Also, if I missed anything (and I'm sure I did) that you think should be mentioned here, let me know about that too.
Sorry folks, looks like i've managed to develope some broken links in here. Hopefully that won't last too long (or I can find a replacement URL).
Correlation between NetFlow System and Network Views for Intrusion Detection By Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, William Yurcik [Adobe Acrobat]
Detecting New Malicious Code Using N-grams Signatures By Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan [Adobe Acrobat]
Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance By Jungwon Kim, William 0. Wilson, Uwe Aickelin, Julie McLeod [Adobe Acrobat]
A behavioral approach to worm detection By Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia [Adobe Acrobat]
[Broken]Defending Against Hitlist Worms Using Network Address Space Randomization By S. Antonatos, P. Akritidis, E. P. Markatos, Kostas G. Anagnostakis [Adobe Acrobat]
Efficient Content-Based Detection of Zero-Day Worms By P. Akritidis, Kostas G. Anagnostakis, E. P. Markatos [Adobe Acrobat]
The Case For Using Layered Defenses To Stop Worms By David J. Albanese, Micheal J. Wiacek, Christopher M. Salter, Jeffrey A. Six [Adobe Acrobat]
Non-Conventional Virus Attack By Raul Alvarez [Open Office]
[Broken]Defending Against Hitlist Worms Using Network Address Space Randomization By S. Antonatos, P. Akritidis, E. P. Markatos, Kostas G. Anagnostakis [Adobe Acrobat]
A Cooperative Immunization System for an Untrusting Internet By Kostas G. Anagnostakis, Angelos Keromytis, Micheal B. Greenwald, Sotiris Ioannidis, Dekai Li [Adobe Acrobat]
Efficient Content-Based Detection of Zero-Day Worms By P. Akritidis, Kostas G. Anagnostakis, E. P. Markatos [Adobe Acrobat]
Aggregating Detectors for New Worm Identification By Eric Anderson, Jun Li [Adobe Acrobat]
Stephanos Androutsellis-Theotokis
Security Applications of Peer-to-Peer Networks By Vasileios Vlachos, Stephanos Androutsellis-Theotokis, Diomidis Spinellis [Adobe Acrobat]
[Broken]Defending Against Hitlist Worms Using Network Address Space Randomization By S. Antonatos, P. Akritidis, E. P. Markatos, Kostas G. Anagnostakis [Adobe Acrobat]
Malware Defense Using Network Security Authentication By Joseph V. Antrosio, Errin W Fulp [Adobe Acrobat]
Automatic Extraction of Computer Virus Signatures By Jeffrey O. Kephart, William C. Arnold
An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
[Broken]Automatically Generated Win32 Heuristic Virus Detection By William C. Arnold, Gerald Tesauro [Adobe Acrobat]
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar
Detecting worms through de-centralized monitoring By Raman Arora [Adobe Acrobat]
A behavioral approach to worm detection By Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia [Adobe Acrobat]
The New Apple Of Malware's Eye: Is OSX The Next Windows? By McAfee AVERT [Adobe Acrobat]
Visualization for Intrustion Detection: Hooking the Worm By Stefan Axelsson [Adobe Acrobat]
A Hybrid Honeypot Architecture For Scalable Network Monitoring By Micheal Bailey, Evan Cooke, David Watson, Farnam Jahanian, Niels Provos [Adobe Acrobat]
The Internet Motion Sensor: A distributed Blackhole Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Farnam Jahanian, Jose Nazario [Adobe Acrobat]
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]
The Internet Motion Sensor: A Distributed Global Scoped Internet Threat Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Jose Nazario, Farnam Jahanian [Adobe Acrobat]
Designing a Framework for Active Worm Detection on Global Networks By Vincent Berk, George Bakos, Robert Morris [Adobe Acrobat]
[Compressed]Using Sensor Networks and Data Fusion for Early Detection By Vincent Berk, Robert S. Gray, George Bakos [GhostScript/GSView]
Analysis of the "SQL Slammer" worm and its effects on Indiana University and related institutions By Gregory Travis, Ed Balas, David Ripley, Steven Wallace [Adobe Acrobat]
Superworms and Cryptovirology: a Deadly Combination By Ivan Balepin [Adobe Acrobat]
[WEB ARCHIVE]How to Stay Virus, Worm and Trojan Free - Without Anti-Virus Software By David Banes
An Inside Look at Botnets By Paul Barford, Vinod Yegneswaran [Adobe Acrobat]
Internet Intrusions: Global Characteristics and Prevalence By Vinod Yegneswaran, Paul Barford, Johannes Ullrich [Adobe Acrobat]
[Broken]Characteristics of Internet Background Radiation By Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson , Larry Peterson [Adobe Acrobat]
[Broken]EarlyBird: Catching the Internet Worm By Marco Barreno [Adobe Acrobat]
Why should I report my virus infections By Kenneth Bechtel
[WEB ARCHIVE]Viral Familiarization By Kenneth Bechtel
[FTP]Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities By Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev [Adobe Acrobat]
Worm Propagation Strategies In An IPv6 Internet By Steve Bellovin, Bill Cheswick, Angelos Keromytis [Adobe Acrobat]
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds By Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger
Fast Detection of Scanning Worm Infections By Jaeyeon Jung, Stuart E. Schechter, Arthur Berger [Adobe Acrobat]
Designing a Framework for Active Worm Detection on Global Networks By Vincent Berk, George Bakos, Robert Morris [Adobe Acrobat]
[Compressed]Using Sensor Networks and Data Fusion for Early Detection By Vincent Berk, Robert S. Gray, George Bakos [GhostScript/GSView]
MS-SQL Slammer Traffic Analysis By Robert Beverly
MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables By Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyyab , Salvatore J. Stolfo [GhostScript/GSView]
Dynamic Quarantine of Internet Worms By Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger [Adobe Acrobat]
Broadband Network Virus Detection System Based on Bypass Monitor By Wu Bing, Yun Xiaochun, Xiao Xinguang [Adobe Acrobat]
Quarantining DHCP clients to reduce worm infection risk By Paul Blackburn [Adobe Acrobat]
New Streaming Algorithms for Fast Detection of Superspreaders By Shobha Venkataraman, Dawn Song, Phillip B. Gibbons, Avrim Blum [Adobe Acrobat]
The HoneyTank: A Scalable Approach To Collect Malicious Internet Traffic By Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier [Adobe Acrobat]
Future Trends in Virus Writing By Vesselin Bontchev
Vircing the InVircible By Vesselin Bontchev
The Bulgarian and Soviet Virus Writing Factories By Vesselin Bontchev
Are "Good" Computer Viruses Still a Bad Idea? By Vesselin Bontchev
Analysis and Maintenance of a Clean Virus Library By Vesselin Bontchev
Possible Virus Attacks Against Integrity Programs And How To Prevent Them By Vesselin Bontchev
The Pros and Cons of WordBasic Virus Upconversion By Vesselin Bontchev
Possible Macro Virus Attacks and How to Prevent Them By Vesselin Bontchev
Macro Virus Identification Problems By Vesselin Bontchev
Veni, Vidi, Vicis? By Vesselin Bontchev
No Peace on the Excel Front By Vesselin Bontchev
The WildList - Still Useful? By Vesselin Bontchev
Solving the VBA Upconversion Problem By Vesselin Bontchev
Latest Macro Virus Developments and Future Trends By Vesselin Bontchev
Transaction-based Anomaly Detection By Roland Büschkes, Mark Borning, Dogan Kesdogan
SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots By Georgios Portokalidis, Herbert Bos [Adobe Acrobat]
Analyzing Impacts of Peer-to-Peer Systems on Propagation of Active Worm Attacks By Wei Yu, Corey Boyer, Dong Xuan [Adobe Acrobat]
Win32/Blaster: A Case Study From Microsoft's Perspective By Matthew Braverman [Adobe Acrobat]
ICSA Labs 6th Annual Virus Prevalence Survey 2000 By Lawrence M. Bridwell , Peter Tippett [Adobe Acrobat]
Epidemic Profiles And Defense Of Scale-Free Networks By Linda Briesemeister, Patrick Lincoln, Phillip Porras [Adobe Acrobat]
Microscopic Simulation Of A Group Defense Strategy By Linda Briesemeister, Phillip Porras [Adobe Acrobat]
Model Checking of Worm Quarantine and Counter-Quarantine under a Group Defense By Linda Briesemeister, Phillip Porras, Ashish Tiwari [Adobe Acrobat]
A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection By John Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks [Adobe Acrobat]
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware By John Lockwood, James Moscola, Matthew Kulig, David Reddick, Tim Brooks [Adobe Acrobat]
The HoneyTank: A Scalable Approach To Collect Malicious Internet Traffic By Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier [Adobe Acrobat]
Code-Red: A Case Study on the Spread and Victims of an Internet Worm By David Moore, Colleen Shannon, Jeffery Brown [Adobe Acrobat]
From AntiVirus to AntiMalware Software and Beyond: Another Approach to the Protection of Customers from Dysfunctional System Behaviour By Klaus Brunnstein [Adobe Acrobat]
[Broken]Searching for Nirvana: Beating viruses under adverse conditions By Bruce P. Burrell [Adobe Acrobat]
[Broken]A second look at new viruses: Now how great a threat? By Bruce P. Burrell [Adobe Acrobat]
Transaction-based Anomaly Detection By Roland Büschkes, Mark Borning, Dogan Kesdogan
Biological Models of Security for Virus Propagation in Computer Networks By Sanjay Goel, Stephen F. Bush [Adobe Acrobat]
The Future of Fighting Viruses: A History and Analysis of the Digital Immune System By Toby Bussa
Collaborative Internet Worm Containment By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen [Adobe Acrobat]
WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees By Min Cai, Kai Hwang, Shanshan Song, Runfang Zhou, Christos Papodopoulos [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]
Routing Worm: A Fast, Selective Attack Worm based on IP Address Information By Cliff Changchun Zou, Don Towsley, Weibo Gong, Songlin Cai [Adobe Acrobat]
[Broken]Computer Viruses and Related Threats: A Management Guide By Lisa Carnahan, John P. Wack [GhostScript/GSView]
Sophos Anti-Virus detection: a technical overview By Katherine Carr [Adobe Acrobat]
Impact of network design on worm propagation By Brian Carrier, Sundararaman Jeyaraman, Sarah Sel [Adobe Acrobat]
WORM vs. WORM: Preliminary Study of an Active CounterAttack Mechanism By Frank Castaneda, Emre Can Sezery, Jun Xu [Adobe Acrobat]
[Broken]Choosing your anti-virus software By Jacqueline Castelli [Adobe Acrobat]
[FTP]Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Detecting New Malicious Code Using N-grams Signatures By Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan [Adobe Acrobat]
[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]
An API For Worm-Defense Evaluation By Karl Levitt, Todd Heberlien, Denys Ma, Senthilkumar G. Cheetancheri [GhostScript/GSView]
Modelling a Computer Worm Defense System By Senthilkumar G. Cheetancheri [GhostScript/GSView]
A Self-Learning Worm Using Importance Scanning By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
Spatial-Temporal Modeling of Malware Propagation in Networks By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
Importance-Scanning Worm Using Vulnerable-Host Distribution By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
Modeling the Spread of Active Worms By Zesheng Chen, Lixin Gao, Kevin Kwiat [Adobe Acrobat]
A Two-Layer Approach for Novel Email Worm Detection By Steve Martin, Anil Sewani, Blaine Nelson, Karl Chen, Anthony D. Joseph [Adobe Acrobat]
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
Collaborative Internet Worm Containment By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]
Defending Against Internet Worms: A Signature-Based Approach By Yong Tang, Shigang Chen [Adobe Acrobat]
An Internet-Worm Early Warning System By Shigang Chen, Sanjay Ranka [Adobe Acrobat]
Slowing Down Internet Worms By Shigang Chen, Yong Tang [Adobe Acrobat]
The Evolution Of Viruses And Worms By Thomas M. Chen, Jean-Marc Robert [Adobe Acrobat]
Worm Epidemics in High-Speed Networks By Thomas M. Chen, Jean-Marc Robert [Adobe Acrobat]
Trends in Viruses and Worms By Thomas M. Chen [Adobe Acrobat]
Intrusion Detection for Viruses and Worms By Thomas M. Chen [Adobe Acrobat]
[Broken]Detecting Early Worm Propagation through Packet Matching By Xuan Chen, John Heidemann [Adobe Acrobat]
Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]
An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
IBM: Coping With Computer Viruses and Related Problems By Steve R. White, David M. Chess, Jimmy Kuo
