Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
Dynamic and risk-aware network access management
Proceedings of the eighth ACM symposium on Access control models and technologies
Internet intrusions: global characteristics and prevalence
SIGMETRICS '03 Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
A Network Worm Vaccine Architecture
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
IEEE Security and Privacy
Why the Future Belongs to the Quants
IEEE Security and Privacy
Quality of service and denial of service
RIPQoS '03 Proceedings of the ACM SIGCOMM workshop on Revisiting IP QoS: What have we learned, why do we care?
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Preserving peer replicas by rate-limited sampled voting
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Monitoring and early warning for internet worms
Proceedings of the 10th ACM conference on Computer and communications security
Recent worms: a survey and trends
Proceedings of the 2003 ACM workshop on Rapid malcode
Proceedings of the 2003 ACM workshop on Rapid malcode
Access for sale: a new class of worm
Proceedings of the 2003 ACM workshop on Rapid malcode
Simulating realistic network worm traffic for worm warning system design and testing
Proceedings of the 2003 ACM workshop on Rapid malcode
Experiences with worm propagation simulations
Proceedings of the 2003 ACM workshop on Rapid malcode
Proceedings of the 2003 ACM workshop on Rapid malcode
Worm propagation modeling and analysis under dynamic quarantine defense
Proceedings of the 2003 ACM workshop on Rapid malcode
Epidemic profiles and defense of scale-free networks
Proceedings of the 2003 ACM workshop on Rapid malcode
Defeating Internet Attacks Using Risk Awareness and Active Honeypots
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Resilient infrastructure for network security
Complexity - Special issue: Resilient and adaptive defense of computing networks
Autonomic defense: thwarting automated attacks via real-time feedback control
Complexity - Special issue: Resilient and adaptive defense of computing networks
Security applications of peer-to-peer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Shield: vulnerability-driven network filters for preventing known vulnerability exploits
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Loose source routing as a mechanism for traffic policies
Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
IEEE Security and Privacy
Analyzing internet voting security
Communications of the ACM - Voting systems
Characteristics of internet background radiation
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
On scalable attack detection in the network
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Reversible sketches for efficient and accurate change detection over network data streams
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
PortVis: a tool for port-based detection of security events
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Scalable visualization of propagating internet phenomena
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Proceedings of the 2004 ACM workshop on Rapid malcode
ACT: attachment chain tracing scheme for email virus detection and control
Proceedings of the 2004 ACM workshop on Rapid malcode
Review and analysis of synthetic diversity for breaking monocultures
Proceedings of the 2004 ACM workshop on Rapid malcode
Proceedings of the 2004 ACM workshop on Rapid malcode
A behavioral approach to worm detection
Proceedings of the 2004 ACM workshop on Rapid malcode
Preliminary results using scale-down to explore worm dynamics
Proceedings of the 2004 ACM workshop on Rapid malcode
WORM vs. WORM: preliminary study of an active counter-attack mechanism
Proceedings of the 2004 ACM workshop on Rapid malcode
Operational experiences with high-volume network intrusion detection
Proceedings of the 11th ACM conference on Computer and communications security
On the effectiveness of address-space randomization
Proceedings of the 11th ACM conference on Computer and communications security
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Minos: Control Data Attack Prevention Orthogonal to Memory Model
Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture
Worm propagation modeling and analysis based on quarantine
InfoSecu '04 Proceedings of the 3rd international conference on Information security
The LOCKSS peer-to-peer digital preservation system
ACM Transactions on Computer Systems (TOCS)
Who Moved My Data? A Backup Tracking System for Dynamic Workstation Environments
LISA '04 Proceedings of the 18th USENIX conference on System administration
Modeling Viral Spread by Random Scanning and Its Relationship with the Epidemiological Model
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Does Trusted Computing Remedy Computer Security Problems?
