Topology-aware vulnerability mitigation worms

作者: Ziyad Al-Salloum

DOI:

关键词:

摘要:

参考文章(75)
M. Theimer, R. Finlayson, J. C. Mogul, T. Mann, Reverse Address Resolution Protocol RFC. ,vol. 903, pp. 1- 4 ,(1984)
Jose Nazario, Chris Connelly, The Future of Internet Worms ,(2001)
Mario Freire, Manuela Pereira, None, Encyclopedia of Internet Technologies and Applications ,(2007)
David Ferbrache, A pathology of computer viruses ,(1991)
Vern Paxson, Stuart Staniford, Nicholas Weaver, How to Own the Internet in Your Spare Time usenix security symposium. pp. 149- 167 ,(2002)
David M. Nicol, Michael Liljenstam, Models of Active Worm Defenses Coordinated Science Laboratory, University of Illinois at Urbana-Champaign. ,(2004)
Ted G. Lewis, Hesham El-Rewini, Distributed and Parallel Computing ,(1998)