Computer Viruses: A Global Perspective By Steve R. White, Jeffrey O. Kephart, David M. Chess
Web Browsers - Threat or Menace By John F. Morar, David M. Chess
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
[Broken]Fighting Computer Viruses By Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess
The Future of Viruses on the Internet By David M. Chess
Where There's Smoke, There's Mirrors: The Truth About Trojan Horses By David M. Chess, Sarah Gordon
Virus Verification and Removal Tools and Techniques By David M. Chess
Security in Agent Systems By David M. Chess
Some Common PC-DOS Viruses and What They Mean To You By David M. Chess
Is Java Still Secure? By David M. Chess, John F. Morar
An Undetectable Computer Virus By David M. Chess, Steve R. White
Can Cryptography Prevent Computer Viruses? By David M. Chess, John F. Morar
Mobile Agents: are they a good idea? By David M. Chess, Colin Harrison, Aaron Kershenbaum [GhostScript/GSView]
Attitude Adjustment: Trojans and Malware on the Internet By David M. Chess, Sarah Gordon [Adobe Acrobat]
The Future of Viruses on the Internet By David M. Chess
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar
Worm Propagation Strategies In An IPv6 Internet By Steve Bellovin, Bill Cheswick, Angelos Keromytis [Adobe Acrobat]
Threats to WAP Enabled Devices By Eric Chien [Adobe Acrobat]
Malicious Threats to PDAs By Eric Chien [Adobe Acrobat]
A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]
Internet Worms As Internet-wide Threat By Nikolai Joukov, Tzi-cker Chiueh [Adobe Acrobat]
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning By Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung [Adobe Acrobat]
On Deriving Unknown Vulnerabilities from ZeroDay Polymorphic and Metamorphic Worm Exploits By Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, Frederic T. Chong [Adobe Acrobat]
[Broken]Testing Malware Detectors By Mihai Christodorescu, Somesh Jha [Adobe Acrobat]
Design and Implementation of a Lab Worm By Christopher Church, Tim Schmoyer, Henry Owen [Adobe Acrobat]
A Note On Distributed Coordinated Attacks By Fred Cohen
Trends In Computer Virus Research By Fred Cohen
Computer Viruses - Theory and Experiments By Fred Cohen
Requirements On Worm Mitigation Technologies In MANETS By Robert Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis [Adobe Acrobat]
Towards an Approach for Automatically Repairing Compromised Network Systems By Henry Owen, Julian B. Grizzard, Sven Krasser, Gregory J. Conti, Eric R. Dodson [Adobe Acrobat]
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks By John Levine, Richard LaBella, Henry Owen, Didier Contis, Brian Culver [Adobe Acrobat]
A Hybrid Honeypot Architecture For Scalable Network Monitoring By Micheal Bailey, Evan Cooke, David Watson, Farnam Jahanian, Niels Provos [Adobe Acrobat]
Worm Hotspots: Explaining Non-Uniformity in Worm Targeting Behavior By Evan Cooke, Morley Mao, Farnam Jahanian [Adobe Acrobat]
The Internet Motion Sensor: A distributed Blackhole Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Farnam Jahanian, Jose Nazario [Adobe Acrobat]
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]
The Internet Motion Sensor: A Distributed Global Scoped Internet Threat Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Jose Nazario, Farnam Jahanian [Adobe Acrobat]
A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]
[FTP]Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
A Reputation-based System for the Quarantine of Widespread Malicious Behavior By Scott E. Coull, Boleslaw K. Szymanski [Adobe Acrobat]
[Broken]Tracking Computer Virus Incidents with Wildlist Organization International By Shane Coursen [Adobe Acrobat]
Solving the Problem of HTML Mail By Shane Coursen
Welcome to the Club, Macromedia By Shane Coursen
How the Grinch Stole Keystrokes By Shane Coursen
'Magic Lantern' Rubs the Wrong Way By Shane Coursen
Virus Nightmare Scenarios By Shane Coursen
Real Security is Tailored to Fit By Shane Coursen
Nimda: a flash in the pan By Shane Coursen
'Good' viruses have a future By Shane Coursen
The worm that spreads secrets By Shane Coursen
Watch this worm By Shane Coursen
What's in a name? By Shane Coursen
On Deriving Unknown Vulnerabilities from ZeroDay Polymorphic and Metamorphic Worm Exploits By Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, Frederic T. Chong [Adobe Acrobat]
Honeycomb - Creating Intrusion Detection Signatures Using Honeypots By Christian Kreibich, Jon Crowcroft [Adobe Acrobat]
[FTP]Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Protocol-Independent Adaptive Replay of Application Dialog By Weidong Cui, Vern Paxson , Nicholas Weaver, Randy H. Katz [Adobe Acrobat]
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks By John Levine, Richard LaBella, Henry Owen, Didier Contis, Brian Culver [Adobe Acrobat]
Accurately Detecting Source Code of Attacks That Increase Privilege By Robert K. Cunningham, Craig S. Stevenson [Adobe Acrobat]
Modelling Botnet Propagation Using Time Zones By David Dagon, Cliff Changchun Zou, Wenke Lee [Adobe Acrobat]
HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
Worm Detection Using Local Networks By Xinzhou Qin, David Dagon, Guofei Gu, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]
Malware - Future Trends By Dancho Danchev [Adobe Acrobat]
Protected Mode Supervisor? By Igor Daniloff
Anarchy in the USSR By Igor Daniloff
Fighting Talk By Igor Daniloff
Avfs: An On-Access Anti-Virus File System By Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok
Immunity Based Intrusion Detection System: A General Framework By Dipankar Dasgupta [Adobe Acrobat]
Viruses of the Mind By Richard Dawkins
An Introduction to Intrusion-Detection Systems By Herve Debar [Adobe Acrobat]
Early Detection of BGP Instabilities Resulting from Internet Worm Attacks By S. Deshpande, M. Thottan, B. Sikdar [Adobe Acrobat]
[Broken]Optimal Control of Treatment Costs for Internet Worm By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]
[Broken]Measurement and Analysis of Worm Propagation on Internet Network Topology By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]
Towards an Approach for Automatically Repairing Compromised Network Systems By Henry Owen, Julian B. Grizzard, Sven Krasser, Gregory J. Conti, Eric R. Dodson [Adobe Acrobat]
MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]
Honey, I caught a worm: Building yourself a honeypot, some practical issues By Arthur Donkers [Adobe Acrobat]
Active Technologies To Containe Internet Worm By Hui Zheng, Haixin Duan [Adobe Acrobat]
Experiences with Worm Propagation Simulations By Arno Wagner, Bernhard Plattner, Thomas Dubendorfer, Roman Hiestand [Adobe Acrobat]
[WEB ARCHIVE]Is virus writing really that bad? By Paul Ducklin
The V-Files:A dictionary of file threats By Paul Ducklin [Adobe Acrobat]
The ABC of computer security By Paul Ducklin [Adobe Acrobat]
Adaptive Defense Against Various Network Attacks By Don Towsley, Cliff Changchun Zou, Nick Duffield, Weibo Gong [Adobe Acrobat]
Effect of Malicious Traffic on the Network By Kun-chan Lan, Alefiya Hussain, Debojyoti Dutta [Adobe Acrobat]
Using Predators to Combat Worms and Viruses: A Simulation-Based Study By Ajay Gupta, Daniel C. DuVarney [Adobe Acrobat]
[Compressed]Attack Languages By Giovanni Vigna, Steven T. Eckmann, Richard A. Kemmerer [GhostScript/GSView]
[Compressed]STATL: An Attack Language for State-based Intrusion Detection By Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer [GhostScript/GSView]
The Safety of Internet Search Engines By Ben Edelman, Hannah Rosenbaum
MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]
[FTP]On Computer Viral Infection and the Effect of Immunization By Chenxi Wang, John C. Knight, Matthew C. Elder [Adobe Acrobat]
A behavioral approach to worm detection By Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia [Adobe Acrobat]
[Broken]Worm Anatomy and Model By Daniel R. Ellis [Adobe Acrobat]
Reflections on Witty: Analyzing the Attacker By Daniel R. Ellis, Nicholas Weaver
[WEB ARCHIVE]The Future Impact of Viruses By David Emm
Guidelines for an Anti-Virus Policy By David Emm
Can a Network be Protected from Single-Packet Warhol Worms? By Larry G. Irwin, Richard J. Enbody [Adobe Acrobat]
[WEB ARCHIVE]Developing an Anti-Virus Security Policy By Nicholas Engelman
[Broken]Security through Information: Educating Users By Nicholas Engelman
MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]
MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables By Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyyab , Salvatore J. Stolfo [GhostScript/GSView]
Data Mining Methods for Detection of New Malicious Executables By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [Adobe Acrobat]
[Broken]Learning To Detect New and Unknown Malicious Programs By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [GhostScript/GSView]
The EarlyBird System for Real-time Detection of Unknown Worms By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage
Automated Worm Fingerprinting By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage [Adobe Acrobat]
Organizing a Corporate Anti-Virus Effort By Alan A. Fedeli
[FTP][Compressed]Corporate Anti-Virus Disciplines By Alan A. Fedeli
Handling Computer Virus Emergencies By Alan A. Fedeli
The Effect of DNS Delays on Worm Propagation in an IPv6 Internet By Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos Keromytis [Adobe Acrobat]
Establishing Ethics In The Computer Virus Arena By Paul W. Ferguson
Hunting For Metamorphic By Peter Szor, Peter Ferrie [Adobe Acrobat]
Chiba Witty Blues By Peter Ferrie, Peter Szor, Frederic Perriot [Adobe Acrobat]
Blast Off! By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]
Virus Analysis 1: Worm Wars By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]
[Broken]Approaches to Integrated Malware Detection and Avoidance By Simone Fischer-Hübner, Amon Ott, Morton Swimmer [Adobe Acrobat]
Hoaxes & Hypes By Richard Ford, Sarah Gordon, Joe Wells
[WEB ARCHIVE]I'm Protected. Right? By Richard Ford
When Worlds Collide: Information Sharing for the Security and Anti-Virus Community By Richard Ford, Sarah Gordon
Anti-Virus Product Evaluation in the Real World By Richard Ford, Sarah Gordon [Adobe Acrobat]
[Broken]Web Insecurity: An Exercise in Misconfiguration By Richard Ford [Adobe Acrobat]
Computer Worms: Past, Present and Future By Craig Fosnock [Adobe Acrobat]
Extortion Worms: Internet Worms that Discourage Disinfection By Tim Freeman
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks By Felix C. Freiling, Thorsten Holz, Georg Wicherski [Adobe Acrobat]
SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
Malware Defense Using Network Security Authentication By Joseph V. Antrosio, Errin W Fulp [Adobe Acrobat]
Anti-virus Software: The Challenge of Being Prepared for Tomorrow's MalWare Today By Lisa Galarneau [Adobe Acrobat]
The Effect Of Network Topology On The Spread Of Epidemics By Ayalvadi Ganesh, L. Massoulie, Don Towsley [Adobe Acrobat]
On the Race of Worms, Alerts and Patches By Milan Vojnovic, Ayalvadi Ganesh [Adobe Acrobat]
Dynamic Quarantine of Internet Worms By Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger [Adobe Acrobat]
Monitoring and Early Warning for Internet Worms By Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley [Adobe Acrobat]
Modeling the Spread of Active Worms By Zesheng Chen, Lixin Gao, Kevin Kwiat [Adobe Acrobat]
The Monitoring and Early Detection of Internet Worms By Cliff Changchun Zou, Weibo Gong, Don Towsley, Lixin Gao [Adobe Acrobat]
An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques By Jiang Wu, Sarma Vangala, Lixin Gao, Kevin Kwiat [Adobe Acrobat]
New Streaming Algorithms for Fast Detection of Superspreaders By Shobha Venkataraman, Dawn Song, Phillip B. Gibbons, Avrim Blum [Adobe Acrobat]
Computer Viruses, A Very Real Threat By Bill Glover [Adobe Acrobat]
Biological Models of Security for Virus Propagation in Computer Networks By Sanjay Goel, Stephen F. Bush [Adobe Acrobat]
[Broken]Constructing Computer Virus Phylogenies By Leslie Ann Goldberg, Paul W. Goldberg, Cynthia A. Phillips, Gregory B. Sorkin [GhostScript/GSView]
[Broken]Constructing Computer Virus Phylogenies By Leslie Ann Goldberg, Paul W. Goldberg, Cynthia A. Phillips, Gregory B. Sorkin [GhostScript/GSView]