IEEE Security and Privacy
Worm Propagation and Generic Attacks
IEEE Security and Privacy
Distributed Worm Simulation with a Realistic Internet Model
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Mobile Contagion: Simulation of Infection and Defense
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Comparative Study between Analytical Models and Packet-Level Worm Simulations
Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation
Toward an Automated Attack Model for Red Teams
IEEE Security and Privacy
The Blaster Worm: Then and Now
IEEE Security and Privacy
Vigilante: end-to-end containment of internet worms
Proceedings of the twentieth ACM symposium on Operating systems principles
Rx: treating bugs as allergies---a safe method to survive software failures
Proceedings of the twentieth ACM symposium on Operating systems principles
Monitoring the Macroscopic Effect of DDoS Flooding Attacks
IEEE Transactions on Dependable and Secure Computing
Misbehaving TCP receivers can cause internet-wide congestion collapse
Proceedings of the 12th ACM conference on Computer and communications security
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security
The monitoring and early detection of internet worms
IEEE/ACM Transactions on Networking (TON)
On instant messaging worms, analysis and countermeasures
Proceedings of the 2005 ACM workshop on Rapid malcode
Proceedings of the 2005 ACM workshop on Rapid malcode
A self-learning worm using importance scanning
Proceedings of the 2005 ACM workshop on Rapid malcode
Defending against hitlist worms using network address space randomization
Proceedings of the 2005 ACM workshop on Rapid malcode
Worm evolution tracking via timing analysis
Proceedings of the 2005 ACM workshop on Rapid malcode
The limits of global scanning worm detectors in the presence of background noise
Proceedings of the 2005 ACM workshop on Rapid malcode
Host-based detection of worms through peer-to-peer cooperation
Proceedings of the 2005 ACM workshop on Rapid malcode
The detection of RCS worm epidemics
Proceedings of the 2005 ACM workshop on Rapid malcode
Countering Network Worms Through Automatic Patch Generation
IEEE Security and Privacy
IEEE Transactions on Dependable and Secure Computing
Design space and analysis of worm defense strategies
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Community-oriented network measurement infrastructure (CONMI) workshop report
ACM SIGCOMM Computer Communication Review
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Mitigating denial of service attacks: a tutorial
Journal of Computer Security
Internet instability and disturbance: goal or menace?
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Simulating non-scanning worms on peer-to-peer networks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
On the performance of internet worm scanning strategies
Performance Evaluation
Realistic and responsive network traffic generation
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Understanding the network-level behavior of spammers
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Proactive security for mobile messaging networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Towards scalable and robust distributed intrusion alert fusion with good load balancing
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
Exploit hijacking: side effects of smart defenses
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
PRIMED: community-of-interest-based DDoS mitigation
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
Temporal search: detecting hidden malware timebombs with virtual machines
Proceedings of the 12th international conference on Architectural support for programming languages and operating systems
A preliminary investigation of worm infections in a bluetooth environment
Proceedings of the 4th ACM workshop on Recurring malcode
Proceedings of the 4th ACM workshop on Recurring malcode
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms
Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems
Minos: Architectural support for protecting control data
ACM Transactions on Architecture and Code Optimization (TACO)
A realistic simulation of internet-scale events
valuetools '06 Proceedings of the 1st international conference on Performance evaluation methodolgies and tools
Peer to peer networks for defense against internet worms
Interperf '06 Proceedings from the 2006 workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications sytems
How to lease the internet in your spare time
ACM SIGCOMM Computer Communication Review
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Worm damage minimization in enterprise networks
International Journal of Human-Computer Studies
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
Computer Networks: The International Journal of Computer and Telecommunications Networking
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Modeling malcode with Hephaestus: beyond simple spread
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
WitMeMo '06 Proceedings of the second international workshop on Wireless traffic measurements and modeling
Effective worm detection for various scan techniques
Journal of Computer Security
On scalable attack detection in the network
IEEE/ACM Transactions on Networking (TON)
Performance modeling of epidemic routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Active internet traffic filtering: real-time response to denial-of-service attacks
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
BINDER: an extrusion-based break-in detector for personal computers
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Modeling and Simulations of TCP MANET Worms
Proceedings of the 21st International Workshop on Principles of Advanced and Distributed Simulation
An automated binary security update system for FreeBSD
BSDC'03 Proceedings of the BSD Conference 2003 on BSD Conference
Exploiting underlying structure for detailed reconstruction of an internet-scale event
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Measurement and analysis of spywave in a university environment
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Glacier: highly durable, decentralized storage despite massive correlated failures
