Virus Info Reviews Basics FAQs Lists Submit Papers Other Sites Main

Research/White Papers

The main library of sorts. There are a number of authors and co-authors referenced here. If you're looking for a specific paper and you know the authors name you can jump immediately to that section. It should be noted that not all of these papers are current or new and may have been included for historical value.
  1. Abad, Cristina
  2. Abou-Assaleh, Tony
  3. Aickelin, Uwe
  4. Aiken, John G.
  5. Akritidis, P.
  6. Albanese, David J.
  7. Alvarez, Raul
  8. Anagnostakis, Kostas G.
  9. Anderson, Eric
  10. Androutsellis-Theotokis, Stephanos
  11. Antonatos, S.
  12. Antrosio, Joseph V.
  13. Arnold, William C.
  14. Arora, Raman
  15. Attwood, Kira S.
  16. AVERT, McAfee
  17. Axelsson, Stefan
  18. Bailey, Micheal
  19. Bakos, George
  20. Balas, Ed
  21. Balepin, Ivan
  22. Banes, David
  23. Barford, Paul
  24. Barreno, Marco
  25. Bechtel, Kenneth
  26. Beck, Doug
  27. Bellovin, Steve
  28. Berger, Arthur
  29. Berk, Vincent
  30. Beverly, Robert
  31. Bhattacharyyab , Manasi
  32. Bielski, Stan
  33. Bing, Wu
  34. Blackburn, Paul
  35. Blum, Avrim
  36. Bonaventure, Olivier
  37. Bontchev, Vesselin
  38. Borning, Mark
  39. Bos, Herbert
  40. Boyer, Corey
  41. Braverman, Matthew
  42. Bridwell , Lawrence M.
  43. Briesemeister, Linda
  44. Brooks, Tim
  45. Brouckaert, Xavier
  46. Brown, Jeffery
  47. Brunnstein, Klaus
  48. Burrell, Bruce P.
  49. Büschkes, Roland
  50. Bush, Stephen F.
  51. Bussa, Toby
  52. Cai, Min
  53. Cai, Songlin
  54. Carnahan, Lisa
  55. Carr, Katherine
  56. Carrier, Brian
  57. Castaneda, Frank
  58. Castelli, Jacqueline
  59. Castro, Miguel
  60. Cercone, Nick
  61. Chang, Anthony Y.
  62. Cheetancheri, Senthilkumar G.
  63. Chen, Zesheng
  64. Chen, Karl
  65. Chen, Jay
  66. Chen, Yu
  67. Chen, Ying
  68. Chen, Shigang
  69. Chen, Thomas M.
  70. Chen, Xuan
  71. Chess, David M.
  72. Cheswick, Bill
  73. Chien, Eric
  74. Chien, Steve
  75. Chiueh, Tzi-cker
  76. Choi, Kyunghee
  77. Chong, Frederic T.
  78. Christodorescu, Mihai
  79. Church, Christopher
  80. Cohen, Fred
  81. Cole, Robert
  82. Conti, Gregory J.
  83. Contis, Didier
  84. Cooke, Evan
  85. Costa, Manuel
  86. Coull, Scott E.
  87. Coursen, Shane
  88. Crandall, Jedidiah R.
  89. Crowcroft, Jon
  90. Cui, Weidong
  91. Culver, Brian
  92. Cunningham, Robert K.
  93. Dagon, David
  94. Danchev, Dancho
  95. Daniloff, Igor
  96. Das, Abhijith
  97. Dasgupta , Dipankar
  98. Dawkins , Richard
  99. Debar, Herve
  100. Deshpande, S.
  101. Dhall, Sudarshan K.
  102. Dodson, Eric R.
  103. Dokas, Paul
  104. Donkers, Arthur
  105. Duan, Haixin
  106. Dubendorfer, Thomas
  107. Ducklin, Paul
  108. Duffield, Nick
  109. Dutta, Debojyoti
  110. DuVarney, Daniel C.
  111. Eckmann, Steven T.
  112. Edelman, Ben
  113. Eilertson, Eric
  114. Elder, Matthew C.
  115. Ellis, Daniel R.
  116. Emm, David
  117. Enbody, Richard J.
  118. Engelman , Nicholas
  119. Ertoz, Levent
  120. Eskin, Eleazar
  121. Estan, Cristian
  122. Fedeli , Alan A.
  123. Feng, Hanhua
  124. Ferguson, Paul W.
  125. Ferrie, Peter
  126. Fischer-Hübner, Simone
  127. Ford, Richard
  128. Fosnock, Craig
  129. Freeman, Tim
  130. Freiling, Felix C.
  131. Friedrichs, Oliver
  132. Fulp, Errin W
  133. Galarneau, Lisa
  134. Ganesh, Ayalvadi
  135. Ganger, Gregory R.
  136. Gao, Lixin
  137. Gibbons, Phillip B.
  138. Glover, Bill
  139. Goel, Sanjay
  140. Goldberg, Leslie Ann
  141. Goldberg, Paul W.
  142. Gong, Weibo
  143. Gordon, Sarah
  144. Gorman, Sean P.
  145. Gough, Jesse
  146. Gray, Robert S.
  147. Greenwald, Micheal B.
  148. Grim, Gary
  149. Grizzard, Julian B.
  150. Grosof, Benjamin
  151. Gryaznov , Dmitry O.
  152. Gu, Guofei
  153. Gupta, Ajay
  154. Hamadeh, Ihab
  155. Hanhisalo , Markus
  156. Hanson, Daniel
  157. Harley, David A.
  158. Harrison, Colin
  159. Hebbes, L.
  160. Heberlien, Todd
  161. Hedbom, Hans
  162. Heidari, Mohammad
  163. Heidemann, John
  164. Helenius , Marko
  165. Hellerstein, Joseph M.
  166. Hiestand, Roman
  167. Hill, Andrew
  168. Hittel, Sean
  169. Holz, Thorsten
  170. Hornat, Charles
  171. Howard, Fraser
  172. Hruska , Jan
  173. Hu, Ruiqi
  174. Hung, Jason C.
  175. Hupp, Jon A.
  176. Hussain, Alefiya
  177. Hwang, Kai
  178. Hypponen , Mikko
  179. Immorlica, Nicole
  180. Ioannidis, Sotiris
  181. Irwin, Larry G.
  182. Jacob, Matthias
  183. Jagodzinski, Richard
  184. Jahanian, Farnam
  185. Jain, Ankur
  186. Jajodia, Sushil
  187. Jeyaraman, Sundararaman
  188. Jha, Somesh
  189. Ji, Chuanyi
  190. Jiang, Xuxian
  191. Jiu, Jason
  192. Jonkman, Roelof
  193. Jonsson, Erland
  194. Joseph, Anthony D.
  195. Joukov, Nikolai
  196. Jung, Gihyun
  197. Jung, Jaeyeon
  198. Kaminski , Jakub
  199. Kamra, Abhinav
  200. Kandula, Srikanth
  201. Kang, Inhye
  202. Kannan, Jayanthkumar
  203. Karp, Brad
  204. Kasslin, Kimmo
  205. Katabi, Dina
  206. Katz, Randy H.
  207. Kemmerer, Richard A.
  208. Kephart, Jeffrey O.
  209. Keromytis, Angelos
  210. Kershenbaum, Aaron
  211. Kesdogan, Dogan
  212. Keselj, Vlado
  213. Kesidis, George
  214. Khayam, Syed A.
  215. Kiel , Stephen E.
  216. Kim, Hyogon
  217. Kim, Jungwon
  218. Kim, Seong Soo
  219. Kim, Jonghyun
  220. Kim, Hyang-Ah
  221. Kirda, Engin
  222. Knight, John C.
  223. Kolesnikov, Oleg
  224. Kostanecki, Bartek
  225. Kranakis, Evangelos
  226. Krasser, Sven
  227. Kreibich, Christian
  228. Kruegel, Christopher
  229. Kulig, Matthew
  230. Kulkarni, Rajendra G.
  231. Kumar, Sundeep
  232. Kumar, Abhishek
  233. Kumar, Vipin
  234. Kuo, Jimmy
  235. Kurzban , Stanley A.
  236. Kwiat, Kevin
  237. Kwok, Yu-Kwong
  238. LaBella, Richard
  239. Lad, Mohit
  240. Ladue , Mark D.
  241. Lakkaraju, Kiran
  242. Lakshminarayanan, Karthik
  243. Lambert , Micheal
  244. Lan, Kun-chan
  245. Larvala, Samuli
  246. Lazarevic, Aleksandar
  247. Le Charlier, Baudouin
  248. Lee, Raymond K.
  249. Lee, Tony
  250. Lee, Wenke
  251. Lee, Cheolho
  252. Lei, Shan
  253. Leitold , Ferenc
  254. Lenaghan, A. P.
  255. Levine, David
  256. Levine, John
  257. Levitt, Karl
  258. Li, Dekai
  259. Li, Yifan
  260. Li, Jun
  261. Liljenstam, Micheal
  262. Lin, Kuan-Cheng
  263. Lin, Nigel H.
  264. Lin, Louis H.
  265. Lincoln, Patrick
  266. Lindskog, Stefan
  267. Linehan, Eamonn
  268. Link, Rainer
  269. Liston, Thomas
  270. Lockwood, John
  271. Lou, Xiaosong
  272. Luiijf , Eric A.M.
  273. Lyashchenko , Yury
  274. Ma, Denys
  275. Ma, Justin
  276. Macchione , William A.
  277. Madhusudan, Bharath
  278. Maltz, David A.
  279. Mangarae, Aelphaeis
  280. Mao, Morley
  281. Markatos, E. P.
  282. Martin, Steve
  283. Marx , Andreas
  284. Massey, Dan
  285. Massoulie, L.
  286. Matsuba, Ryuichi
  287. Maurer, Jon
  288. McLain, Cynthia
  289. McLaughlin, Laurianne
  290. McLeod, Julie
  291. McNeil, Jed
  292. McPherson, Danny
  293. McSherry, Frank
  294. Meltzer, David
  295. Milburn, Lisa
  296. Miller, Jason V.
  297. Miretskiy, Yevgeniy
  298. Mirkovic, Jelena
  299. Misra, Vishal
  300. Mody, Jiggar J.
  301. Mok, Aloysius K.
  302. Monrose, Fabian
  303. Moore, David
  304. Moorer, Gregory A.
  305. Morar, John F.
  306. Morley , Peter
  307. Morris, Robert
  308. Morrison, Jim
  309. Moscola, James
  310. Mostovoy , Dmitry
  311. Mounji , Abdelaziz
  312. Musashi, Yasuo
  313. Muttik , Igor G.
  314. Mutz, Darren
  315. Nachenberg , Carey
  316. Natvig, Kurt
  317. Nazario, Jose
  318. Nelson, Blaine
  319. Nicol, David
  320. Ning, Peng
  321. Noh, Sanguk
  322. OBrien, David
  323. OHallaron, David R.
  324. Onwubiko, C.
  325. Ott, Amon
  326. Oudot, Laurent
  327. Overton , Martin
  328. Owen, Henry
  329. Paget , Francois
  330. Pande, Rishikesh
  331. Pang, Ruoming
  332. Papodopoulos, Christos
  333. Parris, Colin
  334. Paxson , Vern
  335. Pelkari, Cyrus
  336. Perriot, Frederic
  337. Perumalla, Kalyan S.
  338. Peterson , A. Padgett
  339. Peterson, Larry
  340. Phamdo, Nam
  341. Phillips, Cynthia A.
  342. Plattner, Bernhard
  343. Porras, Phillip
  344. Portokalidis, Georgios
  345. Premore, BJ
  346. Pring, Edward J.
  347. Provos, Niels
  348. Qin, Xinzhou
  349. Radai , Yisreal
  350. Radatti , Peter V.
  351. Radha, Hayder
  352. Radhakrishnan, Sridhar
  353. Rajab, Moheeb Abu
  354. Ramsay, Ken
  355. Ranka, Sanjay
  356. Rannenberg, Kai
  357. Ratnasamy, Sylvia
  358. Raynal, Frederic
  359. Reddick, David
  360. Reddy, A. L. Narasimha
  361. Reiter, Micheal K.
  362. Rice, Erika
  363. Riley, George F.
  364. Ripley, David
  365. Robert, Jean-Marc
  366. Robertson, William
  367. Roculan, Jensenn
  368. Rosenbaum, Hannah
  369. Rosenberger , Robert
  370. Roussev, Roussi
  371. Rowe, Jeff
  372. Rowstron, Antony
  373. Rozinov, Konstantinin
  374. Ruth, Paul
  375. Ryu, Keywon
  376. Salter, Christopher M.
  377. Sancho, David
  378. Savage, Stefan
  379. Scandariato, Riccardo
  380. Schechter, Stuart E.
  381. Schintler, Laurie A.
  382. Schmoyer, Tim
  383. Schultz, Matthew G.
  384. Seeley , Don
  385. Segal, Alla
  386. Sekar, R.
  387. Sekar, Vyas
  388. Sel, Sarah
  389. Sewani, Anil
  390. Sezery, Emre Can
  391. Shannon, Colleen
  392. Sharif, Monirul I.
  393. Shoch, John F.
  394. Shulman, Amichai
  395. Sidiroglou, Stelios
  396. Sikdar, B.
  397. Singh, Prabhat Kumar
  398. Singh, Sumeet
  399. Six, Jeffrey A.
  400. Skinner, Keith
  401. Sladaritz, Steven M.
  402. Slade , Robert
  403. Smith, Micheal D
  404. Snoeren, Alex C.
  405. Solomon , Alan
  406. Song, Shanshan
  407. Song, Dawn
  408. Sorkin, Gregory B.
  409. Spafford , Eugene H.
  410. Spinellis, Diomidis
  411. Srivastava, Jaideep
  412. Stahlberg, Mika
  413. Staniford, Stuart
  414. Stevenson, Craig S.
  415. Stockwell, Will
  416. Stodolsky , David
  417. Stoica, Ion
  418. Stolfo, Salvatore J.
  419. Stone, Vance
  420. Stough, Roger R.
  421. Su, Zhendong
  422. Subramanian, Lakshminarayanan
  423. Sugitani, Kenichi
  424. Sun, Jianzhong
  425. Sundaragopalan, Srikanth
  426. Swany, Martin
  427. Sweidan, Ray
  428. Swimmer, Morton
  429. Szor, Peter
  430. Szymanski, Boleslaw K.
  431. Tan, Pang-Ning
  432. Tang, Yong
  433. Tarala, James
  434. Taylor , Stuart
  435. Tenaglia, Scott D.
  436. Terzis, Andreas
  437. Tesauro, Gerald
  438. Theriault , Carole
  439. Thottan, M.
  440. Tikkanen, Antti
  441. Ting, Yu-Cheng Allen
  442. Tippett, Peter
  443. Tiwari, Ashish
  444. Todd, Matthew
  445. Toth, Thomas
  446. Towsley, Don
  447. Travis, Gregory
  448. Trilling , Stephen
  449. Tsudik, Gene
  450. Ullrich, Johannes
  451. Ultes-Nitsche, Ulrich
  452. van Oorschot, P. C.
  453. van Velzen, Mario
  454. Vandekeift, Erik
  455. Vanderavero, Nicolas
  456. Vandevenne , Pierre
  457. Vangala, Sarma
  458. Vannucci, Marina
  459. Varghese, George
  460. Veldman , Frans
  461. Venkataraman, Shobha
  462. Vibert , Robert
  463. Vigna, Giovanni
  464. Vlachos, Vasileios
  465. Voelker, Geoffrey M.
  466. Vojnovic, Milan
  467. Vrable, Micheal
  468. Wack, John P.
  469. Wagner, Arno
  470. Wallace, Steven
  471. Wang, Yi-Min
  472. Wang, Xiaoyang Sean
  473. Wang, Helen J.
  474. Wang, Chenxi
  475. Wang, Ke
  476. Wang, Yang
  477. Watson, David
  478. Weaver, Nicholas
  479. Wehner, Stephanie
  480. Wei, Sonjie
  481. Wells, Joe
  482. Wetherall, David
  483. Whalley, Ian
  484. White, Steve R.
  485. Whyte, David
  486. Wiacek, Micheal J.
  487. Wicherski, Georg
  488. Wiley, Brandon
  489. Wilson, William 0.
  490. Wong, Cynthia
  491. Wright, Charles P.
  492. Wu, S. Felix
  493. Wu, Kuang
  494. Wu, Jiang
  495. Xiaochun, Yun
  496. Xie, Yinglian
  497. Xinguang, Xiao
  498. Xiong, Jintao
  499. Xu, Dongyan
  500. Xu, Jun
  501. Xuan, Dong
  502. Yang , Sung Moo
  503. Yang, Jiahai
  504. Yang, Jing
  505. Yegneswaran, Vinod
  506. Yetiser , Tarkan
  507. Yin, Xiaoxin
  508. Yoo, InSeon
  509. Yougu, Yuan
  510. Yu, Wei
  511. Yurcik, William
  512. Zadok, Erez
  513. Zamboni, Diego
  514. Zelonis, Kim
  515. Zeltser, Lenny
  516. Zhang, Lintao
  517. Zhang, Hui
  518. Zhang, Beichuan
  519. Zhang, Lixia
  520. Zhao, Xiaoliang
  521. Zheng, Hui
  522. Zhou, Runfang
  523. Zhou, Lidong
  524. Zou, Cliff Changchun
Or if you don't know the author or you aren't even looking for a specific paper you can just browse the list. Apologies to anyone I didn't get permission to include - I was not able to contact everyone due to lack of available addresses, bounces, or too many addresses to be sure of which one is who. If you choose you would rather not have your contributions mentioned here then let me know.