Adaptive Defense Against Various Network Attacks By Don Towsley, Cliff Changchun Zou, Nick Duffield, Weibo Gong [Adobe Acrobat]
Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
A Firewall Network System for Worm Defense in Enterprise Networks By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]
Monitoring and Early Warning for Internet Worms By Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley [Adobe Acrobat]
Feedback Email Worm Defense System for Enterprise Network By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
The Monitoring and Early Detection of Internet Worms By Cliff Changchun Zou, Weibo Gong, Don Towsley, Lixin Gao [Adobe Acrobat]
Routing Worm: A Fast, Selective Attack Worm based on IP Address Information By Cliff Changchun Zou, Don Towsley, Weibo Gong, Songlin Cai [Adobe Acrobat]
Email Virus Propagation Modeling and Analysis By Cliff Changchun Zou, Don Towsley, Weibo Gong
[Broken]Code red worm propagation modeling and analysis By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
On the Performance of Internet Worm Scanning Strategies By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]
Where There's Smoke, There's Mirrors: The Truth About Trojan Horses By David M. Chess, Sarah Gordon
Attitude Adjustment: Trojans and Malware on the Internet By David M. Chess, Sarah Gordon [Adobe Acrobat]
Hoaxes & Hypes By Richard Ford, Sarah Gordon, Joe Wells
When Worlds Collide: Information Sharing for the Security and Anti-Virus Community By Richard Ford, Sarah Gordon
Anti-Virus Product Evaluation in the Real World By Richard Ford, Sarah Gordon [Adobe Acrobat]
[WEB ARCHIVE]Sheep: Fact or Fiction By Sarah Gordon
Are Good Virus Simulators Still a Bad Idea? By Sarah Gordon
[WEB ARCHIVE]Why Computer Viruses Are Not - and never were - A Problem By Sarah Gordon
Technologically Enabled Crime: Shifting Paradigms for the Year 2000 By Sarah Gordon
The Generic Virus Writer By Sarah Gordon
The Generic Virus Writer II By Sarah Gordon
Inside the Mind of Dark Avenger By Sarah Gordon
The Anti-Virus Strategy System By Sarah Gordon
Virus Writers: The End of Innocence? By Sarah Gordon
What Is Wild? By Sarah Gordon [Adobe Acrobat]
Testing Time for Antivirus Software By Sarah Gordon [Adobe Acrobat]
[WEB ARCHIVE]Whats In a Name? By Sarah Gordon
[WEB ARCHIVE]Who Writes This Stuff? By Sarah Gordon
[WEB ARCHIVE]Viruses in the Information Age By Sarah Gordon
Faces Behind The Masks By Sarah Gordon
AntiVirus Software Testing for the Year 2000 and Beyond By Sarah Gordon, Fraser Howard [Adobe Acrobat]
[Broken]Viruses Through the Ages (or) Girls can't be scientists By Sarah Gordon [Open Office]
Least Effort Strategies for Cybersecurity By Sean P. Gorman, Rajendra G. Kulkarni, Laurie A. Schintler, Roger R. Stough [Adobe Acrobat]
SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
[Compressed]Using Sensor Networks and Data Fusion for Early Detection By Vincent Berk, Robert S. Gray, George Bakos [GhostScript/GSView]
A Cooperative Immunization System for an Untrusting Internet By Kostas G. Anagnostakis, Angelos Keromytis, Micheal B. Greenwald, Sotiris Ioannidis, Dekai Li [Adobe Acrobat]
Flash Worms: Thirty Seconds to Infect the Internet. By Gary Grim, Stuart Staniford, Roelof Jonkman
Towards an Approach for Automatically Repairing Compromised Network Systems By Henry Owen, Julian B. Grizzard, Sven Krasser, Gregory J. Conti, Eric R. Dodson [Adobe Acrobat]
Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]
[WEB ARCHIVE]Scanners of The Year 2000: Heuristics By Dmitry O. Gryaznov
Malware in Popular Networks By Dmitry O. Gryaznov [Adobe Acrobat]
HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
Worm Detection Using Local Networks By Xinzhou Qin, David Dagon, Guofei Gu, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]
Using Predators to Combat Worms and Viruses: A Simulation-Based Study By Ajay Gupta, Daniel C. DuVarney [Adobe Acrobat]
An Approach For Detecting Self-Propagating Email Using Anomaly Detection By Ajay Gupta, R. Sekar [Adobe Acrobat]
Preliminary Results Using Scale-Down To Explore Worm Dynamics By Nicholas Weaver, Vern Paxson , Ihab Hamadeh, George Kesidis [Adobe Acrobat]
Computer Viruses By Markus Hanhisalo
SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
A Comparison Study of Three Worm Families and Their Propagation in a Network By Daniel Hanson, Bartek Kostanecki, Richard Jagodzinski, Jason V. Miller
[Broken]Managing Malware - Mapping Technology to Function By David A. Harley [Adobe Acrobat]
Re-Floating the Titanic: Dealing with Social Engineering Attacks By David A. Harley
Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]
Mobile Agents: are they a good idea? By David M. Chess, Colin Harrison, Aaron Kershenbaum [GhostScript/GSView]
An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms By L. Hebbes, A. P. Lenaghan, C. Onwubiko [Adobe Acrobat]
An API For Worm-Defense Evaluation By Karl Levitt, Todd Heberlien, Denys Ma, Senthilkumar G. Cheetancheri [GhostScript/GSView]
[Broken]Risks and Dangers of Security Extensions By Hans Hedbom, Stefan Lindskog, Erland Jonsson [Adobe Acrobat]
Malicious Code In Depth By Mohammad Heidari [Adobe Acrobat]
[Broken]Detecting Early Worm Propagation through Packet Matching By Xuan Chen, John Heidemann [Adobe Acrobat]
Automatic and Controlled Virus Code Execution System By Marko Helenius
[Broken]Problems, Advantages and Disadvantages of Malware Testing By Marko Helenius [Adobe Acrobat]
[FTP][Compressed]Automatic and Controlled Macro Virus Execution and Automating the Windows Environment By Marko Helenius
A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers By Ankur Jain, Joseph M. Hellerstein, Sylvia Ratnasamy, David Wetherall [Adobe Acrobat]
Experiences with Worm Propagation Simulations By Arno Wagner, Bernhard Plattner, Thomas Dubendorfer, Roman Hiestand [Adobe Acrobat]
[Broken]Early Bird: Catching Worms While SysAdmins Sleep By Andrew Hill [Adobe Acrobat]
SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks By Felix C. Freiling, Thorsten Holz, Georg Wicherski [Adobe Acrobat]
A Closer Look at the Worm_Mimail.A By Charles Hornat
AntiVirus Software Testing for the Year 2000 and Beyond By Sarah Gordon, Fraser Howard [Adobe Acrobat]
[Broken]?Gate Expectations? : Groupware Anti-Virus Scanners By Fraser Howard [Adobe Acrobat]
Computer virus prevention;a primer By Jan Hruska [Adobe Acrobat]
Detecting Unknown Massive Mailing Viruses Using Proactive Methods By Ruiqi Hu, Aloysius K. Mok [Adobe Acrobat]
[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]
The "Worm" Programs Early Experience With A Distributed Computation By John F. Shoch, Jon A. Hupp [Adobe Acrobat]
Effect of Malicious Traffic on the Network By Kun-chan Lan, Alefiya Hussain, Debojyoti Dutta [Adobe Acrobat]
Collaborative Internet Worm Containment By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen [Adobe Acrobat]
WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees By Min Cai, Kai Hwang, Shanshan Song, Runfang Zhou, Christos Papodopoulos [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]
Virus Activation Routines By Mikko Hypponen
Retroviruses - how viruses fight back By Mikko Hypponen
WAP and Viruses - Can Your Mobile Phone Get Infected? By Mikko Hypponen [Adobe Acrobat]
A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]
A Cooperative Immunization System for an Untrusting Internet By Kostas G. Anagnostakis, Angelos Keromytis, Micheal B. Greenwald, Sotiris Ioannidis, Dekai Li [Adobe Acrobat]
Can a Network be Protected from Single-Packet Warhol Worms? By Larry G. Irwin, Richard J. Enbody [Adobe Acrobat]
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds By Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger
A Comparison Study of Three Worm Families and Their Propagation in a Network By Daniel Hanson, Bartek Kostanecki, Richard Jagodzinski, Jason V. Miller
A Hybrid Honeypot Architecture For Scalable Network Monitoring By Micheal Bailey, Evan Cooke, David Watson, Farnam Jahanian, Niels Provos [Adobe Acrobat]
Worm Hotspots: Explaining Non-Uniformity in Worm Targeting Behavior By Evan Cooke, Morley Mao, Farnam Jahanian [Adobe Acrobat]
The Internet Motion Sensor: A distributed Blackhole Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Farnam Jahanian, Jose Nazario [Adobe Acrobat]
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]
The Internet Motion Sensor: A Distributed Global Scoped Internet Threat Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Jose Nazario, Farnam Jahanian [Adobe Acrobat]
A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers By Ankur Jain, Joseph M. Hellerstein, Sylvia Ratnasamy, David Wetherall [Adobe Acrobat]
Abstraction-Based Intrusion Detection In Distributed Environments By Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang [Adobe Acrobat]
CARDS: A distributed system for detecting coordinated attacks By Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia [Adobe Acrobat]
Impact of network design on worm propagation By Brian Carrier, Sundararaman Jeyaraman, Sarah Sel [Adobe Acrobat]
[Broken]Testing Malware Detectors By Mihai Christodorescu, Somesh Jha [Adobe Acrobat]
A Self-Learning Worm Using Importance Scanning By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
Spatial-Temporal Modeling of Malware Propagation in Networks By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
Importance-Scanning Worm Using Vulnerable-Host Distribution By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
[FTP]Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities By Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev [Adobe Acrobat]
Virtual Playgrounds For Worm Behavior Investigation By Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford [Adobe Acrobat]
Collapsar: A VM-Based Architecture for Network Attack Detention By Xuxian Jiang, Dongyan Xu [Open Office]
Worm Meets Beehive By Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun [Adobe Acrobat]
[Compressed]Multiscale modeling and simulation of worm effects on the internet routing infrastructure By David Nicol, Micheal Liljenstam, Jason Jiu [Adobe Acrobat]
Flash Worms: Thirty Seconds to Infect the Internet. By Gary Grim, Stuart Staniford, Roelof Jonkman
[Broken]Risks and Dangers of Security Extensions By Hans Hedbom, Stefan Lindskog, Erland Jonsson [Adobe Acrobat]
A Two-Layer Approach for Novel Email Worm Detection By Steve Martin, Anil Sewani, Blaine Nelson, Karl Chen, Anthony D. Joseph [Adobe Acrobat]
Internet Worms As Internet-wide Threat By Nikolai Joukov, Tzi-cker Chiueh [Adobe Acrobat]
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning By Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung [Adobe Acrobat]
Inoculating SSH Against Address-Harvesting Worms By Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain [Adobe Acrobat]
Fast Detection of Scanning Worm Infections By Jaeyeon Jung, Stuart E. Schechter, Arthur Berger [Adobe Acrobat]
[Broken]Multiplatform Attack - In the Land of Hoaxes By Jakub Kaminski
[Broken]Is There Any Future For Linux Viruses? By Jakub Kaminski [Adobe Acrobat]
The Effect of DNS Delays on Worm Propagation in an IPv6 Internet By Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos Keromytis [Adobe Acrobat]
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds By Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger
Impeding worm epidemics through destination address filtering By Hyogon Kim, Inhye Kang [Adobe Acrobat]
On the Functional Validity of the Worm-Killing Worm By Hyogon Kim, Inhye Kang [Adobe Acrobat]
Analyzing Cooperative Containment of Fast Scanning Worms By Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz [Adobe Acrobat]
Implications of Peer-to-Peer Networks on Worm Attacks and Defenses By Jayanthkumar Kannan, Karthik Lakshminarayanan [Adobe Acrobat]
Autograph: Toward Automated, Distributed Worm Signature Detection By Hyang-Ah Kim, Brad Karp [Adobe Acrobat]
Hide 'N Seek Revisited - Full Stealth Is Back By Kimmo Kasslin, Mika Stahlberg, Samuli Larvala, Antti Tikkanen [Adobe Acrobat]
Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds By Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger
Protocol-Independent Adaptive Replay of Application Dialog By Weidong Cui, Vern Paxson , Nicholas Weaver, Randy H. Katz [Adobe Acrobat]
Analyzing Cooperative Containment of Fast Scanning Worms By Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz [Adobe Acrobat]
