Sign in
WORM
2003
2004
2005
2006
2003
2006
Keyphrases
Publications
2006
David M. Nicol
The impact of stochastic variance on worm propagation and detection.
WORM
(2006)
Niels Provos
,
Joe McClain
,
Ke Wang
Search worms.
WORM
(2006)
Ying Zhang
,
Evan Cooke
,
Zhuoqing Morley Mao
Internet-scale malware mitigation: combining intelligence of the control and data plane.
WORM
(2006)
Jose Nazario
Where the worms aren't.
WORM
(2006)
Prem Gopalan
,
Kyle Jamieson
,
Panayiotis Mavrommatis
,
Massimiliano Poletto
Signature metrics for accurate and automated worm detection.
WORM
(2006)
Xuxian Jiang
,
Dongyan Xu
Profiling self-propagating worms via behavioral footprinting.
WORM
(2006)
Moheeb Abu Rajab
,
Fabian Monrose
,
Andreas Terzis
On the impact of dynamic addressing on malware propagation.
WORM
(2006)
Mohamed R. Chouchane
,
Arun Lakhotia
Using engine signature to detect metamorphic malware.
WORM
(2006)
Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006
WORM
(2006)
Jing Su
,
Kelvin K. W. Chan
,
Andrew G. Miklas
,
Kenneth Po
,
Ali Akhavan
,
Stefan Saroiu
,
Eyal de Lara
,
Ashvin Goel
A preliminary investigation of worm infections in a bluetooth environment.
WORM
(2006)
Giovanni Di Crescenzo
,
Faramak Vakil
Cryptographic hashing for virus localization.
WORM
(2006)
David J. Malan
,
Michael D. Smith
Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms.
WORM
(2006)
2005
Kurt Rohloff
,
Tamer Basar
The detection of RCS worm epidemics.
WORM
(2005)
Justin Ma
,
Geoffrey M. Voelker
,
Stefan Savage
Self-stopping worms.
WORM
(2005)
Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005
WORM
(2005)
Milan Vojnovic
,
Ayalvadi J. Ganesh
On the effectiveness of automatic patching.
WORM
(2005)
Moheeb Abu Rajab
,
Fabian Monrose
,
Andreas Terzis
Worm evolution tracking via timing analysis.
WORM
(2005)
David J. Malan
,
Michael D. Smith
Host-based detection of worms through peer-to-peer cooperation.
WORM
(2005)
Zesheng Chen
,
Chuanyi Ji
A self-learning worm using importance scanning.
WORM
(2005)
David W. Richardson
,
Steven D. Gribble
,
Edward D. Lazowska
The limits of global scanning worm detectors in the presence of background noise.
WORM
(2005)
Brian Hernacki
Emerging threats.
WORM
(2005)
Spyros Antonatos
,
Periklis Akritidis
,
Evangelos P. Markatos
,
Kostas G. Anagnostakis
Defending against hitlist worms using network address space randomization.
WORM
(2005)
Stefan Savage
Scalable internet threat monitoring.
WORM
(2005)
Vern Paxson
An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event.
WORM
(2005)
Mohammad Mannan
,
Paul C. van Oorschot
On instant messaging worms, analysis and countermeasures.
WORM
(2005)
2004
Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004
WORM
(2004)
James E. Just
,
Mark R. Cornwell
Review and analysis of synthetic diversity for breaking monocultures.
WORM
(2004)
Phillip A. Porras
,
Linda Briesemeister
,
Keith Skinner
,
Karl N. Levitt
,
Jeff Rowe
,
Yu-Cheng Allen Ting
A hybrid quarantine defense.
WORM
(2004)
Stuart Staniford
,
David Moore
,
Vern Paxson
,
Nicholas Weaver
The top speed of flash worms.
WORM
(2004)
Daniel R. Ellis
,
John G. Aiken
,
Kira S. Attwood
,
Scott D. Tenaglia
A behavioral approach to worm detection.
WORM
(2004)
Frank Castaneda
,
Emre Can Sezer
,
Jun Xu
WORM vs. WORM: preliminary study of an active counter-attack mechanism.
WORM
(2004)
Jintao Xiong
ACT: attachment chain tracing scheme for email virus detection and control.
WORM
(2004)
Evan Cooke
,
Michael Bailey
,
Zhuoqing Morley Mao
,
David Watson
,
Farnam Jahanian
,
Danny McPherson
Toward understanding distributed blackhole placement.
WORM
(2004)
Cynthia Wong
,
Stan Bielski
,
Jonathan M. McCune
,
Chenxi Wang
A study of mass-mailing worms.
WORM
(2004)
Nicholas Weaver
,
Ihab Hamadeh
,
George Kesidis
,
Vern Paxson
Preliminary results using scale-down to explore worm dynamics.
WORM
(2004)
2003
Stuart E. Schechter
,
Michael D. Smith
Access for sale: a new class of worm.
WORM
(2003)
Michael Liljenstam
,
David M. Nicol
,
Vincent H. Berk
,
Robert S. Gray
Simulating realistic network worm traffic for worm warning system design and testing.
WORM
(2003)
Cliff Changchun Zou
,
Weibo Gong
,
Donald F. Towsley
Worm propagation modeling and analysis under dynamic quarantine defense.
WORM
(2003)
Linda Briesemeister
,
Patrick Lincoln
,
Phillip A. Porras
Epidemic profiles and defense of scale-free networks.
WORM
(2003)
Dan Ellis
Worm anatomy and model.
WORM
(2003)
Jesse C. Rabek
,
Roger I. Khazan
,
Scott M. Lewandowski
,
Robert K. Cunningham
Detection of injected, dynamically generated, and obfuscated malicious code.
WORM
(2003)
Yang Wang
,
Chenxi Wang
Modeling the effects of timing parameters on virus propagation.
WORM
(2003)
Nicholas Weaver
,
Vern Paxson
,
Stuart Staniford
,
Robert K. Cunningham
A taxonomy of computer worms.
WORM
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003
WORM
(2003)
Darrell M. Kienzle
,
Matthew C. Elder
Recent worms: a survey and trends.
WORM
(2003)
Arno Wagner
,
Thomas Dübendorfer
,
Bernhard Plattner
,
Roman Hiestand
Experiences with worm propagation simulations.
WORM
(2003)