1 |
Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley, "Monitoring and Early Warning for Internet Worms," 10th ACM Conference on Computer and Communication Security (CCS'03), pp.190-199, 2003.
|
2 |
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver. "Inside the Slammer Worm". IEEE Magazine on Security and Privacy, Vol.1, No.4, pp.33-39, 2003.
DOI
ScienceOn
|
3 |
An Analysis of Conficker's Logic and Rendezvous Points, http://mtc.sri.com/Conficker/
|
4 |
Phillip Porras and Hassen Sa¨ıdi and Vinod Yegneswaran, "A Multi-perspective Analysis of the Storm (Peacomm) Worm", CSL Technical Note, SRI International, 2007.
|
5 |
Akamai Technologies, "The State of the Internet, 1Q 2009", 2009.
|
6 |
Pele Li, Mehdi Salour and Xiao Su, "A Survey of Internet Worm Detection and Containment", IEEE Communications Surveys & Tutorials, 1st Quarter 2008, Vol.10, No.1, pp.20-35, 2008.
DOI
|
7 |
"The Spread of the Sapphire/Slammer Worm," http://www.caida.org/outreach/papers/2003/sapphire/sapphire.html
|
8 |
"인터넷침해사고 동향 및 분석월보", 한국정보 보호진흥원, 2008.
|
9 |
Cliff Changchun Zou, Don Towsley, Weibo Gong, "On the Performance of Internet Worm Scanning Strategies," Elsevier Journal of Performance Evaluation, Vol.63, No.7, pp.700-723, 2006.
DOI
ScienceOn
|
10 |
Cliff Changchun Zou, Weibo Gong, Don Towsley, "Code Red Worm Propagation Modeling and Analysis," 9th ACM Conference on Computer and Communication Security (CCS'02), pp.138-147, 2002.
|
11 |
신원, "IPv6 환경에서 인터넷 웜 확산 방식 연구", Telecommunications Review, 제19권 1호, pp.118-128, 2009.
|