[Compressed]Attack Languages By Giovanni Vigna, Steven T. Eckmann, Richard A. Kemmerer [GhostScript/GSView]
[Compressed]STATL: An Attack Language for State-based Intrusion Detection By Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer [GhostScript/GSView]
Automatic Extraction of Computer Virus Signatures By Jeffrey O. Kephart, William C. Arnold
Computer Viruses: A Global Perspective By Steve R. White, Jeffrey O. Kephart, David M. Chess
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
[Broken]Fighting Computer Viruses By Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess
Neural Networks for Computer Virus Recognition By Jeffrey O. Kephart, Gerald Tesauro, Gregory B. Sorkin
How Prevalent are Computer Viruses? By Jeffrey O. Kephart, Steve R. White
[Broken]Measuring Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Measuring and Modeling Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Directed-Graph Epidemological Models of Computer Viruses By Jeffrey O. Kephart, Steve R. White
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
How Topology Affects Population Dynamics By Jeffrey O. Kephart
A Biologically Inspired Immune System for Computers By Jeffrey O. Kephart
Measuring and Modeling Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
A Biologically Inspired Immune System for Computers By Jeffrey O. Kephart
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
Worm Propagation Strategies In An IPv6 Internet By Steve Bellovin, Bill Cheswick, Angelos Keromytis [Adobe Acrobat]
A Cooperative Immunization System for an Untrusting Internet By Kostas G. Anagnostakis, Angelos Keromytis, Micheal B. Greenwald, Sotiris Ioannidis, Dekai Li [Adobe Acrobat]
The Effect of DNS Delays on Worm Propagation in an IPv6 Internet By Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos Keromytis [Adobe Acrobat]
A Network Worm Vaccine Architecture By Stelios Sidiroglou, Angelos Keromytis [Adobe Acrobat]
[Broken]Countering Network Worms Through Automatic Patch Generation By Stelios Sidiroglou, Angelos Keromytis [Adobe Acrobat]
Mobile Agents: are they a good idea? By David M. Chess, Colin Harrison, Aaron Kershenbaum [GhostScript/GSView]
Transaction-based Anomaly Detection By Roland Büschkes, Mark Borning, Dogan Kesdogan
Detecting New Malicious Code Using N-grams Signatures By Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan [Adobe Acrobat]
Preliminary Results Using Scale-Down To Explore Worm Dynamics By Nicholas Weaver, Vern Paxson , Ihab Hamadeh, George Kesidis [Adobe Acrobat]
A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks By Syed A. Khayam, Hayder Radha [Adobe Acrobat]
Using Signal Processing Techniques to Model Worm Propagation over Wireless Sensor Networks By Syed A. Khayam, Hayder Radha [Adobe Acrobat]
Analyzing the Spread of Active Worms over VANET By Syed A. Khayam, Hayder Radha [Adobe Acrobat]
[FTP]Infection of PC Compatible Computers By Stephen E. Kiel , Raymond K. Lee
Impeding worm epidemics through destination address filtering By Hyogon Kim, Inhye Kang [Adobe Acrobat]
On the Functional Validity of the Worm-Killing Worm By Hyogon Kim, Inhye Kang [Adobe Acrobat]
Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance By Jungwon Kim, William 0. Wilson, Uwe Aickelin, Julie McLeod [Adobe Acrobat]
Detecting Traffic Anomalies through aggregate analysis of packet header data By Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci [Adobe Acrobat]
[Broken]Optimal Control of Treatment Costs for Internet Worm By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]
[Broken]Measurement and Analysis of Worm Propagation on Internet Network Topology By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]
Seurat: A Pointillist Approach to Anomaly Detection By Yinglian Xie, Hyang-Ah Kim, David R. OHallaron, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Autograph: Toward Automated, Distributed Worm Signature Detection By Hyang-Ah Kim, Brad Karp [Adobe Acrobat]
Polymorphic Worm Detection Using Structural Information of Executables By Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna [Adobe Acrobat]
[FTP]On Computer Viral Infection and the Effect of Immunization By Chenxi Wang, John C. Knight, Matthew C. Elder [Adobe Acrobat]
The Design and Evaluation of a Defense System for Internet Worms By Riccardo Scandariato, John C. Knight [Adobe Acrobat]
An Automated Defense System to Counter Internet Worms By Riccardo Scandariato, John C. Knight [Adobe Acrobat]
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffice By Oleg Kolesnikov, Wenke Lee [Adobe Acrobat]
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic By Oleg Kolesnikov, Wenke Lee [Adobe Acrobat]
SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
A Comparison Study of Three Worm Families and Their Propagation in a Network By Daniel Hanson, Bartek Kostanecki, Richard Jagodzinski, Jason V. Miller
Addressing Malicious SMTP-based Mass-Mailing Activity Within An Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
ARP-based Detection of Scanning Worms Within an Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
DNS-based Detection of Scanning Worms in an Enterprise Network By David Whyte, Evangelos Kranakis, P. C. van Oorschot [Adobe Acrobat]
Towards an Approach for Automatically Repairing Compromised Network Systems By Henry Owen, Julian B. Grizzard, Sven Krasser, Gregory J. Conti, Eric R. Dodson [Adobe Acrobat]
Honeycomb - Creating Intrusion Detection Signatures Using Honeypots By Christian Kreibich, Jon Crowcroft [Adobe Acrobat]
Polymorphic Worm Detection Using Structural Information of Executables By Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna [Adobe Acrobat]
Connection-history based anomaly detection By Thomas Toth, Christopher Kruegel [Adobe Acrobat]
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection By John Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks [Adobe Acrobat]
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware By John Lockwood, James Moscola, Matthew Kulig, David Reddick, Tim Brooks [Adobe Acrobat]
Least Effort Strategies for Cybersecurity By Sean P. Gorman, Rajendra G. Kulkarni, Laurie A. Schintler, Roger R. Stough [Adobe Acrobat]
A Generic Virus Scanner in C By Sundeep Kumar, Eugene H. Spafford [Adobe Acrobat]
Outwitting the Witty Worm: Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event By Nicholas Weaver, Vern Paxson , Abhishek Kumar
MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]
IBM: Coping With Computer Viruses and Related Problems By Steve R. White, David M. Chess, Jimmy Kuo
Free Macro Anti-Virus Techniques By Jimmy Kuo
Deep Inside an AntiVirus Engine By Jimmy Kuo
Stay Safe Online Campaign's AntiVirus Presentation By Jimmy Kuo [Adobe Acrobat]
Free Anti-Virus Tips and Techniques Common Sense Methods to Protect Yourself from Macro Viruses By Jimmy Kuo [Adobe Acrobat]
[WEB ARCHIVE]That's Not a Virus! By Jimmy Kuo
Computer Virus Attacks By John P. Wack, Stanley A. Kurzban
Modeling the Spread of Active Worms By Zesheng Chen, Lixin Gao, Kevin Kwiat [Adobe Acrobat]
An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques By Jiang Wu, Sarma Vangala, Lixin Gao, Kevin Kwiat [Adobe Acrobat]
Collaborative Internet Worm Containment By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks By John Levine, Richard LaBella, Henry Owen, Didier Contis, Brian Culver [Adobe Acrobat]
Analysis of BGP Update Surge during Slammer Worm Attack By Mohit Lad, Xiaoliang Zhao, Beichuan Zhang, Dan Massey, Lixia Zhang [Adobe Acrobat]
When JAVA Was One: Threats From Hostile Byte Code By Mark D. Ladue [Adobe Acrobat]
Correlation between NetFlow System and Network Views for Intrusion Detection By Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, William Yurcik [Adobe Acrobat]
Implications of Peer-to-Peer Networks on Worm Attacks and Defenses By Jayanthkumar Kannan, Karthik Lakshminarayanan [Adobe Acrobat]
[WEB ARCHIVE]Fully Automated Response for In The Wild viruses By Micheal Lambert
Effect of Malicious Traffic on the Network By Kun-chan Lan, Alefiya Hussain, Debojyoti Dutta [Adobe Acrobat]
Hide 'N Seek Revisited - Full Stealth Is Back By Kimmo Kasslin, Mika Stahlberg, Samuli Larvala, Antti Tikkanen [Adobe Acrobat]
MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]
Dynamic Detection and Classification of Computer Viruses Using General Behaviour Patterns By Baudouin Le Charlier, Abdelaziz Mounji , Morton Swimmer [GhostScript/GSView]
The HoneyTank: A Scalable Approach To Collect Malicious Internet Traffic By Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier [Adobe Acrobat]
[FTP]Infection of PC Compatible Computers By Stephen E. Kiel , Raymond K. Lee
Behavioral Classification By Tony Lee, Jiggar J. Mody [Open Office]
Modelling Botnet Propagation Using Time Zones By David Dagon, Cliff Changchun Zou, Wenke Lee [Adobe Acrobat]
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffice By Oleg Kolesnikov, Wenke Lee [Adobe Acrobat]
HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
Simulating Internet Worms By George F. Riley, Monirul I. Sharif, Wenke Lee [Adobe Acrobat]
Worm Detection Using Local Networks By Xinzhou Qin, David Dagon, Guofei Gu, Wenke Lee [Adobe Acrobat]
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic By Oleg Kolesnikov, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning By Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung [Adobe Acrobat]
Worm Meets Beehive By Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun [Adobe Acrobat]
Reductions of the general virus detection problem By Ferenc Leitold [Adobe Acrobat]
Mathematical Model of a Computer Virus By Ferenc Leitold [Adobe Acrobat]
An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms By L. Hebbes, A. P. Lenaghan, C. Onwubiko [Adobe Acrobat]
Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks By John Levine, Richard LaBella, Henry Owen, Didier Contis, Brian Culver [Adobe Acrobat]
HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
An API For Worm-Defense Evaluation By Karl Levitt, Todd Heberlien, Denys Ma, Senthilkumar G. Cheetancheri [GhostScript/GSView]
A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]
A Cooperative Immunization System for an Untrusting Internet By Kostas G. Anagnostakis, Angelos Keromytis, Micheal B. Greenwald, Sotiris Ioannidis, Dekai Li [Adobe Acrobat]
Correlation between NetFlow System and Network Views for Intrusion Detection By Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, William Yurcik [Adobe Acrobat]
Aggregating Detectors for New Worm Identification By Eric Anderson, Jun Li [Adobe Acrobat]
Models of Internet Worm Defens By David Nicol, Micheal Liljenstam [Adobe Acrobat]
Comparing Passive and Active Worm Defenses By Micheal Liljenstam, David Nicol [Adobe Acrobat]
Models of Active Worm Defenses By David Nicol, Micheal Liljenstam [Adobe Acrobat]
[Compressed]Multiscale modeling and simulation of worm effects on the internet routing infrastructure By David Nicol, Micheal Liljenstam, Jason Jiu [Adobe Acrobat]
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations By Micheal Liljenstam, Yuan Yougu, BJ Premore, David Nicol [Adobe Acrobat]
[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]
[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]
[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]
Epidemic Profiles And Defense Of Scale-Free Networks By Linda Briesemeister, Patrick Lincoln, Phillip Porras [Adobe Acrobat]
[Broken]Risks and Dangers of Security Extensions By Hans Hedbom, Stefan Lindskog, Erland Jonsson [Adobe Acrobat]
Internet Worm Detection as part of a Distributed Network Inspection System By Eamonn Linehan [Adobe Acrobat]
Server-based Virus-protection On Unix/Linux By Rainer Link [Adobe Acrobat]
Worm and Virus Defense: How We Can Protect the Nation's Computers From These Threats Today By Thomas Liston [Adobe Acrobat]
Design of a System for Real-Time Worm Detection By Bharath Madhusudan, John Lockwood [Adobe Acrobat]
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection By John Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks [Adobe Acrobat]
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware By John Lockwood, James Moscola, Matthew Kulig, David Reddick, Tim Brooks [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]
[Broken]Information Assurance and the Information Society By Eric A.M. Luiijf [Adobe Acrobat]