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
The collective: a cache-based system management architecture
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Analyzing cooperative containment of fast scanning worms
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Static analysis of executables to detect malicious patterns
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Very fast containment of scanning worms
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Privacy-preserving sharing and correction of security alerts
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Autograph: toward automated, distributed worm signature detection
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
An architecture for generating semantics-aware signatures
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Detecting targeted attacks using shadow honeypots
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Mapping internet sensors with probe response attacks
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
On the effectiveness of distributed worm monitoring
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Studying Bluetooth Malware Propagation: The BlueBag Project
IEEE Security and Privacy
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms
IEEE Transactions on Dependable and Secure Computing
Fast Worm Containment Using Feedback Control
IEEE Transactions on Dependable and Secure Computing
Defending against hitlist worms using network address space randomization
Computer Networks: The International Journal of Computer and Telecommunications Networking
An Automated Signature-Based Approach against Polymorphic Internet Worms
IEEE Transactions on Parallel and Distributed Systems
DAW: A Distributed Antiworm System
IEEE Transactions on Parallel and Distributed Systems
Sweeper: a lightweight end-to-end system for defending against fast worms
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Rx: Treating bugs as allergies—a safe method to survive software failures
ACM Transactions on Computer Systems (TOCS)
On the trade-off between speed and resiliency of flashworms and similar malcodes
Proceedings of the 2007 ACM workshop on Recurring malcode
Honey@home: a new approach to large-scale threat monitoring
Proceedings of the 2007 ACM workshop on Recurring malcode
Can you infect me now?: malware propagation in mobile phone networks
Proceedings of the 2007 ACM workshop on Recurring malcode
Dependency-based distributed intrusion detection
DETER Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
Catch me, if you can: evading network signatures with web-based polymorphic worms
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
Noninvasive Methods for Host Certification
ACM Transactions on Information and System Security (TISSEC)
A model of the spread of randomly scanning Internet worms that saturate access links
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Deterministic and stochastic models for the detection of random constant scanning worms
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Building a network testbed for internet security research
Journal of Computing Sciences in Colleges
Towards self-propagate mal-packets in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
International Journal of Wireless and Mobile Computing
Origins: an approach to trace fast spreading worms to their roots
International Journal of Security and Networks
Optimal worm-scanning method using vulnerable-host distributions
International Journal of Security and Networks
Gray's anatomy: dissecting scanning activities using IP gray space analysis
SYSML'07 Proceedings of the 2nd USENIX workshop on Tackling computer systems problems with machine learning techniques
Secretly monopolizing the CPU without superuser privileges
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
On attack causality in internet-connected cellular networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Proximity breeds danger: emerging threats in metro-area wireless networks
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Detector SherLOCK: Enhancing TRW with Bloom filters under memory and performance constraints
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 2008 ACM symposium on Applied computing
Detecting early worm propagation based on entropy
Proceedings of the 2nd international conference on Scalable information systems
Remote detection of virtual machine monitors with fuzzy benchmarking
ACM SIGOPS Operating Systems Review
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Proceedings of the fourth international workshop on Software engineering for secure systems
Improving sensor network immunity under worm attacks: a software diversity approach
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Phalanx: withstanding multimillion-node botnets
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Catching instant messaging worms with change-point detection techniques
LEET'08 Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
Modeling host-based detection and active worm containment
Proceedings of the 11th communications and networking simulation symposium
Modeling and Simulation for Security Risk Propagation in Critical Information Systems
Computational Intelligence and Security
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Online Tracing Scanning Worm with Sliding Window
Information Security and Cryptology
The Quest for Multi-headed Worms
DIMVA '08 Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Vigilante: End-to-end containment of Internet worm epidemics
ACM Transactions on Computer Systems (TOCS)
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Computer Communications
Exploiting open functionality in SMS-capable cellular networks
Journal of Computer Security
Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure
ACM Transactions on Information and System Security (TISSEC)
Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
A Self-learning System for Detection of Anomalous SIP Messages
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Epidemiology and Wireless Communication: Tight Analogy or Loose Metaphor?
