|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 57 occurrences of 36 keywords
|
|
|
Results
Found 51 publication records. Showing 51 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
81 | David Moore 0001, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver |
Inside the Slammer Worm. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Slammer, Sapphire, attack, worm, infect |
61 | Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson |
Preliminary results using scale-down to explore worm dynamics. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
scaledown, slammer, simulation, modeling, worms |
53 | Fernando C. Colón Osorio, Zachi Klopman |
And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
53 | George Cybenko |
From the Editor: Sapphire/Slammer Redux. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
|
53 | Mohit Lad, Xiaoliang Zhao, Beichuan Zhang 0001, Daniel Massey, Lixia Zhang 0001 |
Analysis of BGP Update Surge during Slammer Worm Attack. |
IWDC |
2003 |
DBLP DOI BibTeX RDF |
|
49 | George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnovic |
A model of the spread of randomly scanning Internet worms that saturate access links. |
ACM Trans. Model. Comput. Simul. |
2008 |
DBLP DOI BibTeX RDF |
communications/computer networking, modeling, Internet worms, epidemiology |
49 | Fernando C. Colón Osorio, Zachi Klopman |
An initial analysis and presentation of malware exhibiting swarm-like behavior. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
swarm worms, swarm intelligence, malware, emergent behavior, internet worms |
49 | Lawrence Teo, Yu-An Sun, Gail-Joon Ahn |
Defeating Internet Attacks Using Risk Awareness and Active Honeypots. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
Japonica, Risk Awareness, Honeypots, Colored Petri Nets |
45 | Richard Ford |
Malcode Mysteries Revealed. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
self-replicating code, SQL.Slammer worm, worms, viruses |
45 | Carolyn P. Meinel |
Cybercrime Treaty Could Chill Research. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Cybercrime Treaty, Code Red, SQL Slammer worm, freedom of speech, worms, viruses |
45 | Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray |
Simulating realistic network worm traffic for worm warning system design and testing. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
code red, network modeling and simulation, slammer, worm detection systems, network security, worms |
36 | Jose Miguel Torres-Camara, Félix Escalona, Francisco Gomez-Donoso, Miguel Cazorla |
Map Slammer: Densifying Scattered KSLAM 3D Maps with Estimated Depth. |
ROBOT (2) |
2019 |
DBLP DOI BibTeX RDF |
|
36 | Raymond R. Panko |
Slammer: The First Blitz Worm. |
Commun. Assoc. Inf. Syst. |
2003 |
DBLP DOI BibTeX RDF |
|
33 | George Kesidis, Ihab Hamadeh, Soranun Jiwasurat |
Coupled Kermack-McKendrick Models for Randomly Scanning and Bandwidth-Saturating Internet Worms. |
QoS-IP |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver |
The top speed of flash worms. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
flash worm, simulation, modeling, worms |
33 | Cliff Changchun Zou, Lixin Gao 0001, Weibo Gong, Donald F. Towsley |
Monitoring and early warning for internet worms. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
monitoring, early detection, worm propagation |
16 | Thomas A. Gerace, Huseyin Cavusoglu |
The critical elements of the patch management process. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Yong-Jun You, Sung-Do Chi |
SIMVA: simulation-based network vulnerability analysis system. |
SpringSim |
2009 |
DBLP DOI BibTeX RDF |
SES/MB, vulnerability analysis system, simulation, network security, DEVS |
16 | James Newsome, Stephen McCamant, Dawn Song |
Measuring channel capacity to distinguish undue influence. |
PLAS |
2009 |
DBLP DOI BibTeX RDF |
model counting, quantitative information flow, channel capacity |
16 | Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
Modeling and Automated Containment of Worms. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
(viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment) |
16 | Jianning Mai, Lihua Yuan, Chen-Nee Chuah |
Detecting BGP anomalies with wavelet. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Attila Ondi, Richard Ford |
How good is good enough? Metrics for worm/anti-worm evaluation. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Min Cai, Kai Hwang 0001, Jianping Pan 0001, Christos Papadopoulos |
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
distributed aggregation tree, cardinality counting, Network security, distributed hash table, traffic measurement, Internet worms, signature generation, worm containment |
16 | Cliff Changchun Zou, Donald F. Towsley, Weibo Gong |