Russian Anti-Virus Technology Versus Western Tools By Yury Lyashchenko , Dmitry Mostovoy
An API For Worm-Defense Evaluation By Karl Levitt, Todd Heberlien, Denys Ma, Senthilkumar G. Cheetancheri [GhostScript/GSView]
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
The Macro Virus and Virus Scanning Software: An analysis of their interaction By William A. Macchione [Adobe Acrobat]
Design of a System for Real-Time Worm Detection By Bharath Madhusudan, John Lockwood [Adobe Acrobat]
Worm Origin Identification Using Random Walks By Yinglian Xie, Vyas Sekar, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Toward a Framework for Internet Forensic Analysis By Vyas Sekar, Yinglian Xie, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Trojan White Paper By Aelphaeis Mangarae [Adobe Acrobat]
Worm Hotspots: Explaining Non-Uniformity in Worm Targeting Behavior By Evan Cooke, Morley Mao, Farnam Jahanian [Adobe Acrobat]
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]
[Broken]Defending Against Hitlist Worms Using Network Address Space Randomization By S. Antonatos, P. Akritidis, E. P. Markatos, Kostas G. Anagnostakis [Adobe Acrobat]
Efficient Content-Based Detection of Zero-Day Worms By P. Akritidis, Kostas G. Anagnostakis, E. P. Markatos [Adobe Acrobat]
A Two-Layer Approach for Novel Email Worm Detection By Steve Martin, Anil Sewani, Blaine Nelson, Karl Chen, Anthony D. Joseph [Adobe Acrobat]
Semi-Supervised Learning on Email Characteristics for Novel Worm Detection By Steve Martin, Anil Sewani [Adobe Acrobat]
[Compressed]A Guideline to Anti-Malware Software Testing By Andreas Marx [Adobe Acrobat]
Analysis of BGP Update Surge during Slammer Worm Attack By Mohit Lad, Xiaoliang Zhao, Beichuan Zhang, Dan Massey, Lixia Zhang [Adobe Acrobat]
The Effect Of Network Topology On The Spread Of Epidemics By Ayalvadi Ganesh, L. Massoulie, Don Towsley [Adobe Acrobat]
Indirect Detection Of Mass Mailing Worm-Infected PC Terminals For Learners By Yasuo Musashi, Ryuichi Matsuba, Kenichi Sugitani [Adobe Acrobat]
Detection of Mass Mailing Worm-infected IP address by Analysis of Syslog for DNS server By Ryuichi Matsuba, Kenichi Sugitani, Yasuo Musashi [Adobe Acrobat]
Traffic Analysis on a Mass Mailing Worm and DNS/SMTP By Yasuo Musashi, Kenichi Sugitani, Ryuichi Matsuba [Adobe Acrobat]
Internet Worms: Walking on Unstable Ground By Jon Maurer [Adobe Acrobat]
Inoculating SSH Against Address-Harvesting Worms By Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain [Adobe Acrobat]
Bot Software Spreads, Causes New Worries By Laurianne McLaughlin [Adobe Acrobat]
Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance By Jungwon Kim, William 0. Wilson, Uwe Aickelin, Julie McLeod [Adobe Acrobat]
[WEB ARCHIVE]Advanced Virus Detection Technology for the Next Millennium By Jed McNeil, Lisa Milburn
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]
A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]
[Broken]The coming age of defensive worms By David Meltzer [Open Office]
[WEB ARCHIVE]Advanced Virus Detection Technology for the Next Millennium By Jed McNeil, Lisa Milburn
SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
A Comparison Study of Three Worm Families and Their Propagation in a Network By Daniel Hanson, Bartek Kostanecki, Richard Jagodzinski, Jason V. Miller
Avfs: An On-Access Anti-Virus File System By Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok
Distributed Worm Simulation with a Realistic Internet Model By Sonjie Wei, Jelena Mirkovic, Martin Swany [Adobe Acrobat]
The Effect of DNS Delays on Worm Propagation in an IPv6 Internet By Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos Keromytis [Adobe Acrobat]
Behavioral Classification By Tony Lee, Jiggar J. Mody [Open Office]
Detecting Unknown Massive Mailing Viruses Using Proactive Methods By Ruiqi Hu, Aloysius K. Mok [Adobe Acrobat]
On the Effectiveness of Distributed Worm Monitoring By Andreas Terzis, Fabian Monrose, Moheeb Abu Rajab [Adobe Acrobat]
The Nyxem Email Virus: Analysis and Inferences By David Moore, Colleen Shannon
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
Code-Red: A Case Study on the Spread and Victims of an Internet Worm By David Moore, Colleen Shannon, Jeffery Brown [Adobe Acrobat]
Internet Quarantine: Requirements for Containing Self-Propagating Code By David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
The Top Speed Of Flash Worms By Stuart Staniford, David Moore, Vern Paxson , Nicholas Weaver [Adobe Acrobat]
The Spread of the Witty Worm By Colleen Shannon, David Moore
The Case for Beneficial Computer Viruses and Worms: A Student's Perspective By Gregory A. Moorer [Adobe Acrobat]
An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
Web Browsers - Threat or Menace By John F. Morar, David M. Chess
Is Java Still Secure? By David M. Chess, John F. Morar
Can Cryptography Prevent Computer Viruses? By David M. Chess, John F. Morar
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar
Processing Virus Collections By Peter Morley [Adobe Acrobat]
Designing a Framework for Active Worm Detection on Global Networks By Vincent Berk, George Bakos, Robert Morris [Adobe Acrobat]
Blaster Revisited By Jim Morrison
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection By John Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks [Adobe Acrobat]
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware By John Lockwood, James Moscola, Matthew Kulig, David Reddick, Tim Brooks [Adobe Acrobat]
Russian Anti-Virus Technology Versus Western Tools By Yury Lyashchenko , Dmitry Mostovoy
Modern Methods of Detecting and Eradicating Known and Unknown Viruses By Dmitry Mostovoy
A Method of Detecting and Eradicating Known and Unknown Viruses By Dmitry Mostovoy
Dynamic Detection and Classification of Computer Viruses Using General Behaviour Patterns By Baudouin Le Charlier, Abdelaziz Mounji , Morton Swimmer [GhostScript/GSView]
[Broken][Compressed]Languages and Tools for Rule-Based Distributed Intrusion Detection By Abdelaziz Mounji [GhostScript/GSView]
Indirect Detection Of Mass Mailing Worm-Infected PC Terminals For Learners By Yasuo Musashi, Ryuichi Matsuba, Kenichi Sugitani [Adobe Acrobat]
Detection of Mass Mailing Worm-infected IP address by Analysis of Syslog for DNS server By Ryuichi Matsuba, Kenichi Sugitani, Yasuo Musashi [Adobe Acrobat]
Detection of Mass Mailing Worm-infected PC terminals by Observing DNS Query Access By Yasuo Musashi, Kai Rannenberg [Adobe Acrobat]
Traffic Analysis on a Mass Mailing Worm and DNS/SMTP By Yasuo Musashi, Kenichi Sugitani, Ryuichi Matsuba [Adobe Acrobat]
[FTP]Starship: Interesting Boot Sector Virus By Igor G. Muttik
Comparing The Comparatives By Igor G. Muttik [Adobe Acrobat]
Polymorphic Worm Detection Using Structural Information of Executables By Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna [Adobe Acrobat]
[WEB ARCHIVE]The Future of Malware By Stephen Trilling , Carey Nachenberg [Adobe Acrobat]
Computer Parasitology By Carey Nachenberg [Adobe Acrobat]
Mobile Code Threats, Fact or Fiction By Carey Nachenberg [Adobe Acrobat]
The Evolving Virus Threat By Carey Nachenberg [Adobe Acrobat]
Computer Parasitology By Carey Nachenberg [Adobe Acrobat]
Sandbox Technology Inside AV Scanners By Kurt Natvig [Adobe Acrobat]
The Internet Motion Sensor: A distributed Blackhole Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Farnam Jahanian, Jose Nazario [Adobe Acrobat]
The Internet Motion Sensor: A Distributed Global Scoped Internet Threat Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Jose Nazario, Farnam Jahanian [Adobe Acrobat]
A Two-Layer Approach for Novel Email Worm Detection By Steve Martin, Anil Sewani, Blaine Nelson, Karl Chen, Anthony D. Joseph [Adobe Acrobat]
Models of Internet Worm Defens By David Nicol, Micheal Liljenstam [Adobe Acrobat]
Comparing Passive and Active Worm Defenses By Micheal Liljenstam, David Nicol [Adobe Acrobat]
Challenges In Using Simulation to Explain Global Routing Instability By David Nicol [Adobe Acrobat]
Models of Active Worm Defenses By David Nicol, Micheal Liljenstam [Adobe Acrobat]
[Compressed]Multiscale modeling and simulation of worm effects on the internet routing infrastructure By David Nicol, Micheal Liljenstam, Jason Jiu [Adobe Acrobat]
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations By Micheal Liljenstam, Yuan Yougu, BJ Premore, David Nicol [Adobe Acrobat]
Abstraction-Based Intrusion Detection In Distributed Environments By Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang [Adobe Acrobat]
CARDS: A distributed system for detecting coordinated attacks By Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia [Adobe Acrobat]
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning By Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung [Adobe Acrobat]
Recognizing and Recovering from Rootkit Attacks By David OBrien
Seurat: A Pointillist Approach to Anomaly Detection By Yinglian Xie, Hyang-Ah Kim, David R. OHallaron, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms By L. Hebbes, A. P. Lenaghan, C. Onwubiko [Adobe Acrobat]
[Broken]Approaches to Integrated Malware Detection and Avoidance By Simone Fischer-Hübner, Amon Ott, Morton Swimmer [Adobe Acrobat]
[Broken]Towards Evil Honeypots?! When they bite back... By Laurent Oudot [Adobe Acrobat]
FAT32 - a new problem for anti-virus or viruses? By Martin Overton
Anti-Virus in the Corporate Arena By Martin Overton [Adobe Acrobat]
Viruses and Lotus Notes:- Have the Virus Writers Finally Met Their Match By Martin Overton [Adobe Acrobat]
Implementing Anti-Virus (Anti-Malware) Controls in the Corporate Arena By Martin Overton [Adobe Acrobat]
Spyware: Risks, Issues and Prevention By Martin Overton [Adobe Acrobat]
Bots and Botnets - Risks, Issues and Prevention By Martin Overton [Adobe Acrobat]
Anti-Malware Tools: Intrusion Detection Systems By Martin Overton [Adobe Acrobat]
Worm Charming: Taking SMB Lure To The Next Level By Martin Overton [Adobe Acrobat]
Canning More Than SPAM With Bayesian Filtering By Martin Overton [Adobe Acrobat]
Zo-To-Business By Martin Overton [Adobe Acrobat]
Malware in a Pig Pen part 1 By Martin Overton [Adobe Acrobat]
Malware in a Pig Pen part 2 By Martin Overton [Adobe Acrobat]
Mind Wars: Attack of the Memes By Martin Overton [Adobe Acrobat]
You are the Weakest Link, Goodbye! – Passwords, Malware and You By Martin Overton [Adobe Acrobat]
Out of Africa… By Martin Overton [Adobe Acrobat]
Are You Being [Opa]Serv[ed]? By Martin Overton [Adobe Acrobat]
When Worlds Collide: Head Banging in IT Security By Martin Overton [Adobe Acrobat]
You are the Weakest Link, Goodbye! – Malware Social Engineering Comes of Age By Martin Overton [Adobe Acrobat]
Hoaxes and other electronic ephemera: Taming the Beast (or at least managing it) By Martin Overton [Adobe Acrobat]
Safe Hex in the 21st Century – Part 2 By Martin Overton [Adobe Acrobat]
Safe Hex in the 21st Century – Part 1 By Martin Overton [Adobe Acrobat]
Lotus Notes – Part 2 By Martin Overton [Adobe Acrobat]
Lotus Notes – Part 1 By Martin Overton [Adobe Acrobat]
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks By John Levine, Richard LaBella, Henry Owen, Didier Contis, Brian Culver [Adobe Acrobat]
HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
Design and Implementation of a Lab Worm By Christopher Church, Tim Schmoyer, Henry Owen [Adobe Acrobat]
Towards an Approach for Automatically Repairing Compromised Network Systems By Henry Owen, Julian B. Grizzard, Sven Krasser, Gregory J. Conti, Eric R. Dodson [Adobe Acrobat]
[WEB ARCHIVE]Viruses in France: The French Connection II By Francois Paget [Adobe Acrobat]
Computer Viruses: The Technological Leap By Francois Paget [Adobe Acrobat]
Using Plant Epidemiological Methods To Track Computer Network Worms By Rishikesh Pande [Adobe Acrobat]
[Broken]Characteristics of Internet Background Radiation By Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson , Larry Peterson [Adobe Acrobat]
WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees By Min Cai, Kai Hwang, Shanshan Song, Runfang Zhou, Christos Papodopoulos [Adobe Acrobat]
Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]
[Broken]How to Own the Internet in Your Spare Time. By Nicholas Weaver, Vern Paxson , Stuart Staniford
