2014-2-4 The Analysis of Internet Worm Modeling in IPv4 and IPv6 Networks SU Fei [email protected].
A R EAL -T IME P ACKET S CAN A RCHITECTURE Tim Sherwood UC Santa Barbara.
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010
worm detection
Blended attacks exploits, vulnerabilities and buffer overflow techniques in computer viruses
Feb 2004 Supporting the new era by enhancing the social and information infrastructures e-Government Hitachi Asia Ltd.
CS 443 Advanced OS Fabián E. Bustamante, Spring 2005 Automated Worm Fingerprinting Sumeet Singh, Cristian Estan, George Varghese and Stefan Savage Presenter:
Worms – Code Red
detection of worm