Also, if I missed anything (and I'm sure I did) that you think should be mentioned here, let me know about that too.

Sorry folks, looks like i've managed to develope some broken links in here. Hopefully that won't last too long (or I can find a replacement URL).


Cristina Abad

Correlation between NetFlow System and Network Views for Intrusion Detection By Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, William Yurcik [Adobe Acrobat]


Tony Abou-Assaleh

Detecting New Malicious Code Using N-grams Signatures By Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan [Adobe Acrobat]


Uwe Aickelin

Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance By Jungwon Kim, William 0. Wilson, Uwe Aickelin, Julie McLeod [Adobe Acrobat]


John G. Aiken

A behavioral approach to worm detection By Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia [Adobe Acrobat]


P. Akritidis

[Broken]Defending Against Hitlist Worms Using Network Address Space Randomization By S. Antonatos, P. Akritidis, E. P. Markatos, Kostas G. Anagnostakis [Adobe Acrobat]
Efficient Content-Based Detection of Zero-Day Worms By P. Akritidis, Kostas G. Anagnostakis, E. P. Markatos [Adobe Acrobat]


David J. Albanese

The Case For Using Layered Defenses To Stop Worms By David J. Albanese, Micheal J. Wiacek, Christopher M. Salter, Jeffrey A. Six [Adobe Acrobat]


Raul Alvarez

Non-Conventional Virus Attack By Raul Alvarez [Open Office]


Kostas G. Anagnostakis

[Broken]Defending Against Hitlist Worms Using Network Address Space Randomization By S. Antonatos, P. Akritidis, E. P. Markatos, Kostas G. Anagnostakis [Adobe Acrobat]
A Cooperative Immunization System for an Untrusting Internet By Kostas G. Anagnostakis, Angelos Keromytis, Micheal B. Greenwald, Sotiris Ioannidis, Dekai Li [Adobe Acrobat]
Efficient Content-Based Detection of Zero-Day Worms By P. Akritidis, Kostas G. Anagnostakis, E. P. Markatos [Adobe Acrobat]


Eric Anderson

Aggregating Detectors for New Worm Identification By Eric Anderson, Jun Li [Adobe Acrobat]


Stephanos Androutsellis-Theotokis

Security Applications of Peer-to-Peer Networks By Vasileios Vlachos, Stephanos Androutsellis-Theotokis, Diomidis Spinellis [Adobe Acrobat]


S. Antonatos

[Broken]Defending Against Hitlist Worms Using Network Address Space Randomization By S. Antonatos, P. Akritidis, E. P. Markatos, Kostas G. Anagnostakis [Adobe Acrobat]


Joseph V. Antrosio

Malware Defense Using Network Security Authentication By Joseph V. Antrosio, Errin W Fulp [Adobe Acrobat]


