Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference48 articles.
1. Weaver N, Paxson V, Staniford S, Cunningham R (2003) A taxonomy of computer worms. In: WORM ’03, Washington, DC, USA, 2003, pp 11–18
2. Berghel H (2001) The Code Red worm: malicious software knows no bounds. Commun ACM 44:15–19
3. Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N (2003) Inside the Slammer worm. IEEE Secur Priv 1(4):33–39
4. Shannon C, Moore D (2004) The spread of the Witty worm. IEEE Secur Priv 2(4):46–50
5. Xiang Y, Zhou W, Chowdhury M (2004) A survey of active and passive defence mechanisms against DDoS attacks. Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Propagation of Computer Worms—A Study;Lecture Notes in Networks and Systems;2024
2. Modeling the Propagation of Worms in Networks: A Survey;IEEE Communications Surveys & Tutorials;2014