Protocol-Independent Adaptive Replay of Application Dialog By Weidong Cui, Vern Paxson , Nicholas Weaver, Randy H. Katz [Adobe Acrobat]
Preliminary Results Using Scale-Down To Explore Worm Dynamics By Nicholas Weaver, Vern Paxson , Ihab Hamadeh, George Kesidis [Adobe Acrobat]
Outwitting the Witty Worm: Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event By Nicholas Weaver, Vern Paxson , Abhishek Kumar
The Top Speed Of Flash Worms By Stuart Staniford, David Moore, Vern Paxson , Nicholas Weaver [Adobe Acrobat]
Very Fast Containment of Scanning Worms By Nicholas Weaver, Stuart Staniford, Vern Paxson
[Broken]Characteristics of Internet Background Radiation By Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson , Larry Peterson [Adobe Acrobat]
A Worst-Case Worm By Nicholas Weaver, Vern Paxson [Adobe Acrobat]
Fighting Fire with Fire: Designing a "Good" Computer Virus By Cyrus Pelkari
Let Free(dom) Ring! By Peter Szor, Frederic Perriot [Adobe Acrobat]
Chiba Witty Blues By Peter Ferrie, Peter Szor, Frederic Perriot [Adobe Acrobat]
Blast Off! By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]
Virus Analysis 1: Worm Wars By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]
High-Fidelity Modeling of Computer Network Worms By Kalyan S. Perumalla, Srikanth Sundaragopalan [Adobe Acrobat]
Six Bytes By A. Padgett Peterson
[Broken]Characteristics of Internet Background Radiation By Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson , Larry Peterson [Adobe Acrobat]
Requirements On Worm Mitigation Technologies In MANETS By Robert Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis [Adobe Acrobat]
[Broken]Constructing Computer Virus Phylogenies By Leslie Ann Goldberg, Paul W. Goldberg, Cynthia A. Phillips, Gregory B. Sorkin [GhostScript/GSView]
Entropy Based Worm And Anomaly Detection In Fast IP Networks By Arno Wagner, Bernhard Plattner [Adobe Acrobat]
Experiences with Worm Propagation Simulations By Arno Wagner, Bernhard Plattner, Thomas Dubendorfer, Roman Hiestand [Adobe Acrobat]
Epidemic Profiles And Defense Of Scale-Free Networks By Linda Briesemeister, Patrick Lincoln, Phillip Porras [Adobe Acrobat]
Microscopic Simulation Of A Group Defense Strategy By Linda Briesemeister, Phillip Porras [Adobe Acrobat]
Model Checking of Worm Quarantine and Counter-Quarantine under a Group Defense By Linda Briesemeister, Phillip Porras, Ashish Tiwari [Adobe Acrobat]
A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]
SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots By Georgios Portokalidis, Herbert Bos [Adobe Acrobat]
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations By Micheal Liljenstam, Yuan Yougu, BJ Premore, David Nicol [Adobe Acrobat]
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar
A Hybrid Honeypot Architecture For Scalable Network Monitoring By Micheal Bailey, Evan Cooke, David Watson, Farnam Jahanian, Niels Provos [Adobe Acrobat]
A Virtual Honeypot Framework By Niels Provos [Adobe Acrobat]
HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
Worm Detection Using Local Networks By Xinzhou Qin, David Dagon, Guofei Gu, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]
[Broken]The Anti-Viral Software of MS-DOS 6 By Yisreal Radai
[Broken][Compressed]Integrity Checking for Anti-Viral Purposes: Theory and Practice By Yisreal Radai [GhostScript/GSView]
Computer Viruses In Unix Networks By Peter V. Radatti
Plausibility of UNIX Virus Attacks By Peter V. Radatti
Heterogeneous Computer Viruses In A Networked Unix Enviroment By Peter V. Radatti
Anti-Virus for Multimedia Publishers By Peter V. Radatti
CyberSoft Virus Description Language By Peter V. Radatti
A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks By Syed A. Khayam, Hayder Radha [Adobe Acrobat]
Using Signal Processing Techniques to Model Worm Propagation over Wireless Sensor Networks By Syed A. Khayam, Hayder Radha [Adobe Acrobat]
Analyzing the Spread of Active Worms over VANET By Syed A. Khayam, Hayder Radha [Adobe Acrobat]
[Broken]Optimal Control of Treatment Costs for Internet Worm By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]
[Broken]Measurement and Analysis of Worm Propagation on Internet Network Topology By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]
Requirements On Worm Mitigation Technologies In MANETS By Robert Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis [Adobe Acrobat]
On the Effectiveness of Distributed Worm Monitoring By Andreas Terzis, Fabian Monrose, Moheeb Abu Rajab [Adobe Acrobat]
SMB Shares and Worms - A Parasitic Relationship? By Ken Ramsay [Adobe Acrobat]
An Internet-Worm Early Warning System By Shigang Chen, Sanjay Ranka [Adobe Acrobat]
Detection of Mass Mailing Worm-infected PC terminals by Observing DNS Query Access By Yasuo Musashi, Kai Rannenberg [Adobe Acrobat]
A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers By Ankur Jain, Joseph M. Hellerstein, Sylvia Ratnasamy, David Wetherall [Adobe Acrobat]
Malicious cryptography, part one By Frederic Raynal
Malicious cryptography, part two By Frederic Raynal
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection By John Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks [Adobe Acrobat]
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware By John Lockwood, James Moscola, Matthew Kulig, David Reddick, Tim Brooks [Adobe Acrobat]
Detecting Traffic Anomalies through aggregate analysis of packet header data By Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci [Adobe Acrobat]
Seurat: A Pointillist Approach to Anomaly Detection By Yinglian Xie, Hyang-Ah Kim, David R. OHallaron, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Worm Origin Identification Using Random Walks By Yinglian Xie, Vyas Sekar, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Toward a Framework for Internet Forensic Analysis By Vyas Sekar, Yinglian Xie, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
The Effect of Infection Time on Internet Worm Propagation By Erika Rice [Adobe Acrobat]
Simulating Internet Worms By George F. Riley, Monirul I. Sharif, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]
Analysis of the "SQL Slammer" worm and its effects on Indiana University and related institutions By Gregory Travis, Ed Balas, David Ripley, Steven Wallace [Adobe Acrobat]
The Evolution Of Viruses And Worms By Thomas M. Chen, Jean-Marc Robert [Adobe Acrobat]
Worm Epidemics in High-Speed Networks By Thomas M. Chen, Jean-Marc Robert [Adobe Acrobat]
Polymorphic Worm Detection Using Structural Information of Executables By Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna [Adobe Acrobat]
SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
The Safety of Internet Search Engines By Ben Edelman, Hannah Rosenbaum
False Authority Syndrome By Robert Rosenberger
[FTP]Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities By Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev [Adobe Acrobat]
A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]
[FTP]Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Reverse Code Engineering: An In-Depth Analysis of the Bagle Virus By Konstantinin Rozinov [Adobe Acrobat]
Worm Meets Beehive By Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun [Adobe Acrobat]
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning By Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung [Adobe Acrobat]
The Case For Using Layered Defenses To Stop Worms By David J. Albanese, Micheal J. Wiacek, Christopher M. Salter, Jeffrey A. Six [Adobe Acrobat]
Rootkits: The new wave of invisible malware is here By David Sancho [Adobe Acrobat]
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
Internet Quarantine: Requirements for Containing Self-Propagating Code By David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
The EarlyBird System for Real-time Detection of Unknown Worms By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage
Automated Worm Fingerprinting By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage [Adobe Acrobat]
The Design and Evaluation of a Defense System for Internet Worms By Riccardo Scandariato, John C. Knight [Adobe Acrobat]
An Automated Defense System to Counter Internet Worms By Riccardo Scandariato, John C. Knight [Adobe Acrobat]
Inoculating SSH Against Address-Harvesting Worms By Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain [Adobe Acrobat]
Fast Detection of Scanning Worm Infections By Jaeyeon Jung, Stuart E. Schechter, Arthur Berger [Adobe Acrobat]
Access For Sale: A New Class Of Worm By Stuart E. Schechter, Micheal D Smith [Adobe Acrobat]
Least Effort Strategies for Cybersecurity By Sean P. Gorman, Rajendra G. Kulkarni, Laurie A. Schintler, Roger R. Stough [Adobe Acrobat]
Design and Implementation of a Lab Worm By Christopher Church, Tim Schmoyer, Henry Owen [Adobe Acrobat]
MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables By Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyyab , Salvatore J. Stolfo [GhostScript/GSView]
Data Mining Methods for Detection of New Malicious Executables By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [Adobe Acrobat]
[Broken]Learning To Detect New and Unknown Malicious Programs By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [GhostScript/GSView]
A Tour of the [internet] Worm By Don Seeley [GhostScript/GSView]
An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer
An Approach For Detecting Self-Propagating Email Using Anomaly Detection By Ajay Gupta, R. Sekar [Adobe Acrobat]
Worm Origin Identification Using Random Walks By Yinglian Xie, Vyas Sekar, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Toward a Framework for Internet Forensic Analysis By Vyas Sekar, Yinglian Xie, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Impact of network design on worm propagation By Brian Carrier, Sundararaman Jeyaraman, Sarah Sel [Adobe Acrobat]
A Two-Layer Approach for Novel Email Worm Detection By Steve Martin, Anil Sewani, Blaine Nelson, Karl Chen, Anthony D. Joseph [Adobe Acrobat]
Semi-Supervised Learning on Email Characteristics for Novel Worm Detection By Steve Martin, Anil Sewani [Adobe Acrobat]
WORM vs. WORM: Preliminary Study of an Active CounterAttack Mechanism By Frank Castaneda, Emre Can Sezery, Jun Xu [Adobe Acrobat]
The Nyxem Email Virus: Analysis and Inferences By David Moore, Colleen Shannon
Code-Red: A Case Study on the Spread and Victims of an Internet Worm By David Moore, Colleen Shannon, Jeffery Brown [Adobe Acrobat]
Internet Quarantine: Requirements for Containing Self-Propagating Code By David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
The Spread of the Witty Worm By Colleen Shannon, David Moore
Simulating Internet Worms By George F. Riley, Monirul I. Sharif, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]
The "Worm" Programs Early Experience With A Distributed Computation By John F. Shoch, Jon A. Hupp [Adobe Acrobat]
Web Application Worms: Myth or Reality? By Amichai Shulman
A Network Worm Vaccine Architecture By Stelios Sidiroglou, Angelos Keromytis [Adobe Acrobat]
[Broken]Countering Network Worms Through Automatic Patch Generation By Stelios Sidiroglou, Angelos Keromytis [Adobe Acrobat]
Early Detection of BGP Instabilities Resulting from Internet Worm Attacks By S. Deshpande, M. Thottan, B. Sikdar [Adobe Acrobat]
A Physiological Decomposition of Virus and Worm Programs By Prabhat Kumar Singh [Adobe Acrobat]
The EarlyBird System for Real-time Detection of Unknown Worms By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage
Automated Worm Fingerprinting By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage [Adobe Acrobat]
The Case For Using Layered Defenses To Stop Worms By David J. Albanese, Micheal J. Wiacek, Christopher M. Salter, Jeffrey A. Six [Adobe Acrobat]
A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]
Antiviral Checklist By Robert Slade
[Broken]History of Computer Viruses By Robert Slade
Access For Sale: A New Class Of Worm By Stuart E. Schechter, Micheal D Smith [Adobe Acrobat]
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
[Broken]A Brief History of PC Viruses By Alan Solomon
Collaborative Internet Worm Containment By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen [Adobe Acrobat]
WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees By Min Cai, Kai Hwang, Shanshan Song, Runfang Zhou, Christos Papodopoulos [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]
