Throttling Viruses: Restricting propagation to defeat malicious mobile code (2002)


Download Links

by Matthew M. Williamson , Matthew M. Williamson
Citations:188 - 6 self

Active Bibliography

10 An Epidemiological Model of Virus Spread and Cleanup – Matthew M. Williamson, Jasmin Léveillé - 2003
19 Design, Implementation and Test of an Email Virus Throttle – Matthew M. Williamson - 2003
10 Multiscale modeling and simulation of worm effects on the internet routing infrastructure – David M. Nicol, Michael Liljenstam, Jason Liu - 2003
8 Finding and Containing Enemies Within the Walls With Self-Securing Network Interfaces – Gregory R. Ganger, Gregg Economou, Stanley M. Bielski - 2003
36 On scalable attack detection in the network – Ramana Rao Kompella, Sumeet Singh, George Varghese - 2007
2 Computation in the Wild – Stephanie Forrest, Justin Balthrop, Matthew Glickman, David Ackley - 2002
26 Immunology as Information Processing – Stephanie Forrest, Steven A. Hofmeyr - 2000
10 Learning DFA representations of HTTP for protecting web applications – Kenneth L. Ingham, Anil Somayaji, John Burge, Stephanie Forrest A C - 2007
16 Host-Based Detection of Worms through Peer-to-Peer Cooperation – David J. Malan , Michael D: Smith - 2005
8 Mitigating Network Denial-of-Service through Diversity-Based Traffic Management – Ashraf Matrawy, P. C. van Oorschot, Anil Somayaji - 2005
245 Vigilante: End-to-End Containment of Internet Worm Epidemics – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham - 2008
Structural Traffic Analysis for Network Security Monitoring – Christian Peter Kreibich, Hughes Hall
Defending against Internet Worm-like Infestations – Shou-chuan Lai
19 Self-Securing Network Interfaces: What, Why and How – Gregory R. Ganger, Gregg Economou, Stanley M. Bielski - 2002
28 Netbait: a Distributed Worm Detection Service – Brent Chun, Jason Lee, Hakim Weatherspoon, Brent N. Chun - 2002
for Anomaly Detection. (May 2005) – Seong Soo Kim, L. Narasimha Reddy, Riccardo Bettati, Don R. Halverson, Michael S. Pilant, Chanan Singh, Seong Soo Kim - 2005
A Survey on Malware and Malware Detection Systems – Imtithal A. Saeed, Ali Selamat, Ali M. A. Abuagoub, Salman Bin Abdulaziz
Software General Terms Security – unknown authors
Automated Reasoning in Co-operative Cyber Defense – Senthilkumar G Cheetancheri