Author:
Zhang Ruibin,Zhu Lei,Li Xiaosong,Pang Shaoning,Sarrafzadeh Abdolhossein,Komosny Dan
Publisher
Springer International Publishing
Reference14 articles.
1. Moore, D., Shannon, C., Brown, D.J., Voelker, G.M., Savage, S.: Inferring Internet denial-of-service activity. ACM Trans. Comput. Syst. 24, 115–139 (2006)
2. Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: understanding, detecting, and disrupting botnets. Networks 7, 39–44 (2005)
3. Kumar, A., Paxson, V., Weaver, N.: Exploiting underlying structure for detailed reconstruction of an internet-scale event. In: Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement - IMC 2005, p. 1 (2005)
4. Harder, U., Johnson, M.W., Bradley, J.T., Knottenbelt, W.J.: Observing internet worm and virus attacks with a small network telescope. Electron. Notes Theoret. Comput. Sci. 151(3), 47–59 (2006)
5. Staniford, S., Moore, D., Paxson, V., Weaver, N.: The top speed of flash worms. In: WORM 2004 - Proceedings of the 2004 ACM Workshop on Rapid Malcode, pp. 33–42 (2004)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献