William C. Arnold

Automatic Extraction of Computer Virus Signatures By Jeffrey O. Kephart, William C. Arnold
An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
[Broken]Automatically Generated Win32 Heuristic Virus Detection By William C. Arnold, Gerald Tesauro [Adobe Acrobat]
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar


Raman Arora

Detecting worms through de-centralized monitoring By Raman Arora [Adobe Acrobat]


Kira S. Attwood

A behavioral approach to worm detection By Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia [Adobe Acrobat]


McAfee AVERT

The New Apple Of Malware's Eye: Is OSX The Next Windows? By McAfee AVERT [Adobe Acrobat]


Stefan Axelsson

Visualization for Intrustion Detection: Hooking the Worm By Stefan Axelsson [Adobe Acrobat]


Micheal Bailey

A Hybrid Honeypot Architecture For Scalable Network Monitoring By Micheal Bailey, Evan Cooke, David Watson, Farnam Jahanian, Niels Provos [Adobe Acrobat]
The Internet Motion Sensor: A distributed Blackhole Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Farnam Jahanian, Jose Nazario [Adobe Acrobat]
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]
The Internet Motion Sensor: A Distributed Global Scoped Internet Threat Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Jose Nazario, Farnam Jahanian [Adobe Acrobat]


George Bakos

Designing a Framework for Active Worm Detection on Global Networks By Vincent Berk, George Bakos, Robert Morris [Adobe Acrobat]
[Compressed]Using Sensor Networks and Data Fusion for Early Detection By Vincent Berk, Robert S. Gray, George Bakos [GhostScript/GSView]


Ed Balas

Analysis of the "SQL Slammer" worm and its effects on Indiana University and related institutions By Gregory Travis, Ed Balas, David Ripley, Steven Wallace [Adobe Acrobat]


Ivan Balepin

Superworms and Cryptovirology: a Deadly Combination By Ivan Balepin [Adobe Acrobat]


David Banes

[WEB ARCHIVE]How to Stay Virus, Worm and Trojan Free - Without Anti-Virus Software By David Banes


Paul Barford

An Inside Look at Botnets By Paul Barford, Vinod Yegneswaran [Adobe Acrobat]
Internet Intrusions: Global Characteristics and Prevalence By Vinod Yegneswaran, Paul Barford, Johannes Ullrich [Adobe Acrobat]
[Broken]Characteristics of Internet Background Radiation By Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson , Larry Peterson [Adobe Acrobat]


Marco Barreno

[Broken]EarlyBird: Catching the Internet Worm By Marco Barreno [Adobe Acrobat]


Kenneth Bechtel

Why should I report my virus infections By Kenneth Bechtel
[WEB ARCHIVE]Viral Familiarization By Kenneth Bechtel


Doug Beck

[FTP]Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities By Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev [Adobe Acrobat]


Steve Bellovin

Worm Propagation Strategies In An IPv6 Internet By Steve Bellovin, Bill Cheswick, Angelos Keromytis [Adobe Acrobat]


Arthur Berger

Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds By Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger
Fast Detection of Scanning Worm Infections By Jaeyeon Jung, Stuart E. Schechter, Arthur Berger [Adobe Acrobat]


Vincent Berk

Designing a Framework for Active Worm Detection on Global Networks By Vincent Berk, George Bakos, Robert Morris [Adobe Acrobat]
[Compressed]Using Sensor Networks and Data Fusion for Early Detection By Vincent Berk, Robert S. Gray, George Bakos [GhostScript/GSView]


Robert Beverly

MS-SQL Slammer Traffic Analysis By Robert Beverly


Manasi Bhattacharyyab

MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables By Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyyab , Salvatore J. Stolfo [GhostScript/GSView]


Stan Bielski

Dynamic Quarantine of Internet Worms By Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger [Adobe Acrobat]


Wu Bing

Broadband Network Virus Detection System Based on Bypass Monitor By Wu Bing, Yun Xiaochun, Xiao Xinguang [Adobe Acrobat]


Paul Blackburn

Quarantining DHCP clients to reduce worm infection risk By Paul Blackburn [Adobe Acrobat]


Avrim Blum

New Streaming Algorithms for Fast Detection of Superspreaders By Shobha Venkataraman, Dawn Song, Phillip B. Gibbons, Avrim Blum [Adobe Acrobat]


Olivier Bonaventure

The HoneyTank: A Scalable Approach To Collect Malicious Internet Traffic By Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier [Adobe Acrobat]


Vesselin Bontchev

Future Trends in Virus Writing By Vesselin Bontchev
Vircing the InVircible By Vesselin Bontchev
The Bulgarian and Soviet Virus Writing Factories By Vesselin Bontchev
Are "Good" Computer Viruses Still a Bad Idea? By Vesselin Bontchev
Analysis and Maintenance of a Clean Virus Library By Vesselin Bontchev
Possible Virus Attacks Against Integrity Programs And How To Prevent Them By Vesselin Bontchev
The Pros and Cons of WordBasic Virus Upconversion By Vesselin Bontchev
Possible Macro Virus Attacks and How to Prevent Them By Vesselin Bontchev
Macro Virus Identification Problems By Vesselin Bontchev
Veni, Vidi, Vicis? By Vesselin Bontchev
No Peace on the Excel Front By Vesselin Bontchev
The WildList - Still Useful? By Vesselin Bontchev
Solving the VBA Upconversion Problem By Vesselin Bontchev
Latest Macro Virus Developments and Future Trends By Vesselin Bontchev


Mark Borning

Transaction-based Anomaly Detection By Roland Büschkes, Mark Borning, Dogan Kesdogan


Herbert Bos

SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots By Georgios Portokalidis, Herbert Bos [Adobe Acrobat]


Corey Boyer

Analyzing Impacts of Peer-to-Peer Systems on Propagation of Active Worm Attacks By Wei Yu, Corey Boyer, Dong Xuan [Adobe Acrobat]


Matthew Braverman

Win32/Blaster: A Case Study From Microsoft's Perspective By Matthew Braverman [Adobe Acrobat]


Lawrence M. Bridwell

ICSA Labs 6th Annual Virus Prevalence Survey 2000 By Lawrence M. Bridwell , Peter Tippett [Adobe Acrobat]


Linda Briesemeister

Epidemic Profiles And Defense Of Scale-Free Networks By Linda Briesemeister, Patrick Lincoln, Phillip Porras [Adobe Acrobat]
Microscopic Simulation Of A Group Defense Strategy By Linda Briesemeister, Phillip Porras [Adobe Acrobat]
Model Checking of Worm Quarantine and Counter-Quarantine under a Group Defense By Linda Briesemeister, Phillip Porras, Ashish Tiwari [Adobe Acrobat]
A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]


Tim Brooks

Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection By John Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks [Adobe Acrobat]
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware By John Lockwood, James Moscola, Matthew Kulig, David Reddick, Tim Brooks [Adobe Acrobat]


Xavier Brouckaert

The HoneyTank: A Scalable Approach To Collect Malicious Internet Traffic By Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier [Adobe Acrobat]


Jeffery Brown

Code-Red: A Case Study on the Spread and Victims of an Internet Worm By David Moore, Colleen Shannon, Jeffery Brown [Adobe Acrobat]


Klaus Brunnstein

From AntiVirus to AntiMalware Software and Beyond: Another Approach to the Protection of Customers from Dysfunctional System Behaviour By Klaus Brunnstein [Adobe Acrobat]


Bruce P. Burrell

[Broken]Searching for Nirvana: Beating viruses under adverse conditions By Bruce P. Burrell [Adobe Acrobat]
[Broken]A second look at new viruses: Now how great a threat? By Bruce P. Burrell [Adobe Acrobat]


Roland Büschkes

Transaction-based Anomaly Detection By Roland Büschkes, Mark Borning, Dogan Kesdogan


Stephen F. Bush

Biological Models of Security for Virus Propagation in Computer Networks By Sanjay Goel, Stephen F. Bush [Adobe Acrobat]


Toby Bussa

The Future of Fighting Viruses: A History and Analysis of the Digital Immune System By Toby Bussa


Min Cai

Collaborative Internet Worm Containment By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen [Adobe Acrobat]
WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees By Min Cai, Kai Hwang, Shanshan Song, Runfang Zhou, Christos Papodopoulos [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]


Songlin Cai

Routing Worm: A Fast, Selective Attack Worm based on IP Address Information By Cliff Changchun Zou, Don Towsley, Weibo Gong, Songlin Cai [Adobe Acrobat]


Lisa Carnahan

[Broken]Computer Viruses and Related Threats: A Management Guide By Lisa Carnahan, John P. Wack [GhostScript/GSView]


Katherine Carr

Sophos Anti-Virus detection: a technical overview By Katherine Carr [Adobe Acrobat]


Brian Carrier

Impact of network design on worm propagation By Brian Carrier, Sundararaman Jeyaraman, Sarah Sel [Adobe Acrobat]


Frank Castaneda

WORM vs. WORM: Preliminary Study of an Active CounterAttack Mechanism By Frank Castaneda, Emre Can Sezery, Jun Xu [Adobe Acrobat]


Jacqueline Castelli

[Broken]Choosing your anti-virus software By Jacqueline Castelli [Adobe Acrobat]


Miguel Castro

[FTP]Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]


Nick Cercone

Detecting New Malicious Code Using N-grams Signatures By Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan [Adobe Acrobat]


Anthony Y. Chang

[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]


Senthilkumar G. Cheetancheri

An API For Worm-Defense Evaluation By Karl Levitt, Todd Heberlien, Denys Ma, Senthilkumar G. Cheetancheri [GhostScript/GSView]
Modelling a Computer Worm Defense System By Senthilkumar G. Cheetancheri [GhostScript/GSView]


Zesheng Chen

A Self-Learning Worm Using Importance Scanning By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
Spatial-Temporal Modeling of Malware Propagation in Networks By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
Importance-Scanning Worm Using Vulnerable-Host Distribution By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
Modeling the Spread of Active Worms By Zesheng Chen, Lixin Gao, Kevin Kwiat [Adobe Acrobat]


Karl Chen

A Two-Layer Approach for Novel Email Worm Detection By Steve Martin, Anil Sewani, Blaine Nelson, Karl Chen, Anthony D. Joseph [Adobe Acrobat]


