1 |
/
[
CAIDA
] /
Analysis of the Sapphire Worm
|
2 |
Requirements for IPv4 routers
/
[
F. Baker
] /
RFC 1812
|
3 |
Demystifying the killer worm
/
[
H. Kim
] /
Techreport
|
4 |
The spread of the Sapphire/Slammer worm
/
[
D. Moore;V. Paxson;S. Savage;C. Shannon;S. Staniford;N. Weaver
] /
NANOG presentation
|
5 |
Internet Quarantine: Requirements for Containing Self-Propagating Code
/
[
D. Moore;C. Shannon;G. Voelker;S. Savage
] /
IEEE Infocom
|
6 |
How to Own the Internet in Your Spare Time
/
[
Stuart Staniford;Vern Paxson;Nicholas Weaver
] /
11th USENIX Security Symposium
|
7 |
The Complexities of Viral VB Scripts
/
[
S. Taylor
] /
European Institute for Computer Antivirus Research (EICAR) International Conference
|
8 |
/
[] /
VBS Worm Generator
|
9 |
Network Ingress Filtering:Defeating Denial of Service Attacks which employ IP Source Address Spoofing
/
[
P. Ferguson;D. Senie
] /
RFC 2827
|
10 |
/
[] /
Newsbyte
|
11 |
Epidemic algorithms for replicated data management
/
[
A. Demers(et al.)
] /
Sixth Symp. on Principles of Distributed Computing(Vancouver)
|
12 |
/
[
CAIDA
] /
CAIDA analysis of Code Red
|
13 |
/
[
IANA
] /
Internet Protocol Version 4 Address Space
|
14 |
On the Effectiveness of Martian Address Filtering and its Extensions
/
[
H. Kim;I. Kang
] /
IEEE Globecom
|
15 |
Internet Expansion, Refinement, and Churn
/
[
A. Broido;E.Nemeth;K. C. Claffy
] /
NANOG presentation
|
16 |
/
[] /
Red Hat Linux
|
17 |
/
[
K. Houle;J. Weaver
] /
Trends in Denial of Service Attack Technology
|
18 |
Fast Classification, Calibration, and Visualization of DoS and Scan Attacks for Backbone Links
/
[
H. Kim
] /
Technical Report
|
19 |
Predators:good will mobile codes combat against computer viruses
/
[
H. Toyoizumi;A. Kara
] /
New Security Paradigms Workshop
|
20 |
/
[
D. HexXer
] /
Code Green
|