|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 47 occurrences of 37 keywords
|
|
|
Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
116 | David Moore 0001, Colleen Shannon, Kimberly C. Claffy |
Code-Red: a case study on the spread and victims of an internet worm. |
Internet Measurement Workshop |
2002 |
DBLP DOI BibTeX RDF |
Code-Red, Code-RedI, CodeRedI, CodeRedII, backscatter, security, worm, virus, epidemiology |
55 | Cliff Changchun Zou, Weibo Gong, Donald F. Towsley |
Code red worm propagation modeling and analysis. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
internet worm modeling, two-factor worm model, epidemic model |
40 | Erik D. Van der Spek, Pieter Wouters, Herre van Oostendorp |
Code Red: Triage. Or, COgnition-Based DEsign Rules Enhancing Decisionmaking TRaining in a Game Environment. |
VS-GAMES |
2009 |
DBLP DOI BibTeX RDF |
Code Red Triage, cognition in games, Serious games, instructional design, design guidelines, games-based learning, virtual training |
33 | Attila Ondi, Richard Ford |
Modeling malcode with Hephaestus: beyond simple spread. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
Hephaestus, code-red, virus-spread simulation |
33 | Carolyn P. Meinel |
Cybercrime Treaty Could Chill Research. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Cybercrime Treaty, Code Red, SQL Slammer worm, freedom of speech, worms, viruses |
33 | Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray |
Simulating realistic network worm traffic for worm warning system design and testing. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
code red, network modeling and simulation, slammer, worm detection systems, network security, worms |
22 | Adam Tornhill, Markus Borg |
Code Red: The Business Impact of Code Quality - A Quantitative Study of 39 Proprietary Production Codebases. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Adam Tornhill, Markus Borg |
Code red: the business impact of code quality - a quantitative study of 39 proprietary production codebases. |
TechDebt@ICSE |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Cliff Changchun Zou, Lixin Gao 0001, Weibo Gong, Donald F. Towsley |
Monitoring and early warning for internet worms. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
monitoring, early detection, worm propagation |
19 | Michael Liljenstam, Yougu Yuan, Brian J. Premore, David M. Nicol |
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations. |
MASCOTS |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Frieda McAlear, Ian Her Many Horses, Marie Casao, Rebecca Luebker |
Code Red: Culturally Revitalizing Computing Courses in Native American-Serving Schools. |
SIGCSE (2) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Jeritt G. Thayer, Jeffrey M. Miller, Daria F. Ferro, Robert W. Grundmeier, Joseph J. Zorc |
Code Red! A Pediatric Emergency Department is sort of on FHIR: The Practical Development of an EHR Embedded Interactive Data Visualization. |
AMIA |
2018 |
DBLP BibTeX RDF |
|
17 | Anna Kolesnichenko, Boudewijn R. Haverkort, Anne Remke, Pieter-Tjerk de Boer |
Fitting a code-red virus spread model: An account of putting theory into practice. |
DRCN |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Brian Quinn, William Cartwright |
Spatio-Temporal Analysis of GPS Tracks of CODE RED: MOBILE an Experimental Mobile Scenario and Location Based Training Exercise. |
GSR |
2012 |
DBLP BibTeX RDF |
|
17 | Erik D. Van der Spek |
COgnition-based DEsign Rules Enhancing Decisionmaking TRaining In A Game Environment (Code Red Triage): doctoral consortium paper. |
ECCE |
2010 |
DBLP DOI BibTeX RDF |
|
17 | John W. Lamp |
The Code Red Epidemic: a Case Study. |
J. Res. Pract. Inf. Technol. |
2001 |
DBLP BibTeX RDF |
|
17 | Hal Berghel |
The Code Red Worm. |
Commun. ACM |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Bill Hancock |
U.S. DoD Puts Up Blocks to Code Red. |
Comput. Secur. |
2001 |
DBLP BibTeX RDF |
|
11 | Xin Xu, Weihua Song, Vir V. Phoha |
Early detection and propagation mitigation of worm programs. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
|
11 | Lynn Choi, Yong Shin |
Enforcement of Architectural Safety Guards to Deter Malicious Code Attacks through Buffer Overflow Vulnerabilities. |
ARCS |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson |
On the adaptive real-time detection of fast-propagating network worms. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
Modeling and Automated Containment of Worms. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
(viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment) |
9 | Ram Dantu, João W. Cangussu, Sudeep Patwardhan |
Fast Worm Containment Using Feedback Control. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
general, network-level security and protection, Computer systems organization, computer systems organization, process control systems, special-purpose and application-based systems, communication/networking and information technology |
9 | Cliff Changchun Zou, Donald F. Towsley, Weibo Gong |
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
e-mail worm, worm modeling, simulation, Network security, epidemic model |
9 | Zesheng Chen, Chao Chen 0001, Chuanyi Ji |
Understanding Localized-Scanning Worms. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Fabio Ricciato |
Unwanted traffic in 3G networks. |
Comput. Commun. Rev. |
2006 |
DBLP DOI BibTeX RDF |
unwanted traffic, cellular networks, 3G |
9 | Jisheng Wang, David J. Miller 0001, George Kesidis |
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
9 | David M. Nicol |
The impact of stochastic variance on worm propagation and detection. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
modeling, detection, worms, variance |
9 | Jose Nazario |
Where the worms aren't. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
securty, worms, vulnerabilities, botnets, exploits |
9 | Fabio Ricciato, Philipp Svoboda, Eduard Hasenleithner, Wolfgang Fleischer |
On the Impact of Unwanted Traffic onto a 3G Network. |
SecPerU |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Cliff Changchun Zou, Weibo Gong, Donald F. Towsley, Lixin Gao 0001 |
The monitoring and early detection of internet worms. |
IEEE/ACM Trans. Netw. |
2005 |
DBLP DOI BibTeX RDF |
network monitoring, internet worm, computer network security, early detection |
9 | Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
Modeling and Automated Containment of Worms. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Zesheng Chen, Chuanyi Ji |
A self-learning worm using importance scanning. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
importance scanning, self-learning worm, modeling, worm propagation |
9 | Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai |
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Masato Uchida |
Modeling Viral Spread by Random Scanning and Its Relationship with the Epidemiological Model. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Sanjeev Kumar |
Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
ARP attack, Distributed Denial of Service Attacks, Computer Network Security |
9 | Ram Dantu, João W. Cangussu |
An Architecture for Network Security Using Feedback Control. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Thomas M. Chen, Jean-Marc Robert 0001 |
Worm Epidemics in High-Speed Networks. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
9 | John Zachary, John C. McEachen, Daniel W. Ettlich |
Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
Network assurance, real-time network monitoring, visualization, denial of service, network anomaly detection |
9 | Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung |
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning. |
IDEAL |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Changyeol Choi, Sungsoo Kim, We-Duke Cho |
Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Ram Dantu, João W. Cangussu, Arun Yelimeli |
Dynamic Control of Worm Propagation. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Shou-Chuan Lai, Wen-Chu Kuo, Mu-Cheng Hsie |
Defending against Internet Worm-like Infestations. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Paul Mullins 0001, Jim Wolfe, Michael Fry 0003, Erik L. Wynters, William C. Calhoun, Robert Montante, William Oblitey |
Panel on integrating security concepts into existing computer courses. |
SIGCSE |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang 0001 |
Observation and analysis of BGP behavior under stress. |
Internet Measurement Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #45 of 45 (100 per page; Change: )
|
|