1 |
Kalyan S. Perumalla, Srikanth Sundaragopalan. "High-Fidelity Modeling of Computer Network Worms". The 20th Annual Computer Security Applications Conference(ACSAC'04), pp. 126- 135, 2004
|
2 |
Xiang Zeng, Rajive Bagrodia, Mario Gerla. "GloMoSim: A library for parallel simulation of large-scale wireless networks". The 12th Workshop on Parallel and Distributed Simulation, pp. 154-161, 1998
|
3 |
Benjamin Melamed, Shuo Pan, Yorai Wardi. "Hybrid discrete-continuous fluid-flow simulation". SPIE, Volume 4526, pp. 263-270, 2001
|
4 |
Cameron Kiddle, Rob Simmonds, Carey Williamson, Brian Unger. "Hybrid packet/fluid flow network simulation". The Seventeenth Workshop on Parallel and Distributed Simulation (PADS'03), pp. 143, 2003
|
5 |
T. Tidwell, R. Larson, K.Fitch, J.Hale, "Modeling Internet Attacks", The 2001 IEEE Workshop on Information Assurance and Security, pp. 54-59, 2001
|
6 |
Technical Report, "ANALYSIS: .ida "Code Red" Worm", eEye Digital Security, http://research.eeye.com:80/html/advisories/published/AL20010717.html, 2001
|
7 |
Technical Report, "ANALYSIS: CodeRed II Worm", http://research.eeye.com/html/advisories/ published/AL20010804.html, eEys Digital Security, 2001
|
8 |
Songjie Wei, Jelena Mirkovic, Martin Swany, "Distributed Worm Simulation with a Realistic Internet Model", The Workshop on Principles of Advanced and Distributed Simulation (PADS'05), pp. 71-79, 2005
|
9 |
Vishal Misra, Wei-Bo Gong, Don Towsley, "Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED", ACM SIGCOMM Computer Communication Review, Volume 30, Issue 4, pp. 151-160, 2000
DOI
|
10 |
NS-2 Web page. http://www.isi.edu/nsnam/ns/
|
11 |
Stuart Staniford, Vern Paxson, Nicholas Weaver. "How to Own the Internet in Your Spare Time". The 11th USENIX Security Symposium, pp. 149-167, 2002
|
12 |
Lee C.W., Im E.G., Chang B.H., Kim D.K., "Hierarchical state transition graph for internet attack scenarios", The International Conference on Information Networking 2003, 2003
|
13 |
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, "The Spread of the Sapphire/Slammer Worm", CAIDA Technical report, http://www.caida.org/publications/pap ers /2003/sapphire/, 2003
|
14 |
Yong Liu, Francesco Lo Presti, Vishal Misra. "Fluid Models and Solutions for Large-Scale IP Networks". ACM SIGMETRICS Performance Evaluation Review, Volume 31, Issue 1, pp. 91-101, 2003
DOI
|
15 |
Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray. "Simulating Realistic Network Worm Traffic for Worm Warning System Design and Testing". The ACM WORM 2003, pp.24-33
|
16 |
SSFNet Web page. http://www.ssfnet.org/
|
17 |
K. Ilgun, R. A. Kemmerer, P. A. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection System", The IEEE Transactions on Software Engineering, VOL. 21, No. 3, pp. 181-199, 1995
DOI
ScienceOn
|
18 |
Stuart Staniford, Vern Paxson, Nicholas Weaver. "How to Own the Internet in Your Spare Time". The 11th USENIX Security Symposium, pp. 149-167, 2002
|
19 |
김정식, 박진호, 조재익, 최경호, 임을규, "RCS 웜 시뮬레이션을 위한 Hybrid 모델링 방법", 한국정보보호학회논문지(1598-3986), 제17권 3호, pp. 43-53, 2007년 6월
과학기술학회마을
|
20 |
Richard Zurawski, MengChu Zhou, "Petri Nets and Industrial Applications: A Tutorial", The IEEE Transactions on Industrial Electronics, VOL. 41, No. 6, 1994
|
21 |
David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, Nicholas Weaver. "The Spread of the Sapphire/Slammer Worm". CAIDA Technical report, 2003
|
22 |
D.J.Daley, J.Gani. "Epidemic modelling : an introduction", Cambridge University Press, 1999
|
23 |
Giovanni Vigna, Steve T. Eckmann, Richard A. Kemmerer, "The STAT Tool Suite", The IEEE DARPA Information Survivability Conference and Exposition 2000, Vol. 2, pp. 46-55, 2000
|
24 |
David Moore, Colleen Shannon. "The Spread of the Code-Red Worm (CRvw)". CAIDA Analysis page. www.caida.org/analysis/security /code-red/coderedv2_analysis.xml
|
25 |
F. Bordeleau, J. P. Corriveau, B. Selic, "A scenario-based approach to hierarchical state machine design", The Third IEEE Symposium on Object-Oriented Real-Time Distributed Computing, pp. 78-85, 2000
|