1. Arbaugh, W.A., W.L. Fithen, and J. McHugh, Windows of Vulnerability: A Case Study Analysis, IEEE Computer, 2000. 33,(12), 52–59,
http://www.cs.umd.edu/~waa/pubs/Windows_of_Vulnerability.pdf
.
2. CAIDA, Code-Red Worms: A Global Threat, Cooperative Association for Internet Data Analysis (CAIDA), 28 November 2001,
http://www.caida.org/analysis/security/code-red/
.
3. Chien, E., W32.Nimda.A@mm Worm, Symantec Corporation, 18 September 2001,
http://www.symantec.com/avcenter/venc/data/w32.nimda.a@mm.html
.
4. CVE, Common Vulnerabilities and Exposures, The MITRE Corporation, 2002,
http://www.cve.mitre.org/
.
5. Dayioglu, B. and A. Ozgit, Use of Passive Network Mapping to Enhance Signature Quality of Misuse Network Intrusion Detection Systems, in Proceedings of the Sixteenth International Symposium on Computer and Information Sciences, 2001,
http://www.dayioglu.net/publications/iscis2001.pdf
.