The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for slammer with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2003-2004 (19) 2005-2006 (20) 2007-2019 (12)
Publication types (Num. hits)
article(15) inproceedings(36)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 57 occurrences of 36 keywords

Results
Found 51 publication records. Showing 51 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
81David Moore 0001, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver Inside the Slammer Worm. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Slammer, Sapphire, attack, worm, infect
61Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson Preliminary results using scale-down to explore worm dynamics. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF scaledown, slammer, simulation, modeling, worms
53Fernando C. Colón Osorio, Zachi Klopman And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
53George Cybenko From the Editor: Sapphire/Slammer Redux. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
53Mohit Lad, Xiaoliang Zhao, Beichuan Zhang 0001, Daniel Massey, Lixia Zhang 0001 Analysis of BGP Update Surge during Slammer Worm Attack. Search on Bibsonomy IWDC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnovic A model of the spread of randomly scanning Internet worms that saturate access links. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF communications/computer networking, modeling, Internet worms, epidemiology
49Fernando C. Colón Osorio, Zachi Klopman An initial analysis and presentation of malware exhibiting swarm-like behavior. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF swarm worms, swarm intelligence, malware, emergent behavior, internet worms
49Lawrence Teo, Yu-An Sun, Gail-Joon Ahn Defeating Internet Attacks Using Risk Awareness and Active Honeypots. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Japonica, Risk Awareness, Honeypots, Colored Petri Nets
45Richard Ford Malcode Mysteries Revealed. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-replicating code, SQL.Slammer worm, worms, viruses
45Carolyn P. Meinel Cybercrime Treaty Could Chill Research. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cybercrime Treaty, Code Red, SQL Slammer worm, freedom of speech, worms, viruses
45Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray Simulating realistic network worm traffic for worm warning system design and testing. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF code red, network modeling and simulation, slammer, worm detection systems, network security, worms
36Jose Miguel Torres-Camara, Félix Escalona, Francisco Gomez-Donoso, Miguel Cazorla Map Slammer: Densifying Scattered KSLAM 3D Maps with Estimated Depth. Search on Bibsonomy ROBOT (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Raymond R. Panko Slammer: The First Blitz Worm. Search on Bibsonomy Commun. Assoc. Inf. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33George Kesidis, Ihab Hamadeh, Soranun Jiwasurat Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms. Search on Bibsonomy QoS-IP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver The top speed of flash worms. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF flash worm, simulation, modeling, worms
33Cliff Changchun Zou, Lixin Gao 0001, Weibo Gong, Donald F. Towsley Monitoring and early warning for internet worms. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF monitoring, early detection, worm propagation
16Thomas A. Gerace, Huseyin Cavusoglu The critical elements of the patch management process. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Yong-Jun You, Sung-Do Chi SIMVA: simulation-based network vulnerability analysis system. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SES/MB, vulnerability analysis system, simulation, network security, DEVS
16James Newsome, Stephen McCamant, Dawn Song Measuring channel capacity to distinguish undue influence. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF model counting, quantitative information flow, channel capacity
16Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi Modeling and Automated Containment of Worms. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment)
16Jianning Mai, Lihua Yuan, Chen-Nee Chuah Detecting BGP anomalies with wavelet. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Attila Ondi, Richard Ford How good is good enough? Metrics for worm/anti-worm evaluation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Min Cai, Kai Hwang 0001, Jianping Pan 0001, Christos Papadopoulos WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed aggregation tree, cardinality counting, Network security, distributed hash table, traffic measurement, Internet worms, signature generation, worm containment
16Cliff Changchun Zou, Donald F. Towsley, Weibo Gong Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-mail worm, worm modeling, simulation, Network security, epidemic model
16Joseph A. Tucek, James Newsome, Shan Lu 0001, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou 0001, Dawn Xiaodong Song Sweeper: a lightweight end-to-end system for defending against fast worms. Search on Bibsonomy EuroSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF VSEF, flash worm, dynamic instrumentation, antibody
16Siming Lin, Xueqi Cheng, Jianming Lv A Visualized Parallel Network Simulator for Modeling Large-Scale Distributed Applications. Search on Bibsonomy PDCAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Jisheng Wang, David J. Miller 0001, George Kesidis Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF visualization, routing, network security, BGP
16Ihab Hamadeh, George Kesidis Toward a Framework for Forensic Analysis of Scanning Worms. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Hyundo Park, Heejo Lee Detecting Unknown Worms Using Randomness Check. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Guanling Chen, Robert S. Gray Simulating non-scanning worms on peer-to-peer networks. Search on Bibsonomy Infoscale The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong Forensic analysis of autonomous system reachability. Search on Bibsonomy MineNet The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AS reachability, address count, prefix count, security incidents, BGP
16Mário Guimarães New challenges in teaching database security. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data mining, DBMS, data warehouse, MLS, SQL injection, DBA
16Jun Li 0001, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal An internet routing forensics framework for discovering rules of abnormal BGP events. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF abnormal BGP events, routing forensics, data mining, internet worms, blackout
16Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi Modeling and Automated Containment of Worms. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Xin Xu, Weihua Song, Vir V. Phoha Early detection and propagation mitigation of worm programs. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Stefan Savage Scalable internet threat monitoring. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Ihab Hamadeh, Jason Hart, George Kesidis, Venkat Pothamsetty A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Masato Uchida Modeling Viral Spread by Random Scanning and Its Relationship with the Epidemiological Model. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Guangzhi Qu, Salim Hariri, Mazin S. Yousif Multivariate statistical analysis for network attacks detection. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Wen-Yi Hsin, Shun-Chieh Lin, Shian-Shyong Tseng A Study of Alert-Based Collaborative Defense. Search on Bibsonomy ISPAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Peder Jungck, Simon S. Y. Shim Issues in High-Speed Internet Security. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Thomas M. Chen, Jean-Marc Robert 0001 Worm Epidemics in High-Speed Networks. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Archana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. Search on Bibsonomy NOMS (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Lynn Choi, Yong Shin Enforcement of Architectural Safety Guards to Deter Malicious Code Attacks through Buffer Overflow Vulnerabilities. Search on Bibsonomy ARCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning. Search on Bibsonomy IDEAL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Frank Castaneda, Emre Can Sezer, Jun Xu 0003 WORM vs. WORM: preliminary study of an active counter-attack mechanism. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anti-worm, good worm, worm
16Guangzhi Qu, Salim Hariri, Santosh Jangiti, Suhail Hussain, Seungchan Oh, Samer Fayssal, Mazin S. Yousif Abnormality Metrics to Detect and Protect against Network Attacks. Search on Bibsonomy ICPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Shou-Chuan Lai, Wen-Chu Kuo, Mu-Cheng Hsie Defending against Internet Worm-like Infestations. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Michael Franz Safe Code - It's Not Just for Applets Anymore. Search on Bibsonomy JMLC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #51 of 51 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license