Active Bibliography

245 Vigilante: End-to-End Containment of Internet Worm Epidemics – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham - 2008
1 Universal Honeyfarm Containment – Jay Chen, John Mccullough, Alex C. Snoeren
Detecting Worm Mutations Using Machine Learning – Oliver Sharma - 2008
Structural Traffic Analysis for Network Security Monitoring – Christian Peter Kreibich, Hughes Hall
Traffic Analysis for Network Security using Learning Theory and Streaming Algorithms – Shobha Venkataraman - 2008
A Scalable Hybrid Network Monitoring Architecture for Measuring, Characterizing, and Tracking Internet Threat Dynamics – Michael Donald Bailey, Michael Donald Bailey, Farnam Jahanian - 2006
1 Worm Terminator: An Effective Containment of Unknown and Polymorphic Fast Spreading Worms – Songqing Chen, Xinyuan Wang, Lei Liu, Xinwen Zhang, Zhao Zhang - 2006
v Replay-based Worm Detection System – Tae Won Cho, Tae Won Cho, Tae Won Cho, Tae Won Cho, Supervisor Harrick, M. Vin - 2005
Jayanthkumar Kannan, Lakshminarayanan Subramanian, – Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica Scott, Scott Shenker, Y Katz, Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Scott Shenker, Y Katz
160 Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits – Helen J. Wang, Helen J. Wang, Chuanxiong Guo, Chuanxiong Guo, Daniel R. Simon, Daniel R. Simon, Alf Zugenmaier, Alf Zugenmaier - 2004
worm’s payload. Capturing and Analyzing Internet Worms By – Jedidiah Richard Crandall, Jedidiah Richard Crandall
Effective Network Management via System-Wide Coordination and Optimization – Vyas Sekar - 2010
4 Wormshield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation – Min Cai, Kai Hwang, Jianping Pan, Christos Papadopoulos - 2006
Network Payload-based Anomaly Detection and Content-based Alert Correlation – Ke Wang, Ke Wang
37 we contain Internet worms – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron - 2004
485 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
Session 5: Secure Networks Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits – Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier
ALGORITHMS FOR LARGE-SCALE INTERNET MEASUREMENTS – Derek Anthony Leonard, Anthony Leonard, A. L. Narasimha Reddy, Head Of Department, Valerie E. Taylor - 2010
104 Polymorphic Worm Detection Using Structural Information of Executables – Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna - 2005