IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Communications of the ACM
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
IEEE Security and Privacy
Exploring an epidemic in an e-science environment
Communications of the ACM - Special issue: RFID
Malware resistant networking using system diversity
Proceedings of the 6th conference on Information technology education
An ethics and security course for students in computer science and information technology
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Journal of Computing Sciences in Colleges
Designing computer forensics courses using case studies to enhance computer security curricula
Journal of Computing Sciences in Colleges - Papers of the Fourteenth Annual CCSC Midwestern Conference and Papers of the Sixteenth Annual CCSC Rocky Mountain Conference
An interdisciplinary accounting forensics course to improve computer science enrollments
Journal of Computing Sciences in Colleges
Unified rate limiting in broadband access networks for defeating internet worms and DDoS attacks
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
VANET worm spreading from traffic modeling
RWS'10 Proceedings of the 2010 IEEE conference on Radio and wireless symposium
Detecting anomalous network traffic with combined fuzzy-based approaches
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
Critical Infrastructure Protection
Hi-index | 4.10 |
Ever since Melissa struck Microsoft Windows users in late March 1999, computer viruses and worms have become common and persistent. For various practical reasons, many machines remain unprotected by up-to-date software patches or antivirus software, and the Internet's emergence has made it easy to shut down many vulnerable systems either directly or indirectly. In particular, worms have become more prevalent as online connectivity, including always on broadband access, has become ubiquitous.Ironically, emerging high-speed networks will likely accelerate the spread of worms, especially those like Code Red and SQL Slammer. As network rates increase, the time available to respond to worm epidemics may shorten to seconds before the entire vulnerable population is saturated. Defense against such threats will require a comprehensive automated defense.