The internet worm program: an analysis
ACM SIGCOMM Computer Communication Review
An empirical study of the reliability of UNIX utilities
Communications of the ACM
Computer ethics—part of computer science!
ACM SIGCAS Computers and Society
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
Prepared testimony and statement for the record on computer virus legislation
ACM SIGCAS Computers and Society
Security Control for COTS Components
Computer
System and network trustworthiness in perspective
Proceedings of the 13th ACM conference on Computer and communications security
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
Performing real-time threat assessment of security incidents using data fusion of IDS logs
Journal of Computer Security
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Transparent run-time defense against stack smashing attacks
ATEC '00 Proceedings of the annual conference on USENIX Annual Technical Conference
An Automated Signature-Based Approach against Polymorphic Internet Worms
IEEE Transactions on Parallel and Distributed Systems
DAW: A Distributed Antiworm System
IEEE Transactions on Parallel and Distributed Systems
Debugging in the (very) large: ten years of implementation and experience
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Hi-index | 48.24 |
The actions taken by a group of computer scientists at MIT during the worm invasion represents a study of human response to a crisis. The authors also relate the experiences and reactions of other groups throughout the country, especially in terms of how they interacted with the MIT team.