IEEE Security and Privacy
Mitigating denial of service attacks: a tutorial
Journal of Computer Security
OPUS: online patches and updates for security
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
On the trade-off between speed and resiliency of flashworms and similar malcodes
Proceedings of the 2007 ACM workshop on Recurring malcode
An advanced hybrid peer-to-peer botnet
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Detecting worm variants using machine learning
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Malware Models for Network and Service Management
AIMS '07 Proceedings of the 1st international conference on Autonomous Infrastructure, Management and Security: Inter-Domain Management
An evaluation of connection characteristics for separating network attacks
International Journal of Security and Networks
Anti-virus security and robustness of heterogeneous immune static network
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Defensive configuration with game theory
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Botnet: classification, attacks, detection, tracing, and preventive measures
ICICIC '09 Proceedings of the 2009 Fourth International Conference on Innovative Computing, Information and Control
Defending against the propagation of active worms
The Journal of Supercomputing
Honeypot detection in advanced botnet attacks
International Journal of Information and Computer Security
VoIP malware: attack tool & attack scenarios
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Modeling the propagation of Peer-to-Peer worms
Future Generation Computer Systems
BotTrack: tracking botnets using NetFlow and PageRank
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I
The probability model of peer-to-peer botnet propagation
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
An anti-worm with balanced tree based spreading strategy
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
An expressive aspect language for system applications with arachne
Transactions on Aspect-Oriented Software Development I
Proceedings of the 1st Asian Conference on Pattern Languages of Programs
Bot detection evasion: a case study on local-host alert correlation bot detection methods
Security and Communication Networks
Survey and taxonomy of botnet research through life-cycle
ACM Computing Surveys (CSUR)
Modeling and evaluating of typical advanced peer-to-peer botnet
Performance Evaluation
Hi-index | 0.00 |
The Slapper Worm has a rich mix of features for both a historical and technical analysis and can help us identify some expectations for information security threats.