1. Inside the Slammer worm;David;IEEE Security and Privacy,2003
2. The spread of the Witty worm;Shannon;IEEE Security and Privacy,2004
3. A spatial stochastic model for worm propagation: scale effects;Markos;Journal in Computer Virology,2007
4. Dynamic analysis of malicious code;Ulrich;Journal in Computer Virology,2007
5. Staniford S, Paxson V, Weaver N. How to own the Internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, 2002; 149-167.