Author:
Toutonji Ossama A.,Yoo Seong-Moo,Park Moongyu
Subject
Applied Mathematics,Modeling and Simulation
Reference37 articles.
1. Inside the slammer worm;Moore;IEEE Magaz. Secur. Privacy,2003
2. D. Moore, C. Shannon, J. Brown, Code red: a Case Study on the Spread and Victims of an Internet Worm, in: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement, Marseille, France, Nov. 2002, pp. 273–284.
3. (eEye Digital Security Research) R. Permeh, M. Maiffret, Analysis:.ida”Code Red” Worm. , 2001 (accessed 17.07.01).
4. (The Cooperative Association for Internet Data Analysis) D. Moore, C. Shannon, The Spread of the Code-Red Worm (CRv2). , 2008 (accessed 18.11.08).
5. M.R. Faghani, H. Saidi, Social networks’ XSS worms, in: Proceedings of the International Conference Computational Science and Engineering, CSE ’09, vol. 4, 29–31 Aug. 2009, pp. 1137–1141.
Cited by
73 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献