Author:
Sarfaraz Aatif,Jha Atul,Mondal Avijit,Goswami Radha Tamal
Reference15 articles.
1. Spitzner, L.: Honeypots: Tracking Hackers. Addison Wesley Pearson Education, Boston (2002)
2. Tang, Y., Chen, S.: An automated signature-based approach against polymorphic ınternet worms. IEEE Trans Parallel Distrib Syst 18(7), 879–892 (2007)
3. Cavallaro, L., Lanzi, A., Mayer, L., Monga, M.: LISABETH: automated content-based signature generator for zero-day polymorphic worms. In: Proceedings of the Fourth İnternational Workshop on Software Engineering for Secure Systems, Leipzig, Germany, May 2008, Lissa (2008)
4. Mohhammed, M.M.Z.E., Anthony Chan, H., Ventura, N.: Honeycyber: automated signature generation for zero-day polymorphic worms. In: Proceedings of the IEEE Military Communications Conference, MILCOM (2008)
5. Fogla, P., Sharif, M,. Perdisci, R., Kolesnikov, O., Lee, W.: Pol polymorphic blending attacks. In: Proceedings of the 15th Conference on USENIX Security Symposium, Vancouver, B.C., Canada (2006)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献