New Streaming Algorithms for Fast Detection of Superspreaders By Shobha Venkataraman, Dawn Song, Phillip B. Gibbons, Avrim Blum [Adobe Acrobat]
Dynamic Quarantine of Internet Worms By Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger [Adobe Acrobat]
[Broken]Fighting Computer Viruses By Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess
[Broken]Constructing Computer Virus Phylogenies By Leslie Ann Goldberg, Paul W. Goldberg, Cynthia A. Phillips, Gregory B. Sorkin [GhostScript/GSView]
Neural Networks for Computer Virus Recognition By Jeffrey O. Kephart, Gerald Tesauro, Gregory B. Sorkin
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
A Generic Virus Scanner in C By Sundeep Kumar, Eugene H. Spafford [Adobe Acrobat]
Virtual Playgrounds For Worm Behavior Investigation By Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford [Adobe Acrobat]
Security Applications of Peer-to-Peer Networks By Vasileios Vlachos, Stephanos Androutsellis-Theotokis, Diomidis Spinellis [Adobe Acrobat]
MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]
Hide 'N Seek Revisited - Full Stealth Is Back By Kimmo Kasslin, Mika Stahlberg, Samuli Larvala, Antti Tikkanen [Adobe Acrobat]
Flash Worms: Thirty Seconds to Infect the Internet. By Gary Grim, Stuart Staniford, Roelof Jonkman
[Broken]How to Own the Internet in Your Spare Time. By Nicholas Weaver, Vern Paxson , Stuart Staniford
The Top Speed Of Flash Worms By Stuart Staniford, David Moore, Vern Paxson , Nicholas Weaver [Adobe Acrobat]
Very Fast Containment of Scanning Worms By Nicholas Weaver, Stuart Staniford, Vern Paxson
Accurately Detecting Source Code of Attacks That Increase Privilege By Robert K. Cunningham, Craig S. Stevenson [Adobe Acrobat]
Inoculating SSH Against Address-Harvesting Worms By Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain [Adobe Acrobat]
[FTP]Infection Control Among Computers By David Stodolsky
Analyzing Cooperative Containment of Fast Scanning Worms By Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz [Adobe Acrobat]
MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables By Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyyab , Salvatore J. Stolfo [GhostScript/GSView]
Data Mining Methods for Detection of New Malicious Executables By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [Adobe Acrobat]
Anomalous Payload-based Network Intrusion Detection By Ke Wang, Salvatore J. Stolfo [Adobe Acrobat]
[Broken]Learning To Detect New and Unknown Malicious Programs By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [GhostScript/GSView]
W32 Deloder Worm: The Building of an Army By Vance Stone [Adobe Acrobat]
Least Effort Strategies for Cybersecurity By Sean P. Gorman, Rajendra G. Kulkarni, Laurie A. Schintler, Roger R. Stough [Adobe Acrobat]
On Deriving Unknown Vulnerabilities from ZeroDay Polymorphic and Metamorphic Worm Exploits By Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, Frederic T. Chong [Adobe Acrobat]
Analyzing Cooperative Containment of Fast Scanning Worms By Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz [Adobe Acrobat]
Indirect Detection Of Mass Mailing Worm-Infected PC Terminals For Learners By Yasuo Musashi, Ryuichi Matsuba, Kenichi Sugitani [Adobe Acrobat]
Detection of Mass Mailing Worm-infected IP address by Analysis of Syslog for DNS server By Ryuichi Matsuba, Kenichi Sugitani, Yasuo Musashi [Adobe Acrobat]
Traffic Analysis on a Mass Mailing Worm and DNS/SMTP By Yasuo Musashi, Kenichi Sugitani, Ryuichi Matsuba [Adobe Acrobat]
Worm Meets Beehive By Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun [Adobe Acrobat]
High-Fidelity Modeling of Computer Network Worms By Kalyan S. Perumalla, Srikanth Sundaragopalan [Adobe Acrobat]
Distributed Worm Simulation with a Realistic Internet Model By Sonjie Wei, Jelena Mirkovic, Martin Swany [Adobe Acrobat]
Detecting New Malicious Code Using N-grams Signatures By Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan [Adobe Acrobat]
An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
Dynamic Detection and Classification of Computer Viruses Using General Behaviour Patterns By Baudouin Le Charlier, Abdelaziz Mounji , Morton Swimmer [GhostScript/GSView]
[Broken]Approaches to Integrated Malware Detection and Avoidance By Simone Fischer-Hübner, Amon Ott, Morton Swimmer [Adobe Acrobat]
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
[Broken]Review and Outlook of Detection of Viruses Using Intrusion Detection By Morton Swimmer [Adobe Acrobat]
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
Attacks on Win32 Platforms: II By Peter Szor [Adobe Acrobat]
Netware Execute Only Attribute - Considered Harmful By Peter Szor [Adobe Acrobat]
Memory Scanning Under Windows NT By Peter Szor [Adobe Acrobat]
Hunting For Metamorphic By Peter Szor, Peter Ferrie [Adobe Acrobat]
Let Free(dom) Ring! By Peter Szor, Frederic Perriot [Adobe Acrobat]
Chiba Witty Blues By Peter Ferrie, Peter Szor, Frederic Perriot [Adobe Acrobat]
Blast Off! By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]
EPOCalypse NOW! (The Explosion of Win32 Worm Threats) By Peter Szor [Adobe Acrobat]
Virus Analysis 1: Worm Wars By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]
A Reputation-based System for the Quarantine of Widespread Malicious Behavior By Scott E. Coull, Boleslaw K. Szymanski [Adobe Acrobat]
MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]
Defending Against Internet Worms: A Signature-Based Approach By Yong Tang, Shigang Chen [Adobe Acrobat]
Slowing Down Internet Worms By Shigang Chen, Yong Tang [Adobe Acrobat]
Virus Generators: Understanding the Threat By James Tarala [Adobe Acrobat]
[Broken]The Complexities of Viral VB Scripts By Stuart Taylor [Adobe Acrobat]
A behavioral approach to worm detection By Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia [Adobe Acrobat]
Requirements On Worm Mitigation Technologies In MANETS By Robert Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis [Adobe Acrobat]
On the Effectiveness of Distributed Worm Monitoring By Andreas Terzis, Fabian Monrose, Moheeb Abu Rajab [Adobe Acrobat]
Neural Networks for Computer Virus Recognition By Jeffrey O. Kephart, Gerald Tesauro, Gregory B. Sorkin
[Broken]Automatically Generated Win32 Heuristic Virus Detection By William C. Arnold, Gerald Tesauro [Adobe Acrobat]
Computer viruses demystified By Carole Theriault [Adobe Acrobat]
Early Detection of BGP Instabilities Resulting from Internet Worm Attacks By S. Deshpande, M. Thottan, B. Sikdar [Adobe Acrobat]
Hide 'N Seek Revisited - Full Stealth Is Back By Kimmo Kasslin, Mika Stahlberg, Samuli Larvala, Antti Tikkanen [Adobe Acrobat]
A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]
ICSA Labs 6th Annual Virus Prevalence Survey 2000 By Lawrence M. Bridwell , Peter Tippett [Adobe Acrobat]
Model Checking of Worm Quarantine and Counter-Quarantine under a Group Defense By Linda Briesemeister, Phillip Porras, Ashish Tiwari [Adobe Acrobat]
Worms as Attack Vectors: Theory, Threats, and Defenses By Matthew Todd [Adobe Acrobat]
Connection-history based anomaly detection By Thomas Toth, Christopher Kruegel [Adobe Acrobat]
The Effect Of Network Topology On The Spread Of Epidemics By Ayalvadi Ganesh, L. Massoulie, Don Towsley [Adobe Acrobat]
Adaptive Defense Against Various Network Attacks By Don Towsley, Cliff Changchun Zou, Nick Duffield, Weibo Gong [Adobe Acrobat]
Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
A Firewall Network System for Worm Defense in Enterprise Networks By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]
Monitoring and Early Warning for Internet Worms By Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley [Adobe Acrobat]
Feedback Email Worm Defense System for Enterprise Network By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
The Monitoring and Early Detection of Internet Worms By Cliff Changchun Zou, Weibo Gong, Don Towsley, Lixin Gao [Adobe Acrobat]
Routing Worm: A Fast, Selective Attack Worm based on IP Address Information By Cliff Changchun Zou, Don Towsley, Weibo Gong, Songlin Cai [Adobe Acrobat]
Email Virus Propagation Modeling and Analysis By Cliff Changchun Zou, Don Towsley, Weibo Gong
[Broken]Code red worm propagation modeling and analysis By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
On the Performance of Internet Worm Scanning Strategies By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]
Analysis of the "SQL Slammer" worm and its effects on Indiana University and related institutions By Gregory Travis, Ed Balas, David Ripley, Steven Wallace [Adobe Acrobat]
[WEB ARCHIVE]The Future of Malware By Stephen Trilling , Carey Nachenberg [Adobe Acrobat]
Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]
Internet Intrusions: Global Characteristics and Prevalence By Vinod Yegneswaran, Paul Barford, Johannes Ullrich [Adobe Acrobat]
Adaptive Detection Of Worms/Viruses In Firewalls By InSeon Yoo, Ulrich Ultes-Nitsche [Adobe Acrobat]
Addressing Malicious SMTP-based Mass-Mailing Activity Within An Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
ARP-based Detection of Scanning Worms Within an Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
DNS-based Detection of Scanning Worms in an Enterprise Network By David Whyte, Evangelos Kranakis, P. C. van Oorschot [Adobe Acrobat]
SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
The HoneyTank: A Scalable Approach To Collect Malicious Internet Traffic By Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier [Adobe Acrobat]
Partition Field Guide By Pierre Vandevenne
Partition Field Guide Part 2 By Pierre Vandevenne
Partition Field Guide Part 3 By Pierre Vandevenne
Partition Field Guide Part 4 By Pierre Vandevenne
Partition Field Guide Part 5 By Pierre Vandevenne
An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques By Jiang Wu, Sarma Vangala, Lixin Gao, Kevin Kwiat [Adobe Acrobat]
Detecting Traffic Anomalies through aggregate analysis of packet header data By Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci [Adobe Acrobat]
The EarlyBird System for Real-time Detection of Unknown Worms By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage
Automated Worm Fingerprinting By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage [Adobe Acrobat]
EMULATORS or Generic Decryptors By Frans Veldman
New Streaming Algorithms for Fast Detection of Superspreaders By Shobha Venkataraman, Dawn Song, Phillip B. Gibbons, Avrim Blum [Adobe Acrobat]
A Day in the Life of an Anti-Virus Lab By Robert Vibert
[Compressed]Attack Languages By Giovanni Vigna, Steven T. Eckmann, Richard A. Kemmerer [GhostScript/GSView]
[Compressed]STATL: An Attack Language for State-based Intrusion Detection By Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer [GhostScript/GSView]
Polymorphic Worm Detection Using Structural Information of Executables By Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna [Adobe Acrobat]
Security Applications of Peer-to-Peer Networks By Vasileios Vlachos, Stephanos Androutsellis-Theotokis, Diomidis Spinellis [Adobe Acrobat]
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
Internet Quarantine: Requirements for Containing Self-Propagating Code By David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
On the Race of Worms, Alerts and Patches By Milan Vojnovic, Ayalvadi Ganesh [Adobe Acrobat]
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
[Broken]Computer Viruses and Related Threats: A Management Guide By Lisa Carnahan, John P. Wack [GhostScript/GSView]
Computer Virus Attacks By John P. Wack, Stanley A. Kurzban
Entropy Based Worm And Anomaly Detection In Fast IP Networks By Arno Wagner, Bernhard Plattner [Adobe Acrobat]
Experiences with Worm Propagation Simulations By Arno Wagner, Bernhard Plattner, Thomas Dubendorfer, Roman Hiestand [Adobe Acrobat]
Analysis of the "SQL Slammer" worm and its effects on Indiana University and related institutions By Gregory Travis, Ed Balas, David Ripley, Steven Wallace [Adobe Acrobat]
[FTP]Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities By Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev [Adobe Acrobat]
Abstraction-Based Intrusion Detection In Distributed Environments By Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang [Adobe Acrobat]
CARDS: A distributed system for detecting coordinated attacks By Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia [Adobe Acrobat]
