On the self-similar nature of Ethernet traffic (extended version)
IEEE/ACM Transactions on Networking (TON)
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
Protection against Indirect Overflow Attacks on Pointers
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
A survey on automated dynamic malware-analysis techniques and tools
ACM Computing Surveys (CSUR)
Modeling and analysis of worm and killer-worm propagation using the divide-and-conquer strategy
ICA3PP'05 Proceedings of the 6th international conference on Algorithms and Architectures for Parallel Processing
Hi-index | 0.00 |