Bio-Inspired Computing and Communication
A Distributed Framework for the Detection of New Worm-Related Malware
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
A rough set approach for automatic key attributes identification of zero-day polymorphic worms
Expert Systems with Applications: An International Journal
FDF: Frequency detection-based filtering of scanning worms
Computer Communications
ACM Transactions on Sensor Networks (TOSN)
Automating analysis of large-scale botnet probing events
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Anti-virus security and robustness of heterogeneous immune static network
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
MASFMMS: Multi Agent Systems Framework for Malware Modeling and Simulation
Multi-Agent-Based Simulation IX
On Automatically Detecting Malicious Impostor Emails
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation
Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation
Swing: realistic and responsive network traffic generation
IEEE/ACM Transactions on Networking (TON)
Deriving a closed-form expression for worm-scanning strategies
International Journal of Security and Networks
Towards an analytic model of epidemic spreading in heterogeneous systems
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
An Attacker-Defender Game for Honeynets
COCOON '09 Proceedings of the 15th Annual International Conference on Computing and Combinatorics
Scalable network-layer defense against internet bandwidth-flooding attacks
IEEE/ACM Transactions on Networking (TON)
Security-enabled code deployment for heterogeneous networks
Computer Standards & Interfaces
An information-theoretic view of network-aware malware attacks
IEEE Transactions on Information Forensics and Security
A distributed framework for passive worm detection and throttling in P2P networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks
IEEE Network: The Magazine of Global Internetworking
Defending against the propagation of active worms
The Journal of Supercomputing
Honeypot detection in advanced botnet attacks
International Journal of Information and Computer Security
Modeling and analysis malware spread in short-range wireless networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Worm propagation modeling based on two-factor model
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Creation of the importance scanning worm using information collected by Botnets
Computer Communications
Self-adaptive worms and countermeasures
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
A detection and filter system for use against large-scale DDoS attacks in the internet backbone
IWAN'04 Proceedings of the 6th IFIP TC6 international working conference on Active networks
PolyI-D: polymorphic worm detection based on instruction distribution
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Hit-list worm detection and bot identification in large networks using protocol graphs
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
An approach for classifying internet worms based on temporal behaviors and packet flows
ICIC'07 Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications
Investigating the impact of real-world factors on internet worm propagation
ICISS'07 Proceedings of the 3rd international conference on Information systems security
Toward sound-assisted intrusion detection systems
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Evo'08 Proceedings of the 2008 conference on Applications of evolutionary computing
Comparing two newly proposed immunization strategies in networks
APCC'09 Proceedings of the 15th Asia-Pacific conference on Communications
HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency
Computer Networks: The International Journal of Computer and Telecommunications Networking
Thwarting zero-day polymorphic worms with network-level length-based signature generation
IEEE/ACM Transactions on Networking (TON)
Monitoring abnormal traffic flows based on independent component analysis
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A behaviour study of network-aware stealthy worms
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Tools for worm experimentation on the DETER testbed
International Journal of Communication Networks and Distributed Systems
Modeling the propagation of Peer-to-Peer worms
Future Generation Computer Systems
How to distribute antidote to control epidemics
Random Structures & Algorithms
Accelerating the bit-split string matching algorithm using Bloom filters
Computer Communications
Extending black domain name list by using co-occurrence relation between DNS queries
LEET'10 Proceedings of the 3rd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more
A new form of DOS attack in a cloud and its avoidance mechanism
Proceedings of the 2010 ACM workshop on Cloud computing security workshop
Demystifying service discovery: implementing an internet-wide scanner
IMC '10 Proceedings of the 10th ACM SIGCOMM conference on Internet measurement
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Modeling and containment of search worms targeting web applications
DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
Characterizing and defending against divide-conquer-scanning worms
Computer Networks: The International Journal of Computer and Telecommunications Networking
Automatic discovery of parasitic malware
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
A case study in ethical decision making regarding remote mitigation of botnets
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
Modeling the spread of internet worms via persistently unpatched hosts
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Honeypot back-propagation for mitigating spoofing distributed denial-of-service attacks
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Enhancing Intrusion Detection System with proximity information
International Journal of Security and Networks
An automated worm containment scheme
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
Properties and Evolution of Internet Traffic Networks from Anonymized Flow Data
ACM Transactions on Internet Technology (TOIT)
A novel contagion-like patch dissemination mechanism against peer-to-peer file-sharing worms
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Fusing intrusion data for detection and containment
