 합동조사단, 2003. 2
|
8 |
C.Onwubiko et al., 'An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms,' Serbia & Montenegro, Belagrade, Nov, 2005
|
9 |
David Moore, et al., 'Inside the slammer worm,' IEEE Magazine of Security and Privacy, pp. 33-39, July/ Aug. 2003
|
10 |
정보통신부, 유.무선 통신서비스 가입자 현황 (2003년1월)
|
11 |
임재명, 윤종호, '슬래머 웜 전파과정 분석을 위 한 네트워크 모델링 및 시뮬레이터 구현', 통신 공학회지, 2007. Vol.32
과학기술학회마을
|
12 |
C.C.Zou, W.Gong, and D.Towsley, 'Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense,' WORM'03, Washington, 2003. ACM 1- 58113-785-0/03/0010, October 27, 2003
|
13 |
2003 한국인터넷백서, 한국전산원
|