Jay Chen

Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]


Yu Chen

Collaborative Internet Worm Containment By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]


Ying Chen

GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]


Shigang Chen

Defending Against Internet Worms: A Signature-Based Approach By Yong Tang, Shigang Chen [Adobe Acrobat]
An Internet-Worm Early Warning System By Shigang Chen, Sanjay Ranka [Adobe Acrobat]
Slowing Down Internet Worms By Shigang Chen, Yong Tang [Adobe Acrobat]


Thomas M. Chen

The Evolution Of Viruses And Worms By Thomas M. Chen, Jean-Marc Robert [Adobe Acrobat]
Worm Epidemics in High-Speed Networks By Thomas M. Chen, Jean-Marc Robert [Adobe Acrobat]
Trends in Viruses and Worms By Thomas M. Chen [Adobe Acrobat]
Intrusion Detection for Viruses and Worms By Thomas M. Chen [Adobe Acrobat]


Xuan Chen

[Broken]Detecting Early Worm Propagation through Packet Matching By Xuan Chen, John Heidemann [Adobe Acrobat]


David M. Chess

Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]
An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
IBM: Coping With Computer Viruses and Related Problems By Steve R. White, David M. Chess, Jimmy Kuo
Computer Viruses: A Global Perspective By Steve R. White, Jeffrey O. Kephart, David M. Chess
Web Browsers - Threat or Menace By John F. Morar, David M. Chess
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
[Broken]Fighting Computer Viruses By Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess
The Future of Viruses on the Internet By David M. Chess
Where There's Smoke, There's Mirrors: The Truth About Trojan Horses By David M. Chess, Sarah Gordon
Virus Verification and Removal Tools and Techniques By David M. Chess
Security in Agent Systems By David M. Chess
Some Common PC-DOS Viruses and What They Mean To You By David M. Chess
Is Java Still Secure? By David M. Chess, John F. Morar
An Undetectable Computer Virus By David M. Chess, Steve R. White
Can Cryptography Prevent Computer Viruses? By David M. Chess, John F. Morar
Mobile Agents: are they a good idea? By David M. Chess, Colin Harrison, Aaron Kershenbaum [GhostScript/GSView]
Attitude Adjustment: Trojans and Malware on the Internet By David M. Chess, Sarah Gordon [Adobe Acrobat]
The Future of Viruses on the Internet By David M. Chess
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar


Bill Cheswick

Worm Propagation Strategies In An IPv6 Internet By Steve Bellovin, Bill Cheswick, Angelos Keromytis [Adobe Acrobat]


Eric Chien

Threats to WAP Enabled Devices By Eric Chien [Adobe Acrobat]
Malicious Threats to PDAs By Eric Chien [Adobe Acrobat]


Steve Chien

A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]


Tzi-cker Chiueh

Internet Worms As Internet-wide Threat By Nikolai Joukov, Tzi-cker Chiueh [Adobe Acrobat]


Kyunghee Choi

Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning By Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung [Adobe Acrobat]


Frederic T. Chong

On Deriving Unknown Vulnerabilities from ZeroDay Polymorphic and Metamorphic Worm Exploits By Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, Frederic T. Chong [Adobe Acrobat]


Mihai Christodorescu

[Broken]Testing Malware Detectors By Mihai Christodorescu, Somesh Jha [Adobe Acrobat]


Christopher Church

Design and Implementation of a Lab Worm By Christopher Church, Tim Schmoyer, Henry Owen [Adobe Acrobat]


Fred Cohen

A Note On Distributed Coordinated Attacks By Fred Cohen
Trends In Computer Virus Research By Fred Cohen
Computer Viruses - Theory and Experiments By Fred Cohen


Robert Cole

Requirements On Worm Mitigation Technologies In MANETS By Robert Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis [Adobe Acrobat]


Gregory J. Conti

Towards an Approach for Automatically Repairing Compromised Network Systems By Henry Owen, Julian B. Grizzard, Sven Krasser, Gregory J. Conti, Eric R. Dodson [Adobe Acrobat]


Didier Contis

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks By John Levine, Richard LaBella, Henry Owen, Didier Contis, Brian Culver [Adobe Acrobat]


Evan Cooke

A Hybrid Honeypot Architecture For Scalable Network Monitoring By Micheal Bailey, Evan Cooke, David Watson, Farnam Jahanian, Niels Provos [Adobe Acrobat]
Worm Hotspots: Explaining Non-Uniformity in Worm Targeting Behavior By Evan Cooke, Morley Mao, Farnam Jahanian [Adobe Acrobat]
The Internet Motion Sensor: A distributed Blackhole Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Farnam Jahanian, Jose Nazario [Adobe Acrobat]
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]
The Internet Motion Sensor: A Distributed Global Scoped Internet Threat Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Jose Nazario, Farnam Jahanian [Adobe Acrobat]


Manuel Costa

A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]
[FTP]Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]


Scott E. Coull

A Reputation-based System for the Quarantine of Widespread Malicious Behavior By Scott E. Coull, Boleslaw K. Szymanski [Adobe Acrobat]


Shane Coursen

[Broken]Tracking Computer Virus Incidents with Wildlist Organization International By Shane Coursen [Adobe Acrobat]
Solving the Problem of HTML Mail By Shane Coursen
Welcome to the Club, Macromedia By Shane Coursen
How the Grinch Stole Keystrokes By Shane Coursen
'Magic Lantern' Rubs the Wrong Way By Shane Coursen
Virus Nightmare Scenarios By Shane Coursen
Real Security is Tailored to Fit By Shane Coursen
Nimda: a flash in the pan By Shane Coursen
'Good' viruses have a future By Shane Coursen
The worm that spreads secrets By Shane Coursen
Watch this worm By Shane Coursen
What's in a name? By Shane Coursen


Jedidiah R. Crandall

On Deriving Unknown Vulnerabilities from ZeroDay Polymorphic and Metamorphic Worm Exploits By Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, Frederic T. Chong [Adobe Acrobat]


Jon Crowcroft

Honeycomb - Creating Intrusion Detection Signatures Using Honeypots By Christian Kreibich, Jon Crowcroft [Adobe Acrobat]
[FTP]Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]


Weidong Cui

Protocol-Independent Adaptive Replay of Application Dialog By Weidong Cui, Vern Paxson , Nicholas Weaver, Randy H. Katz [Adobe Acrobat]


Brian Culver

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks By John Levine, Richard LaBella, Henry Owen, Didier Contis, Brian Culver [Adobe Acrobat]


Robert K. Cunningham

Accurately Detecting Source Code of Attacks That Increase Privilege By Robert K. Cunningham, Craig S. Stevenson [Adobe Acrobat]


David Dagon

Modelling Botnet Propagation Using Time Zones By David Dagon, Cliff Changchun Zou, Wenke Lee [Adobe Acrobat]
HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
Worm Detection Using Local Networks By Xinzhou Qin, David Dagon, Guofei Gu, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]


Dancho Danchev

Malware - Future Trends By Dancho Danchev [Adobe Acrobat]


Igor Daniloff

Protected Mode Supervisor? By Igor Daniloff
Anarchy in the USSR By Igor Daniloff
Fighting Talk By Igor Daniloff


Abhijith Das

Avfs: An On-Access Anti-Virus File System By Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok


Dipankar Dasgupta

Immunity Based Intrusion Detection System: A General Framework By Dipankar Dasgupta [Adobe Acrobat]


Richard Dawkins

Viruses of the Mind By Richard Dawkins


Herve Debar

An Introduction to Intrusion-Detection Systems By Herve Debar [Adobe Acrobat]


S. Deshpande

Early Detection of BGP Instabilities Resulting from Internet Worm Attacks By S. Deshpande, M. Thottan, B. Sikdar [Adobe Acrobat]


Sudarshan K. Dhall

[Broken]Optimal Control of Treatment Costs for Internet Worm By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]
[Broken]Measurement and Analysis of Worm Propagation on Internet Network Topology By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]


Eric R. Dodson

Towards an Approach for Automatically Repairing Compromised Network Systems By Henry Owen, Julian B. Grizzard, Sven Krasser, Gregory J. Conti, Eric R. Dodson [Adobe Acrobat]


Paul Dokas

MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]


Arthur Donkers

Honey, I caught a worm: Building yourself a honeypot, some practical issues By Arthur Donkers [Adobe Acrobat]


Haixin Duan

Active Technologies To Containe Internet Worm By Hui Zheng, Haixin Duan [Adobe Acrobat]


Thomas Dubendorfer

Experiences with Worm Propagation Simulations By Arno Wagner, Bernhard Plattner, Thomas Dubendorfer, Roman Hiestand [Adobe Acrobat]


Paul Ducklin

[WEB ARCHIVE]Is virus writing really that bad? By Paul Ducklin
The V-Files:A dictionary of file threats By Paul Ducklin [Adobe Acrobat]
The ABC of computer security By Paul Ducklin [Adobe Acrobat]


Nick Duffield

Adaptive Defense Against Various Network Attacks By Don Towsley, Cliff Changchun Zou, Nick Duffield, Weibo Gong [Adobe Acrobat]


Debojyoti Dutta

Effect of Malicious Traffic on the Network By Kun-chan Lan, Alefiya Hussain, Debojyoti Dutta [Adobe Acrobat]


Daniel C. DuVarney

Using Predators to Combat Worms and Viruses: A Simulation-Based Study By Ajay Gupta, Daniel C. DuVarney [Adobe Acrobat]


Steven T. Eckmann

[Compressed]Attack Languages By Giovanni Vigna, Steven T. Eckmann, Richard A. Kemmerer [GhostScript/GSView]
[Compressed]STATL: An Attack Language for State-based Intrusion Detection By Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer [GhostScript/GSView]


Ben Edelman

The Safety of Internet Search Engines By Ben Edelman, Hannah Rosenbaum


Eric Eilertson

MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]


Matthew C. Elder

[FTP]On Computer Viral Infection and the Effect of Immunization By Chenxi Wang, John C. Knight, Matthew C. Elder [Adobe Acrobat]


Daniel R. Ellis

A behavioral approach to worm detection By Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia [Adobe Acrobat]
[Broken]Worm Anatomy and Model By Daniel R. Ellis [Adobe Acrobat]
Reflections on Witty: Analyzing the Attacker By Daniel R. Ellis, Nicholas Weaver


David Emm

[WEB ARCHIVE]The Future Impact of Viruses By David Emm
Guidelines for an Anti-Virus Policy By David Emm


Richard J. Enbody

Can a Network be Protected from Single-Packet Warhol Worms? By Larry G. Irwin, Richard J. Enbody [Adobe Acrobat]


Nicholas Engelman

[WEB ARCHIVE]Developing an Anti-Virus Security Policy By Nicholas Engelman
[Broken]Security through Information: Educating Users By Nicholas Engelman


Levent Ertoz

MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]


Eleazar Eskin

MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables By Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyyab , Salvatore J. Stolfo [GhostScript/GSView]
Data Mining Methods for Detection of New Malicious Executables By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [Adobe Acrobat]
[Broken]Learning To Detect New and Unknown Malicious Programs By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [GhostScript/GSView]


Cristian Estan

The EarlyBird System for Real-time Detection of Unknown Worms By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage
Automated Worm Fingerprinting By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage [Adobe Acrobat]


Alan A. Fedeli

Organizing a Corporate Anti-Virus Effort By Alan A. Fedeli
[FTP][Compressed]Corporate Anti-Virus Disciplines By Alan A. Fedeli
Handling Computer Virus Emergencies By Alan A. Fedeli


Hanhua Feng

The Effect of DNS Delays on Worm Propagation in an IPv6 Internet By Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos Keromytis [Adobe Acrobat]


Paul W. Ferguson

Establishing Ethics In The Computer Virus Arena By Paul W. Ferguson


Peter Ferrie

Hunting For Metamorphic By Peter Szor, Peter Ferrie [Adobe Acrobat]
Chiba Witty Blues By Peter Ferrie, Peter Szor, Frederic Perriot [Adobe Acrobat]
Blast Off! By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]
Virus Analysis 1: Worm Wars By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]


Simone Fischer-Hübner

[Broken]Approaches to Integrated Malware Detection and Avoidance By Simone Fischer-Hübner, Amon Ott, Morton Swimmer [Adobe Acrobat]


Richard Ford

Hoaxes & Hypes By Richard Ford, Sarah Gordon, Joe Wells
[WEB ARCHIVE]I'm Protected. Right? By Richard Ford
When Worlds Collide: Information Sharing for the Security and Anti-Virus Community By Richard Ford, Sarah Gordon
Anti-Virus Product Evaluation in the Real World By Richard Ford, Sarah Gordon [Adobe Acrobat]
[Broken]Web Insecurity: An Exercise in Misconfiguration By Richard Ford [Adobe Acrobat]


Craig Fosnock

Computer Worms: Past, Present and Future By Craig Fosnock [Adobe Acrobat]


Tim Freeman

Extortion Worms: Internet Worms that Discourage Disinfection By Tim Freeman


Felix C. Freiling

Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks By Felix C. Freiling, Thorsten Holz, Georg Wicherski [Adobe Acrobat]


Oliver Friedrichs

SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]


Errin W Fulp

Malware Defense Using Network Security Authentication By Joseph V. Antrosio, Errin W Fulp [Adobe Acrobat]


Lisa Galarneau

Anti-virus Software: The Challenge of Being Prepared for Tomorrow's MalWare Today By Lisa Galarneau [Adobe Acrobat]


Ayalvadi Ganesh

The Effect Of Network Topology On The Spread Of Epidemics By Ayalvadi Ganesh, L. Massoulie, Don Towsley [Adobe Acrobat]
On the Race of Worms, Alerts and Patches By Milan Vojnovic, Ayalvadi Ganesh [Adobe Acrobat]


Gregory R. Ganger

Dynamic Quarantine of Internet Worms By Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger [Adobe Acrobat]


Lixin Gao

Monitoring and Early Warning for Internet Worms By Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley [Adobe Acrobat]
Modeling the Spread of Active Worms By Zesheng Chen, Lixin Gao, Kevin Kwiat [Adobe Acrobat]
The Monitoring and Early Detection of Internet Worms By Cliff Changchun Zou, Weibo Gong, Don Towsley, Lixin Gao [Adobe Acrobat]
An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques By Jiang Wu, Sarma Vangala, Lixin Gao, Kevin Kwiat [Adobe Acrobat]


Phillip B. Gibbons

New Streaming Algorithms for Fast Detection of Superspreaders By Shobha Venkataraman, Dawn Song, Phillip B. Gibbons, Avrim Blum [Adobe Acrobat]


Bill Glover

Computer Viruses, A Very Real Threat By Bill Glover [Adobe Acrobat]


Sanjay Goel

Biological Models of Security for Virus Propagation in Computer Networks By Sanjay Goel, Stephen F. Bush [Adobe Acrobat]


Leslie Ann Goldberg

[Broken]Constructing Computer Virus Phylogenies By Leslie Ann Goldberg, Paul W. Goldberg, Cynthia A. Phillips, Gregory B. Sorkin [GhostScript/GSView]


Paul W. Goldberg

[Broken]Constructing Computer Virus Phylogenies By Leslie Ann Goldberg, Paul W. Goldberg, Cynthia A. Phillips, Gregory B. Sorkin [GhostScript/GSView]


Weibo Gong

Adaptive Defense Against Various Network Attacks By Don Towsley, Cliff Changchun Zou, Nick Duffield, Weibo Gong [Adobe Acrobat]
Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
A Firewall Network System for Worm Defense in Enterprise Networks By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]
Monitoring and Early Warning for Internet Worms By Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley [Adobe Acrobat]
Feedback Email Worm Defense System for Enterprise Network By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
The Monitoring and Early Detection of Internet Worms By Cliff Changchun Zou, Weibo Gong, Don Towsley, Lixin Gao [Adobe Acrobat]
Routing Worm: A Fast, Selective Attack Worm based on IP Address Information By Cliff Changchun Zou, Don Towsley, Weibo Gong, Songlin Cai [Adobe Acrobat]
Email Virus Propagation Modeling and Analysis By Cliff Changchun Zou, Don Towsley, Weibo Gong
[Broken]Code red worm propagation modeling and analysis By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
On the Performance of Internet Worm Scanning Strategies By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]


Sarah Gordon

Where There's Smoke, There's Mirrors: The Truth About Trojan Horses By David M. Chess, Sarah Gordon
Attitude Adjustment: Trojans and Malware on the Internet By David M. Chess, Sarah Gordon [Adobe Acrobat]
Hoaxes & Hypes By Richard Ford, Sarah Gordon, Joe Wells
When Worlds Collide: Information Sharing for the Security and Anti-Virus Community By Richard Ford, Sarah Gordon
Anti-Virus Product Evaluation in the Real World By Richard Ford, Sarah Gordon [Adobe Acrobat]
[WEB ARCHIVE]Sheep: Fact or Fiction By Sarah Gordon
Are Good Virus Simulators Still a Bad Idea? By Sarah Gordon
[WEB ARCHIVE]Why Computer Viruses Are Not - and never were - A Problem By Sarah Gordon
Technologically Enabled Crime: Shifting Paradigms for the Year 2000 By Sarah Gordon
The Generic Virus Writer By Sarah Gordon
The Generic Virus Writer II By Sarah Gordon
Inside the Mind of Dark Avenger By Sarah Gordon
The Anti-Virus Strategy System By Sarah Gordon
Virus Writers: The End of Innocence? By Sarah Gordon
What Is Wild? By Sarah Gordon [Adobe Acrobat]
Testing Time for Antivirus Software By Sarah Gordon [Adobe Acrobat]
[WEB ARCHIVE]Whats In a Name? By Sarah Gordon
[WEB ARCHIVE]Who Writes This Stuff? By Sarah Gordon
[WEB ARCHIVE]Viruses in the Information Age By Sarah Gordon
Faces Behind The Masks By Sarah Gordon
AntiVirus Software Testing for the Year 2000 and Beyond By Sarah Gordon, Fraser Howard [Adobe Acrobat]
[Broken]Viruses Through the Ages (or) Girls can't be scientists By Sarah Gordon [Open Office]


Sean P. Gorman

Least Effort Strategies for Cybersecurity By Sean P. Gorman, Rajendra G. Kulkarni, Laurie A. Schintler, Roger R. Stough [Adobe Acrobat]


Jesse Gough

SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]


Robert S. Gray

[Compressed]Using Sensor Networks and Data Fusion for Early Detection By Vincent Berk, Robert S. Gray, George Bakos [GhostScript/GSView]


Micheal B. Greenwald

A Cooperative Immunization System for an Untrusting Internet By Kostas G. Anagnostakis, Angelos Keromytis, Micheal B. Greenwald, Sotiris Ioannidis, Dekai Li [Adobe Acrobat]


Gary Grim

Flash Worms: Thirty Seconds to Infect the Internet. By Gary Grim, Stuart Staniford, Roelof Jonkman


Julian B. Grizzard

Towards an Approach for Automatically Repairing Compromised Network Systems By Henry Owen, Julian B. Grizzard, Sven Krasser, Gregory J. Conti, Eric R. Dodson [Adobe Acrobat]


Benjamin Grosof

Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]


Dmitry O. Gryaznov

[WEB ARCHIVE]Scanners of The Year 2000: Heuristics By Dmitry O. Gryaznov
Malware in Popular Networks By Dmitry O. Gryaznov [Adobe Acrobat]


Guofei Gu

HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
Worm Detection Using Local Networks By Xinzhou Qin, David Dagon, Guofei Gu, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]


Ajay Gupta

Using Predators to Combat Worms and Viruses: A Simulation-Based Study By Ajay Gupta, Daniel C. DuVarney [Adobe Acrobat]
An Approach For Detecting Self-Propagating Email Using Anomaly Detection By Ajay Gupta, R. Sekar [Adobe Acrobat]


Ihab Hamadeh

Preliminary Results Using Scale-Down To Explore Worm Dynamics By Nicholas Weaver, Vern Paxson , Ihab Hamadeh, George Kesidis [Adobe Acrobat]


Markus Hanhisalo

Computer Viruses By Markus Hanhisalo


Daniel Hanson

SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
A Comparison Study of Three Worm Families and Their Propagation in a Network By Daniel Hanson, Bartek Kostanecki, Richard Jagodzinski, Jason V. Miller


David A. Harley

[Broken]Managing Malware - Mapping Technology to Function By David A. Harley [Adobe Acrobat]
Re-Floating the Titanic: Dealing with Social Engineering Attacks By David A. Harley


Colin Harrison

Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]
Mobile Agents: are they a good idea? By David M. Chess, Colin Harrison, Aaron Kershenbaum [GhostScript/GSView]


L. Hebbes

An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms By L. Hebbes, A. P. Lenaghan, C. Onwubiko [Adobe Acrobat]


Todd Heberlien

An API For Worm-Defense Evaluation By Karl Levitt, Todd Heberlien, Denys Ma, Senthilkumar G. Cheetancheri [GhostScript/GSView]


Hans Hedbom

[Broken]Risks and Dangers of Security Extensions By Hans Hedbom, Stefan Lindskog, Erland Jonsson [Adobe Acrobat]


Mohammad Heidari

Malicious Code In Depth By Mohammad Heidari [Adobe Acrobat]


John Heidemann

[Broken]Detecting Early Worm Propagation through Packet Matching By Xuan Chen, John Heidemann [Adobe Acrobat]


Marko Helenius

Automatic and Controlled Virus Code Execution System By Marko Helenius
[Broken]Problems, Advantages and Disadvantages of Malware Testing By Marko Helenius [Adobe Acrobat]
[FTP][Compressed]Automatic and Controlled Macro Virus Execution and Automating the Windows Environment By Marko Helenius


Joseph M. Hellerstein

A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers By Ankur Jain, Joseph M. Hellerstein, Sylvia Ratnasamy, David Wetherall [Adobe Acrobat]


Roman Hiestand

Experiences with Worm Propagation Simulations By Arno Wagner, Bernhard Plattner, Thomas Dubendorfer, Roman Hiestand [Adobe Acrobat]


Andrew Hill

[Broken]Early Bird: Catching Worms While SysAdmins Sleep By Andrew Hill [Adobe Acrobat]


Sean Hittel

SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]


Thorsten Holz

Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks By Felix C. Freiling, Thorsten Holz, Georg Wicherski [Adobe Acrobat]


Charles Hornat

A Closer Look at the Worm_Mimail.A By Charles Hornat


Fraser Howard

AntiVirus Software Testing for the Year 2000 and Beyond By Sarah Gordon, Fraser Howard [Adobe Acrobat]
[Broken]?Gate Expectations? : Groupware Anti-Virus Scanners By Fraser Howard [Adobe Acrobat]


Jan Hruska

Computer virus prevention;a primer By Jan Hruska [Adobe Acrobat]


Ruiqi Hu

Detecting Unknown Massive Mailing Viruses Using Proactive Methods By Ruiqi Hu, Aloysius K. Mok [Adobe Acrobat]


Jason C. Hung

[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]


Jon A. Hupp

The "Worm" Programs Early Experience With A Distributed Computation By John F. Shoch, Jon A. Hupp [Adobe Acrobat]


Alefiya Hussain

Effect of Malicious Traffic on the Network By Kun-chan Lan, Alefiya Hussain, Debojyoti Dutta [Adobe Acrobat]


Kai Hwang

Collaborative Internet Worm Containment By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen [Adobe Acrobat]
WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees By Min Cai, Kai Hwang, Shanshan Song, Runfang Zhou, Christos Papodopoulos [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]


Mikko Hypponen

Virus Activation Routines By Mikko Hypponen
Retroviruses - how viruses fight back By Mikko Hypponen
WAP and Viruses - Can Your Mobile Phone Get Infected? By Mikko Hypponen [Adobe Acrobat]


Nicole Immorlica

A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]


Sotiris Ioannidis

A Cooperative Immunization System for an Untrusting Internet By Kostas G. Anagnostakis, Angelos Keromytis, Micheal B. Greenwald, Sotiris Ioannidis, Dekai Li [Adobe Acrobat]


Larry G. Irwin

Can a Network be Protected from Single-Packet Warhol Worms? By Larry G. Irwin, Richard J. Enbody [Adobe Acrobat]


Matthias Jacob

Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds By Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger


Richard Jagodzinski

A Comparison Study of Three Worm Families and Their Propagation in a Network By Daniel Hanson, Bartek Kostanecki, Richard Jagodzinski, Jason V. Miller


Farnam Jahanian

A Hybrid Honeypot Architecture For Scalable Network Monitoring By Micheal Bailey, Evan Cooke, David Watson, Farnam Jahanian, Niels Provos [Adobe Acrobat]
Worm Hotspots: Explaining Non-Uniformity in Worm Targeting Behavior By Evan Cooke, Morley Mao, Farnam Jahanian [Adobe Acrobat]
The Internet Motion Sensor: A distributed Blackhole Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Farnam Jahanian, Jose Nazario [Adobe Acrobat]
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]
The Internet Motion Sensor: A Distributed Global Scoped Internet Threat Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Jose Nazario, Farnam Jahanian [Adobe Acrobat]


Ankur Jain

A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers By Ankur Jain, Joseph M. Hellerstein, Sylvia Ratnasamy, David Wetherall [Adobe Acrobat]


Sushil Jajodia

Abstraction-Based Intrusion Detection In Distributed Environments By Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang [Adobe Acrobat]
CARDS: A distributed system for detecting coordinated attacks By Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia [Adobe Acrobat]


Sundararaman Jeyaraman

Impact of network design on worm propagation By Brian Carrier, Sundararaman Jeyaraman, Sarah Sel [Adobe Acrobat]


Somesh Jha

[Broken]Testing Malware Detectors By Mihai Christodorescu, Somesh Jha [Adobe Acrobat]


Chuanyi Ji

A Self-Learning Worm Using Importance Scanning By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
Spatial-Temporal Modeling of Malware Propagation in Networks By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]
Importance-Scanning Worm Using Vulnerable-Host Distribution By Zesheng Chen, Chuanyi Ji [Adobe Acrobat]


Xuxian Jiang

[FTP]Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities By Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev [Adobe Acrobat]
Virtual Playgrounds For Worm Behavior Investigation By Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford [Adobe Acrobat]
Collapsar: A VM-Based Architecture for Network Attack Detention By Xuxian Jiang, Dongyan Xu [Open Office]
Worm Meets Beehive By Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun [Adobe Acrobat]


Jason Jiu

[Compressed]Multiscale modeling and simulation of worm effects on the internet routing infrastructure By David Nicol, Micheal Liljenstam, Jason Jiu [Adobe Acrobat]


Roelof Jonkman

Flash Worms: Thirty Seconds to Infect the Internet. By Gary Grim, Stuart Staniford, Roelof Jonkman


Erland Jonsson

[Broken]Risks and Dangers of Security Extensions By Hans Hedbom, Stefan Lindskog, Erland Jonsson [Adobe Acrobat]


Anthony D. Joseph

A Two-Layer Approach for Novel Email Worm Detection By Steve Martin, Anil Sewani, Blaine Nelson, Karl Chen, Anthony D. Joseph [Adobe Acrobat]


Nikolai Joukov

Internet Worms As Internet-wide Threat By Nikolai Joukov, Tzi-cker Chiueh [Adobe Acrobat]


Gihyun Jung

Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning By Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung [Adobe Acrobat]


Jaeyeon Jung

Inoculating SSH Against Address-Harvesting Worms By Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain [Adobe Acrobat]
Fast Detection of Scanning Worm Infections By Jaeyeon Jung, Stuart E. Schechter, Arthur Berger [Adobe Acrobat]


Jakub Kaminski

[Broken]Multiplatform Attack - In the Land of Hoaxes By Jakub Kaminski
[Broken]Is There Any Future For Linux Viruses? By Jakub Kaminski [Adobe Acrobat]


Abhinav Kamra

The Effect of DNS Delays on Worm Propagation in an IPv6 Internet By Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos Keromytis [Adobe Acrobat]


Srikanth Kandula

Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds By Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger


Inhye Kang

Impeding worm epidemics through destination address filtering By Hyogon Kim, Inhye Kang [Adobe Acrobat]
On the Functional Validity of the Worm-Killing Worm By Hyogon Kim, Inhye Kang [Adobe Acrobat]


Jayanthkumar Kannan

Analyzing Cooperative Containment of Fast Scanning Worms By Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz [Adobe Acrobat]
Implications of Peer-to-Peer Networks on Worm Attacks and Defenses By Jayanthkumar Kannan, Karthik Lakshminarayanan [Adobe Acrobat]


Brad Karp

Autograph: Toward Automated, Distributed Worm Signature Detection By Hyang-Ah Kim, Brad Karp [Adobe Acrobat]


Kimmo Kasslin

Hide 'N Seek Revisited - Full Stealth Is Back By Kimmo Kasslin, Mika Stahlberg, Samuli Larvala, Antti Tikkanen [Adobe Acrobat]


Dina Katabi

Botz-4-Sale: Surviving Organized DDoS Attacks That Mimic Flash Crowds By Srikanth Kandula, Dina Katabi, Matthias Jacob, Arthur Berger


Randy H. Katz

Protocol-Independent Adaptive Replay of Application Dialog By Weidong Cui, Vern Paxson , Nicholas Weaver, Randy H. Katz [Adobe Acrobat]
Analyzing Cooperative Containment of Fast Scanning Worms By Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz [Adobe Acrobat]


Richard A. Kemmerer

[Compressed]Attack Languages By Giovanni Vigna, Steven T. Eckmann, Richard A. Kemmerer [GhostScript/GSView]
[Compressed]STATL: An Attack Language for State-based Intrusion Detection By Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer [GhostScript/GSView]


Jeffrey O. Kephart

Automatic Extraction of Computer Virus Signatures By Jeffrey O. Kephart, William C. Arnold
Computer Viruses: A Global Perspective By Steve R. White, Jeffrey O. Kephart, David M. Chess
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
[Broken]Fighting Computer Viruses By Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess
Neural Networks for Computer Virus Recognition By Jeffrey O. Kephart, Gerald Tesauro, Gregory B. Sorkin
How Prevalent are Computer Viruses? By Jeffrey O. Kephart, Steve R. White
[Broken]Measuring Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Measuring and Modeling Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Directed-Graph Epidemological Models of Computer Viruses By Jeffrey O. Kephart, Steve R. White
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
How Topology Affects Population Dynamics By Jeffrey O. Kephart
A Biologically Inspired Immune System for Computers By Jeffrey O. Kephart
Measuring and Modeling Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
A Biologically Inspired Immune System for Computers By Jeffrey O. Kephart
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White


Angelos Keromytis

Worm Propagation Strategies In An IPv6 Internet By Steve Bellovin, Bill Cheswick, Angelos Keromytis [Adobe Acrobat]
A Cooperative Immunization System for an Untrusting Internet By Kostas G. Anagnostakis, Angelos Keromytis, Micheal B. Greenwald, Sotiris Ioannidis, Dekai Li [Adobe Acrobat]
The Effect of DNS Delays on Worm Propagation in an IPv6 Internet By Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos Keromytis [Adobe Acrobat]
A Network Worm Vaccine Architecture By Stelios Sidiroglou, Angelos Keromytis [Adobe Acrobat]
[Broken]Countering Network Worms Through Automatic Patch Generation By Stelios Sidiroglou, Angelos Keromytis [Adobe Acrobat]


Aaron Kershenbaum

Mobile Agents: are they a good idea? By David M. Chess, Colin Harrison, Aaron Kershenbaum [GhostScript/GSView]


Dogan Kesdogan

Transaction-based Anomaly Detection By Roland Büschkes, Mark Borning, Dogan Kesdogan


Vlado Keselj

Detecting New Malicious Code Using N-grams Signatures By Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan [Adobe Acrobat]


George Kesidis

Preliminary Results Using Scale-Down To Explore Worm Dynamics By Nicholas Weaver, Vern Paxson , Ihab Hamadeh, George Kesidis [Adobe Acrobat]


Syed A. Khayam

A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks By Syed A. Khayam, Hayder Radha [Adobe Acrobat]
Using Signal Processing Techniques to Model Worm Propagation over Wireless Sensor Networks By Syed A. Khayam, Hayder Radha [Adobe Acrobat]
Analyzing the Spread of Active Worms over VANET By Syed A. Khayam, Hayder Radha [Adobe Acrobat]


Stephen E. Kiel

[FTP]Infection of PC Compatible Computers By Stephen E. Kiel , Raymond K. Lee


Hyogon Kim

Impeding worm epidemics through destination address filtering By Hyogon Kim, Inhye Kang [Adobe Acrobat]
On the Functional Validity of the Worm-Killing Worm By Hyogon Kim, Inhye Kang [Adobe Acrobat]


Jungwon Kim

Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance By Jungwon Kim, William 0. Wilson, Uwe Aickelin, Julie McLeod [Adobe Acrobat]


Seong Soo Kim

Detecting Traffic Anomalies through aggregate analysis of packet header data By Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci [Adobe Acrobat]


Jonghyun Kim

[Broken]Optimal Control of Treatment Costs for Internet Worm By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]
[Broken]Measurement and Analysis of Worm Propagation on Internet Network Topology By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]


Hyang-Ah Kim

Seurat: A Pointillist Approach to Anomaly Detection By Yinglian Xie, Hyang-Ah Kim, David R. OHallaron, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Autograph: Toward Automated, Distributed Worm Signature Detection By Hyang-Ah Kim, Brad Karp [Adobe Acrobat]


Engin Kirda

Polymorphic Worm Detection Using Structural Information of Executables By Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna [Adobe Acrobat]


John C. Knight

[FTP]On Computer Viral Infection and the Effect of Immunization By Chenxi Wang, John C. Knight, Matthew C. Elder [Adobe Acrobat]
The Design and Evaluation of a Defense System for Internet Worms By Riccardo Scandariato, John C. Knight [Adobe Acrobat]
An Automated Defense System to Counter Internet Worms By Riccardo Scandariato, John C. Knight [Adobe Acrobat]


Oleg Kolesnikov

Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffice By Oleg Kolesnikov, Wenke Lee [Adobe Acrobat]
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic By Oleg Kolesnikov, Wenke Lee [Adobe Acrobat]


Bartek Kostanecki

SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
A Comparison Study of Three Worm Families and Their Propagation in a Network By Daniel Hanson, Bartek Kostanecki, Richard Jagodzinski, Jason V. Miller


Evangelos Kranakis

Addressing Malicious SMTP-based Mass-Mailing Activity Within An Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
ARP-based Detection of Scanning Worms Within an Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
DNS-based Detection of Scanning Worms in an Enterprise Network By David Whyte, Evangelos Kranakis, P. C. van Oorschot [Adobe Acrobat]


Sven Krasser

Towards an Approach for Automatically Repairing Compromised Network Systems By Henry Owen, Julian B. Grizzard, Sven Krasser, Gregory J. Conti, Eric R. Dodson [Adobe Acrobat]


Christian Kreibich

Honeycomb - Creating Intrusion Detection Signatures Using Honeypots By Christian Kreibich, Jon Crowcroft [Adobe Acrobat]


Christopher Kruegel

Polymorphic Worm Detection Using Structural Information of Executables By Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna [Adobe Acrobat]
Connection-history based anomaly detection By Thomas Toth, Christopher Kruegel [Adobe Acrobat]


Matthew Kulig

Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection By John Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks [Adobe Acrobat]
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware By John Lockwood, James Moscola, Matthew Kulig, David Reddick, Tim Brooks [Adobe Acrobat]


Rajendra G. Kulkarni

Least Effort Strategies for Cybersecurity By Sean P. Gorman, Rajendra G. Kulkarni, Laurie A. Schintler, Roger R. Stough [Adobe Acrobat]


Sundeep Kumar

A Generic Virus Scanner in C By Sundeep Kumar, Eugene H. Spafford [Adobe Acrobat]


Abhishek Kumar

Outwitting the Witty Worm: Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event By Nicholas Weaver, Vern Paxson , Abhishek Kumar


Vipin Kumar

MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]


Jimmy Kuo

IBM: Coping With Computer Viruses and Related Problems By Steve R. White, David M. Chess, Jimmy Kuo
Free Macro Anti-Virus Techniques By Jimmy Kuo
Deep Inside an AntiVirus Engine By Jimmy Kuo
Stay Safe Online Campaign's AntiVirus Presentation By Jimmy Kuo [Adobe Acrobat]
Free Anti-Virus Tips and Techniques Common Sense Methods to Protect Yourself from Macro Viruses By Jimmy Kuo [Adobe Acrobat]
[WEB ARCHIVE]That's Not a Virus! By Jimmy Kuo


Stanley A. Kurzban

Computer Virus Attacks By John P. Wack, Stanley A. Kurzban


Kevin Kwiat

Modeling the Spread of Active Worms By Zesheng Chen, Lixin Gao, Kevin Kwiat [Adobe Acrobat]
An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques By Jiang Wu, Sarma Vangala, Lixin Gao, Kevin Kwiat [Adobe Acrobat]


Yu-Kwong Kwok

Collaborative Internet Worm Containment By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]


Richard LaBella

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks By John Levine, Richard LaBella, Henry Owen, Didier Contis, Brian Culver [Adobe Acrobat]


Mohit Lad

Analysis of BGP Update Surge during Slammer Worm Attack By Mohit Lad, Xiaoliang Zhao, Beichuan Zhang, Dan Massey, Lixia Zhang [Adobe Acrobat]


Mark D. Ladue

When JAVA Was One: Threats From Hostile Byte Code By Mark D. Ladue [Adobe Acrobat]


Kiran Lakkaraju

Correlation between NetFlow System and Network Views for Intrusion Detection By Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, William Yurcik [Adobe Acrobat]


Karthik Lakshminarayanan

Implications of Peer-to-Peer Networks on Worm Attacks and Defenses By Jayanthkumar Kannan, Karthik Lakshminarayanan [Adobe Acrobat]


Micheal Lambert

[WEB ARCHIVE]Fully Automated Response for In The Wild viruses By Micheal Lambert


Kun-chan Lan

Effect of Malicious Traffic on the Network By Kun-chan Lan, Alefiya Hussain, Debojyoti Dutta [Adobe Acrobat]


Samuli Larvala

Hide 'N Seek Revisited - Full Stealth Is Back By Kimmo Kasslin, Mika Stahlberg, Samuli Larvala, Antti Tikkanen [Adobe Acrobat]


Aleksandar Lazarevic

MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]


Baudouin Le Charlier

Dynamic Detection and Classification of Computer Viruses Using General Behaviour Patterns By Baudouin Le Charlier, Abdelaziz Mounji , Morton Swimmer [GhostScript/GSView]
The HoneyTank: A Scalable Approach To Collect Malicious Internet Traffic By Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier [Adobe Acrobat]


Raymond K. Lee

[FTP]Infection of PC Compatible Computers By Stephen E. Kiel , Raymond K. Lee


Tony Lee

Behavioral Classification By Tony Lee, Jiggar J. Mody [Open Office]


Wenke Lee

Modelling Botnet Propagation Using Time Zones By David Dagon, Cliff Changchun Zou, Wenke Lee [Adobe Acrobat]
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffice By Oleg Kolesnikov, Wenke Lee [Adobe Acrobat]
HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
Simulating Internet Worms By George F. Riley, Monirul I. Sharif, Wenke Lee [Adobe Acrobat]
Worm Detection Using Local Networks By Xinzhou Qin, David Dagon, Guofei Gu, Wenke Lee [Adobe Acrobat]
Advanced Polymorphic Worms: Evading IDS by Blending in with Normal Traffic By Oleg Kolesnikov, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]


Cheolho Lee

Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning By Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung [Adobe Acrobat]


Shan Lei

Worm Meets Beehive By Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun [Adobe Acrobat]


Ferenc Leitold

Reductions of the general virus detection problem By Ferenc Leitold [Adobe Acrobat]
Mathematical Model of a Computer Virus By Ferenc Leitold [Adobe Acrobat]


A. P. Lenaghan

An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms By L. Hebbes, A. P. Lenaghan, C. Onwubiko [Adobe Acrobat]


David Levine

Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]


John Levine

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks By John Levine, Richard LaBella, Henry Owen, Didier Contis, Brian Culver [Adobe Acrobat]
HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]


Karl Levitt

An API For Worm-Defense Evaluation By Karl Levitt, Todd Heberlien, Denys Ma, Senthilkumar G. Cheetancheri [GhostScript/GSView]
A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]


