Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference21 articles.
1. N. Weaver, V. Paxson, S. Staniford, R. Cunningham, A taxonomy of computer worms, in: WORM’03, Washington, DC, USA, 2003, pp. 11–18.
2. D. Moore, C. Shannon, J. Brown, Code-red: a case study on the spread and victims of an internet worm, in: IMW’02, Marseille, France, 2002, pp. 273–284.
3. C.C. Zou, D. Towsley, W. Gong, On the performance of internet worm scanning strategies, University of Massachusetts Technical Report: TR-03-CSE-07, 2003.
4. C.C. Zou, D. Towsley, W. Gong, S. Cai, Routing worm: a fast, selective attack worm based on IP address information, in: PADS’05, 2005, pp. 199–206.
5. Z. Chen, C. Ji, Importance-scanning worm using vulnerable-host distribution, in: IEEE GLOBECOM, 2005, pp. 1779–1784.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献