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
e-mail worm, worm modeling, simulation, Network security, epidemic model |
16 | Joseph A. Tucek, James Newsome, Shan Lu 0001, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou 0001, Dawn Xiaodong Song |
Sweeper: a lightweight end-to-end system for defending against fast worms. |
EuroSys |
2007 |
DBLP DOI BibTeX RDF |
VSEF, flash worm, dynamic instrumentation, antibody |
16 | Siming Lin, Xueqi Cheng, Jianming Lv |
A Visualized Parallel Network Simulator for Modeling Large-Scale Distributed Applications. |
PDCAT |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Jisheng Wang, David J. Miller 0001, George Kesidis |
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Soon Tee Teoh, Supranamaya Ranjan, Antonio Nucci, Chen-Nee Chuah |
BGP eye: a new visualization tool for real-time detection and analysis of BGP anomalies. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
visualization, routing, network security, BGP |
16 | Ihab Hamadeh, George Kesidis |
Toward a Framework for Forensic Analysis of Scanning Worms. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Hyundo Park, Heejo Lee |
Detecting Unknown Worms Using Randomness Check. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Guanling Chen, Robert S. Gray |
Simulating non-scanning worms on peer-to-peer networks. |
Infoscale |
2006 |
DBLP DOI BibTeX RDF |
|
16 | D. K. Lee, Sue B. Moon, Taesang Choi, Taesoo Jeong |
Forensic analysis of autonomous system reachability. |
MineNet |
2006 |
DBLP DOI BibTeX RDF |
AS reachability, address count, prefix count, security incidents, BGP |
16 | Mário Guimarães |
New challenges in teaching database security. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
data mining, DBMS, data warehouse, MLS, SQL injection, DBA |
16 | Jun Li 0001, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal |
An internet routing forensics framework for discovering rules of abnormal BGP events. |
Comput. Commun. Rev. |
2005 |
DBLP DOI BibTeX RDF |
abnormal BGP events, routing forensics, data mining, internet worms, blackout |
16 | Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
Modeling and Automated Containment of Worms. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Xin Xu, Weihua Song, Vir V. Phoha |
Early detection and propagation mitigation of worm programs. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Stefan Savage |
Scalable internet threat monitoring. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai |
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Ihab Hamadeh, Jason Hart, George Kesidis, Venkat Pothamsetty |
A Preliminary Simulation of the Effect of Scanning Worm Activity on Multicast. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Masato Uchida |
Modeling Viral Spread by Random Scanning and Its Relationship with the Epidemiological Model. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Guangzhi Qu, Salim Hariri, Mazin S. Yousif |
Multivariate statistical analysis for network attacks detection. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Wen-Yi Hsin, Shun-Chieh Lin, Shian-Shyong Tseng |
A Study of Alert-Based Collaborative Defense. |
ISPAN |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Peder Jungck, Simon S. Y. Shim |
Issues in High-Speed Internet Security. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Thomas M. Chen, Jean-Marc Robert 0001 |
Worm Epidemics in High-Speed Networks. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Archana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan |
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. |
NOMS (1) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Lynn Choi, Yong Shin |
Enforcement of Architectural Safety Guards to Deter Malicious Code Attacks through Buffer Overflow Vulnerabilities. |
ARCS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung |
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning. |
IDEAL |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Frank Castaneda, Emre Can Sezer, Jun Xu 0003 |
WORM vs. WORM: preliminary study of an active counter-attack mechanism. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
anti-worm, good worm, worm |
16 | Guangzhi Qu, Salim Hariri, Santosh Jangiti, Suhail Hussain, Seungchan Oh, Samer Fayssal, Mazin S. Yousif |
Abnormality Metrics to Detect and Protect against Network Attacks. |
ICPS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Shou-Chuan Lai, Wen-Chu Kuo, Mu-Cheng Hsie |
Defending against Internet Worm-like Infestations. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Michael Franz |
Safe Code - It's Not Just for Applets Anymore. |
JMLC |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #51 of 51 (100 per page; Change: )
|
|