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Inside the permutation-scanning worms: propagation modeling and analysis
IEEE/ACM Transactions on Networking (TON)
Joint network-host based malware detection using information-theoretic tools
Journal in Computer Virology
Characterizing internet worm infection structure
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Why mobile-to-mobile wireless malware won't cause a storm
LEET'11 Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats
Characterizing Intelligence Gathering and Control on an Edge Network
ACM Transactions on Internet Technology (TOIT)
On detecting active worms with varying scan rate
Computer Communications
Monitoring abnormal network traffic based on blind source separation approach
Journal of Network and Computer Applications
Detecting malware domains at the upper DNS hierarchy
SEC'11 Proceedings of the 20th USENIX conference on Security
Honeynet games: a game theoretic approach to defending network monitors
Journal of Combinatorial Optimization
Research challenges towards the Future Internet
Computer Communications
Detecting, validating and characterizing computer infections in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
A TPM-enabled remote attestation protocol (TRAP) in wireless sensor networks
Proceedings of the 6th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
The probability model of peer-to-peer botnet propagation
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
NGCE – network graphs for computer epidemiologists
PCI'05 Proceedings of the 10th Panhellenic conference on Advances in Informatics
Modeling and analysis of worm and killer-worm propagation using the divide-and-conquer strategy
ICA3PP'05 Proceedings of the 6th international conference on Algorithms and Architectures for Parallel Processing
Worm propagation modeling and analysis on network
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Anti-worm immunization of web system based on normal model and BP neural network
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
Attacking confidentiality: an agent based approach
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
An immune-based model for computer virus detection
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Traffic anomaly detection and characterization in the tunisian national university network
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
A novel dynamic immunization strategy for computer network epidemics
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Coupled kermack-mckendrick models for randomly scanning and bandwidth-saturating internet worms
QoS-IP'05 Proceedings of the Third international conference on Quality of Service in Multiservice IP Networks
Mitigating network denial-of-service through diversity-based traffic management
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A first look at peer-to-peer worms: threats and defenses
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Flow-level traffic analysis of the blaster and sobig worm outbreaks in an internet backbone
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Empirical analysis of rate limiting mechanisms
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Polymorphic worm detection using structural information of executables
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Anomalous payload-based worm detection and signature generation
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Interactive visualization for network and port scan detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Detecting unknown worms using randomness check
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Sensitivity analysis of an attack containment model
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Biomonitoring, phylogenetics and anomaly aggregation systems
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Models and analysis of active worm defense
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Fast and evasive attacks: highlighting the challenges ahead
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
SafeCard: a gigabit IPS on the network card
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
TAO: protecting against hitlist worms using transparent address obfuscation
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
ARCS'10 Proceedings of the 23rd international conference on Architecture of Computing Systems
Key factors influencing worm infection in enterprise networks
WISA'05 Proceedings of the 6th international conference on Information Security Applications
ICISS'05 Proceedings of the First international conference on Information Systems Security
A probabilistic approach to estimate the damage propagation of cyber attacks
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Malware characteristics and threats on the internet ecosystem
Journal of Systems and Software
Ask WINE: are we safer today? evaluating operating system security through big data analysis
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Intrusion Detection: Towards scalable intrusion detection
Network Security
What's in a name. . . generator?
Journal in Computer Virology
Competing memes propagation on networks: a case study of composite networks
ACM SIGCOMM Computer Communication Review
Analysis of a "/0" stealth scan from a botnet
Proceedings of the 2012 ACM conference on Internet measurement conference
Toward early warning against Internet worms based on critical-sized networks
Security and Communication Networks
Simulating network cyber attacks using splitting techniques
Proceedings of the Winter Simulation Conference
The Bluetooth Honeypot Project: Measuring and Managing Bluetooth Risks in the Workplace
International Journal of Interdisciplinary Telecommunications and Networking
An agent-based model to simulate coordinated response to malware outbreak within an organisation
International Journal of Information and Computer Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones
Journal of Computer and System Sciences
Spatio-temporal mining of software adoption & penetration
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
A scalable network forensics mechanism for stealthy self-propagating attacks
Computer Communications
Demystifying internet-wide service discovery
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |