1 |
Kevin Fall, Kannan Varadhan, "The ns Manual", 2007
|
2 |
D. Moore, C. Shannon, G. M. Voelker and S. Savage, "Internet Quarantine : Requirements for Containing Self-Propagating Code", INFOCOM, 2003
|
3 |
한국 전산원, "2006 국가 정보화 백서", p. 247, 2006
|
4 |
임재명, 윤종호, "슬래머 웜 전파과정 분석을 위 한 네트워크 모델링 및 시물레이터 구현", 한국통신학회논문지, 2007
과학기술학회마을
|
5 |
David Moore, et al., "The Spread of the Sapphire/Slammer Worm" available at http://www.caida.org/publications/papers/2003/sapphire/sapphire.html
|
6 |
방사청, "육군전술지휘정보체계(ATCIS) 체계소개 및 운용가이드", 2006. 11. 30
|
7 |
S. Staniford, V. Paxson and N. Weaver, "How to 0wn the Internet in Your Spare Time," Proceedings of the 11th USENIX Security Symposium, 2002
|
8 |
S. Singh, C. Estan, G. Varghese, S. Savage, "The EarlyBird System for Real-time Detection of Unknown Worms", Technical Report CS2003-0761, UCSD, 2003
|
9 |
Darrell M. Kienzle, Matthew C. Elder, "Recent worms : a survey and trends", Proceedings of the 2003 ACM workshop on Rapid malcode, 2003
|
10 |
C. C. Zou, W. Gong and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," In Proceedings of the 9th ACM conference on Computer and communications security, 2002
|
11 |
J. O. Kephart and S. R. White, "Measuring and Modeling Computer Virus Prevalence," Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1993
|