Virtual Playgrounds For Worm Behavior Investigation By Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford [Adobe Acrobat]
[FTP]On Computer Viral Infection and the Effect of Immunization By Chenxi Wang, John C. Knight, Matthew C. Elder [Adobe Acrobat]
Modeling the Effects of Timing Parameters on Virus Propagation By Yang Wang, Chenxi Wang [Adobe Acrobat]
Dynamic Quarantine of Internet Worms By Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger [Adobe Acrobat]
Anomalous Payload-based Network Intrusion Detection By Ke Wang, Salvatore J. Stolfo [Adobe Acrobat]
Modeling the Effects of Timing Parameters on Virus Propagation By Yang Wang, Chenxi Wang [Adobe Acrobat]
A Hybrid Honeypot Architecture For Scalable Network Monitoring By Micheal Bailey, Evan Cooke, David Watson, Farnam Jahanian, Niels Provos [Adobe Acrobat]
The Internet Motion Sensor: A distributed Blackhole Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Farnam Jahanian, Jose Nazario [Adobe Acrobat]
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]
The Internet Motion Sensor: A Distributed Global Scoped Internet Threat Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Jose Nazario, Farnam Jahanian [Adobe Acrobat]
[Broken]How to Own the Internet in Your Spare Time. By Nicholas Weaver, Vern Paxson , Stuart Staniford
[Broken]Potential Strategies for High Speed Active Worms: A Worst Case Analysis. By Nicholas Weaver [Adobe Acrobat]
[Broken]Warhol Worms: The Potential for Very Fast Internet Plagues By Nicholas Weaver
Future Defenses: Technologies to Stop the Unknown Attack. By Nicholas Weaver
Protocol-Independent Adaptive Replay of Application Dialog By Weidong Cui, Vern Paxson , Nicholas Weaver, Randy H. Katz [Adobe Acrobat]
Preliminary Results Using Scale-Down To Explore Worm Dynamics By Nicholas Weaver, Vern Paxson , Ihab Hamadeh, George Kesidis [Adobe Acrobat]
Outwitting the Witty Worm: Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event By Nicholas Weaver, Vern Paxson , Abhishek Kumar
[Broken]How many ways to Own the Internet? Towards Viable Worm Defenses By Nicholas Weaver [Open Office]
The Top Speed Of Flash Worms By Stuart Staniford, David Moore, Vern Paxson , Nicholas Weaver [Adobe Acrobat]
Reflections on Witty: Analyzing the Attacker By Daniel R. Ellis, Nicholas Weaver
Very Fast Containment of Scanning Worms By Nicholas Weaver, Stuart Staniford, Vern Paxson
A Worst-Case Worm By Nicholas Weaver, Vern Paxson [Adobe Acrobat]
Analyzing Worms And Network Traffic Using Compression By Stephanie Wehner [Adobe Acrobat]
Distributed Worm Simulation with a Realistic Internet Model By Sonjie Wei, Jelena Mirkovic, Martin Swany [Adobe Acrobat]
Hoaxes & Hypes By Richard Ford, Sarah Gordon, Joe Wells
How to Spot a Virus Hoax By Joe Wells
[Broken]A Credibility Model for Antivirus Industry Self-Regulation By Joe Wells [Adobe Acrobat]
A Radical New Approach to Virus Scanning By Joe Wells
Environmental Impact: Microsoft Operating Systems and the Computer Virus Threat By Joe Wells
A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers By Ankur Jain, Joseph M. Hellerstein, Sylvia Ratnasamy, David Wetherall [Adobe Acrobat]
An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
[Broken]Viruses in Chicago: The Threat to Windows 95 By Ian Whalley
Testing Times for Trojans By Ian Whalley
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer
IBM: Coping With Computer Viruses and Related Problems By Steve R. White, David M. Chess, Jimmy Kuo
Computer Viruses: A Global Perspective By Steve R. White, Jeffrey O. Kephart, David M. Chess
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
An Undetectable Computer Virus By David M. Chess, Steve R. White
How Prevalent are Computer Viruses? By Jeffrey O. Kephart, Steve R. White
[Broken]Measuring Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Measuring and Modeling Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Directed-Graph Epidemological Models of Computer Viruses By Jeffrey O. Kephart, Steve R. White
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
Open Problems in Computer Virus Research By Steve R. White
Virus Bulletin 2010: A Retrospective By Steve R. White
Measuring and Modeling Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
Addressing Malicious SMTP-based Mass-Mailing Activity Within An Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
ARP-based Detection of Scanning Worms Within an Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
DNS-based Detection of Scanning Worms in an Enterprise Network By David Whyte, Evangelos Kranakis, P. C. van Oorschot [Adobe Acrobat]
The Case For Using Layered Defenses To Stop Worms By David J. Albanese, Micheal J. Wiacek, Christopher M. Salter, Jeffrey A. Six [Adobe Acrobat]
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks By Felix C. Freiling, Thorsten Holz, Georg Wicherski [Adobe Acrobat]
Curious Yellow: The First Coordinated Worm Design By Brandon Wiley
Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance By Jungwon Kim, William 0. Wilson, Uwe Aickelin, Julie McLeod [Adobe Acrobat]
Dynamic Quarantine of Internet Worms By Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger [Adobe Acrobat]
Avfs: An On-Access Anti-Virus File System By Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok
On Deriving Unknown Vulnerabilities from ZeroDay Polymorphic and Metamorphic Worm Exploits By Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, Frederic T. Chong [Adobe Acrobat]
[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]
An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques By Jiang Wu, Sarma Vangala, Lixin Gao, Kevin Kwiat [Adobe Acrobat]
Broadband Network Virus Detection System Based on Bypass Monitor By Wu Bing, Yun Xiaochun, Xiao Xinguang [Adobe Acrobat]
Seurat: A Pointillist Approach to Anomaly Detection By Yinglian Xie, Hyang-Ah Kim, David R. OHallaron, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Worm Origin Identification Using Random Walks By Yinglian Xie, Vyas Sekar, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Toward a Framework for Internet Forensic Analysis By Vyas Sekar, Yinglian Xie, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Broadband Network Virus Detection System Based on Bypass Monitor By Wu Bing, Yun Xiaochun, Xiao Xinguang [Adobe Acrobat]
ACT: Attachment Chain Tracing Scheme for Email Virus Detection and Control By Jintao Xiong [Adobe Acrobat]
Virtual Playgrounds For Worm Behavior Investigation By Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford [Adobe Acrobat]
Collapsar: A VM-Based Architecture for Network Attack Detention By Xuxian Jiang, Dongyan Xu [Open Office]
Worm Meets Beehive By Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun [Adobe Acrobat]
WORM vs. WORM: Preliminary Study of an Active CounterAttack Mechanism By Frank Castaneda, Emre Can Sezery, Jun Xu [Adobe Acrobat]
Analyzing Impacts of Peer-to-Peer Systems on Propagation of Active Worm Attacks By Wei Yu, Corey Boyer, Dong Xuan [Adobe Acrobat]
Wandering and Cruise By Sung Moo Yang
[WEB ARCHIVE]Productivity Technology and AntiVirus Industry By Sung Moo Yang
[Broken][Compressed]The Behavioral Solution By Sung Moo Yang [Open Office]
[WEB ARCHIVE][Compressed]The Behavior Cruise By Sung Moo Yang [Open Office]
[WEB ARCHIVE]Autonomous Mobile Cyber Weapon By Sung Moo Yang
[WEB ARCHIVE]AMCW - A New Weapon for the New Millennium By Sung Moo Yang
[WEB ARCHIVE]Reproduction of Viruses By Sung Moo Yang
CARDS: A distributed system for detecting coordinated attacks By Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia [Adobe Acrobat]
Fast Worm Propagation in IPv6 Networks By Jing Yang [Open Office]
An Inside Look at Botnets By Paul Barford, Vinod Yegneswaran [Adobe Acrobat]
Internet Intrusions: Global Characteristics and Prevalence By Vinod Yegneswaran, Paul Barford, Johannes Ullrich [Adobe Acrobat]
[Broken]Characteristics of Internet Background Radiation By Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson , Larry Peterson [Adobe Acrobat]
Polymorphic Viruses By Tarkan Yetiser
Correlation between NetFlow System and Network Views for Intrusion Detection By Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, William Yurcik [Adobe Acrobat]
Adaptive Detection Of Worms/Viruses In Firewalls By InSeon Yoo, Ulrich Ultes-Nitsche [Adobe Acrobat]
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations By Micheal Liljenstam, Yuan Yougu, BJ Premore, David Nicol [Adobe Acrobat]
Analyze the Worm-based Attack in Large Scale P2P Networks By Wei Yu [Adobe Acrobat]
Analyzing Impacts of Peer-to-Peer Systems on Propagation of Active Worm Attacks By Wei Yu, Corey Boyer, Dong Xuan [Adobe Acrobat]
Correlation between NetFlow System and Network Views for Intrusion Detection By Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, William Yurcik [Adobe Acrobat]
MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables By Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyyab , Salvatore J. Stolfo [GhostScript/GSView]
Data Mining Methods for Detection of New Malicious Executables By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [Adobe Acrobat]
[Broken]Learning To Detect New and Unknown Malicious Programs By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [GhostScript/GSView]
Avfs: An On-Access Anti-Virus File System By Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok
Using Internal Sensors For Computer Intrusion Detection By Diego Zamboni [Adobe Acrobat]
A Public Health Approach to Preventing Malware Propagation By Kim Zelonis [Adobe Acrobat]
The Evolution Of Malicious Agents By Lenny Zeltser [Adobe Acrobat]
A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]
Seurat: A Pointillist Approach to Anomaly Detection By Yinglian Xie, Hyang-Ah Kim, David R. OHallaron, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Worm Origin Identification Using Random Walks By Yinglian Xie, Vyas Sekar, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
[Broken]A Scalable High Performance Network Monitoring Agent For CERNET By Hui Zhang [Adobe Acrobat]
Toward a Framework for Internet Forensic Analysis By Vyas Sekar, Yinglian Xie, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Analysis of BGP Update Surge during Slammer Worm Attack By Mohit Lad, Xiaoliang Zhao, Beichuan Zhang, Dan Massey, Lixia Zhang [Adobe Acrobat]
Analysis of BGP Update Surge during Slammer Worm Attack By Mohit Lad, Xiaoliang Zhao, Beichuan Zhang, Dan Massey, Lixia Zhang [Adobe Acrobat]
Analysis of BGP Update Surge during Slammer Worm Attack By Mohit Lad, Xiaoliang Zhao, Beichuan Zhang, Dan Massey, Lixia Zhang [Adobe Acrobat]
Active Technologies To Containe Internet Worm By Hui Zheng, Haixin Duan [Adobe Acrobat]
WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees By Min Cai, Kai Hwang, Shanshan Song, Runfang Zhou, Christos Papodopoulos [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]
A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]
Modelling Botnet Propagation Using Time Zones By David Dagon, Cliff Changchun Zou, Wenke Lee [Adobe Acrobat]
Adaptive Defense Against Various Network Attacks By Don Towsley, Cliff Changchun Zou, Nick Duffield, Weibo Gong [Adobe Acrobat]
Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
A Firewall Network System for Worm Defense in Enterprise Networks By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]
Monitoring and Early Warning for Internet Worms By Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley [Adobe Acrobat]
Feedback Email Worm Defense System for Enterprise Network By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
The Monitoring and Early Detection of Internet Worms By Cliff Changchun Zou, Weibo Gong, Don Towsley, Lixin Gao [Adobe Acrobat]
Routing Worm: A Fast, Selective Attack Worm based on IP Address Information By Cliff Changchun Zou, Don Towsley, Weibo Gong, Songlin Cai [Adobe Acrobat]
Email Virus Propagation Modeling and Analysis By Cliff Changchun Zou, Don Towsley, Weibo Gong
[Broken]Code red worm propagation modeling and analysis By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
On the Performance of Internet Worm Scanning Strategies By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]
Witty Worm Propagation Modeling By Cliff Changchun Zou
last modified Thursday, January 04, 2007 : this page created by software written by kurt wismer