Dekai Li

A Cooperative Immunization System for an Untrusting Internet By Kostas G. Anagnostakis, Angelos Keromytis, Micheal B. Greenwald, Sotiris Ioannidis, Dekai Li [Adobe Acrobat]


Yifan Li

Correlation between NetFlow System and Network Views for Intrusion Detection By Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, William Yurcik [Adobe Acrobat]


Jun Li

Aggregating Detectors for New Worm Identification By Eric Anderson, Jun Li [Adobe Acrobat]


Micheal Liljenstam

Models of Internet Worm Defens By David Nicol, Micheal Liljenstam [Adobe Acrobat]
Comparing Passive and Active Worm Defenses By Micheal Liljenstam, David Nicol [Adobe Acrobat]
Models of Active Worm Defenses By David Nicol, Micheal Liljenstam [Adobe Acrobat]
[Compressed]Multiscale modeling and simulation of worm effects on the internet routing infrastructure By David Nicol, Micheal Liljenstam, Jason Jiu [Adobe Acrobat]
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations By Micheal Liljenstam, Yuan Yougu, BJ Premore, David Nicol [Adobe Acrobat]


Kuan-Cheng Lin

[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]


Nigel H. Lin

[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]


Louis H. Lin

[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]


Patrick Lincoln

Epidemic Profiles And Defense Of Scale-Free Networks By Linda Briesemeister, Patrick Lincoln, Phillip Porras [Adobe Acrobat]


Stefan Lindskog

[Broken]Risks and Dangers of Security Extensions By Hans Hedbom, Stefan Lindskog, Erland Jonsson [Adobe Acrobat]


Eamonn Linehan

Internet Worm Detection as part of a Distributed Network Inspection System By Eamonn Linehan [Adobe Acrobat]


Rainer Link

Server-based Virus-protection On Unix/Linux By Rainer Link [Adobe Acrobat]


Thomas Liston

Worm and Virus Defense: How We Can Protect the Nation's Computers From These Threats Today By Thomas Liston [Adobe Acrobat]


John Lockwood

Design of a System for Real-Time Worm Detection By Bharath Madhusudan, John Lockwood [Adobe Acrobat]
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection By John Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks [Adobe Acrobat]
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware By John Lockwood, James Moscola, Matthew Kulig, David Reddick, Tim Brooks [Adobe Acrobat]


Xiaosong Lou

GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]


Eric A.M. Luiijf

[Broken]Information Assurance and the Information Society By Eric A.M. Luiijf [Adobe Acrobat]


Yury Lyashchenko

Russian Anti-Virus Technology Versus Western Tools By Yury Lyashchenko , Dmitry Mostovoy


Denys Ma

An API For Worm-Defense Evaluation By Karl Levitt, Todd Heberlien, Denys Ma, Senthilkumar G. Cheetancheri [GhostScript/GSView]


Justin Ma

Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]


William A. Macchione

The Macro Virus and Virus Scanning Software: An analysis of their interaction By William A. Macchione [Adobe Acrobat]


Bharath Madhusudan

Design of a System for Real-Time Worm Detection By Bharath Madhusudan, John Lockwood [Adobe Acrobat]


David A. Maltz

Worm Origin Identification Using Random Walks By Yinglian Xie, Vyas Sekar, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Toward a Framework for Internet Forensic Analysis By Vyas Sekar, Yinglian Xie, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]


Aelphaeis Mangarae

Trojan White Paper By Aelphaeis Mangarae [Adobe Acrobat]


Morley Mao

Worm Hotspots: Explaining Non-Uniformity in Worm Targeting Behavior By Evan Cooke, Morley Mao, Farnam Jahanian [Adobe Acrobat]
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]


E. P. Markatos

[Broken]Defending Against Hitlist Worms Using Network Address Space Randomization By S. Antonatos, P. Akritidis, E. P. Markatos, Kostas G. Anagnostakis [Adobe Acrobat]
Efficient Content-Based Detection of Zero-Day Worms By P. Akritidis, Kostas G. Anagnostakis, E. P. Markatos [Adobe Acrobat]


Steve Martin

A Two-Layer Approach for Novel Email Worm Detection By Steve Martin, Anil Sewani, Blaine Nelson, Karl Chen, Anthony D. Joseph [Adobe Acrobat]
Semi-Supervised Learning on Email Characteristics for Novel Worm Detection By Steve Martin, Anil Sewani [Adobe Acrobat]


Andreas Marx

[Compressed]A Guideline to Anti-Malware Software Testing By Andreas Marx [Adobe Acrobat]


Dan Massey

Analysis of BGP Update Surge during Slammer Worm Attack By Mohit Lad, Xiaoliang Zhao, Beichuan Zhang, Dan Massey, Lixia Zhang [Adobe Acrobat]


L. Massoulie

The Effect Of Network Topology On The Spread Of Epidemics By Ayalvadi Ganesh, L. Massoulie, Don Towsley [Adobe Acrobat]


Ryuichi Matsuba

Indirect Detection Of Mass Mailing Worm-Infected PC Terminals For Learners By Yasuo Musashi, Ryuichi Matsuba, Kenichi Sugitani [Adobe Acrobat]
Detection of Mass Mailing Worm-infected IP address by Analysis of Syslog for DNS server By Ryuichi Matsuba, Kenichi Sugitani, Yasuo Musashi [Adobe Acrobat]
Traffic Analysis on a Mass Mailing Worm and DNS/SMTP By Yasuo Musashi, Kenichi Sugitani, Ryuichi Matsuba [Adobe Acrobat]


Jon Maurer

Internet Worms: Walking on Unstable Ground By Jon Maurer [Adobe Acrobat]


Cynthia McLain

Inoculating SSH Against Address-Harvesting Worms By Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain [Adobe Acrobat]


Laurianne McLaughlin

Bot Software Spreads, Causes New Worries By Laurianne McLaughlin [Adobe Acrobat]


Julie McLeod

Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance By Jungwon Kim, William 0. Wilson, Uwe Aickelin, Julie McLeod [Adobe Acrobat]


Jed McNeil

[WEB ARCHIVE]Advanced Virus Detection Technology for the Next Millennium By Jed McNeil, Lisa Milburn


Danny McPherson

Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]


Frank McSherry

A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]


David Meltzer

[Broken]The coming age of defensive worms By David Meltzer [Open Office]


Lisa Milburn

[WEB ARCHIVE]Advanced Virus Detection Technology for the Next Millennium By Jed McNeil, Lisa Milburn


Jason V. Miller

SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]
A Comparison Study of Three Worm Families and Their Propagation in a Network By Daniel Hanson, Bartek Kostanecki, Richard Jagodzinski, Jason V. Miller


Yevgeniy Miretskiy

Avfs: An On-Access Anti-Virus File System By Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok


Jelena Mirkovic

Distributed Worm Simulation with a Realistic Internet Model By Sonjie Wei, Jelena Mirkovic, Martin Swany [Adobe Acrobat]


Vishal Misra

The Effect of DNS Delays on Worm Propagation in an IPv6 Internet By Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos Keromytis [Adobe Acrobat]


Jiggar J. Mody

Behavioral Classification By Tony Lee, Jiggar J. Mody [Open Office]


Aloysius K. Mok

Detecting Unknown Massive Mailing Viruses Using Proactive Methods By Ruiqi Hu, Aloysius K. Mok [Adobe Acrobat]


Fabian Monrose

On the Effectiveness of Distributed Worm Monitoring By Andreas Terzis, Fabian Monrose, Moheeb Abu Rajab [Adobe Acrobat]


David Moore

The Nyxem Email Virus: Analysis and Inferences By David Moore, Colleen Shannon
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
Code-Red: A Case Study on the Spread and Victims of an Internet Worm By David Moore, Colleen Shannon, Jeffery Brown [Adobe Acrobat]
Internet Quarantine: Requirements for Containing Self-Propagating Code By David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
The Top Speed Of Flash Worms By Stuart Staniford, David Moore, Vern Paxson , Nicholas Weaver [Adobe Acrobat]
The Spread of the Witty Worm By Colleen Shannon, David Moore


Gregory A. Moorer

The Case for Beneficial Computer Viruses and Worms: A Student's Perspective By Gregory A. Moorer [Adobe Acrobat]


John F. Morar

An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
Web Browsers - Threat or Menace By John F. Morar, David M. Chess
Is Java Still Secure? By David M. Chess, John F. Morar
Can Cryptography Prevent Computer Viruses? By David M. Chess, John F. Morar
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar


Peter Morley

Processing Virus Collections By Peter Morley [Adobe Acrobat]


Robert Morris

Designing a Framework for Active Worm Detection on Global Networks By Vincent Berk, George Bakos, Robert Morris [Adobe Acrobat]


Jim Morrison

Blaster Revisited By Jim Morrison


James Moscola

Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection By John Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks [Adobe Acrobat]
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware By John Lockwood, James Moscola, Matthew Kulig, David Reddick, Tim Brooks [Adobe Acrobat]


Dmitry Mostovoy

Russian Anti-Virus Technology Versus Western Tools By Yury Lyashchenko , Dmitry Mostovoy
Modern Methods of Detecting and Eradicating Known and Unknown Viruses By Dmitry Mostovoy
A Method of Detecting and Eradicating Known and Unknown Viruses By Dmitry Mostovoy


Abdelaziz Mounji

Dynamic Detection and Classification of Computer Viruses Using General Behaviour Patterns By Baudouin Le Charlier, Abdelaziz Mounji , Morton Swimmer [GhostScript/GSView]
[Broken][Compressed]Languages and Tools for Rule-Based Distributed Intrusion Detection By Abdelaziz Mounji [GhostScript/GSView]


Yasuo Musashi

Indirect Detection Of Mass Mailing Worm-Infected PC Terminals For Learners By Yasuo Musashi, Ryuichi Matsuba, Kenichi Sugitani [Adobe Acrobat]
Detection of Mass Mailing Worm-infected IP address by Analysis of Syslog for DNS server By Ryuichi Matsuba, Kenichi Sugitani, Yasuo Musashi [Adobe Acrobat]
Detection of Mass Mailing Worm-infected PC terminals by Observing DNS Query Access By Yasuo Musashi, Kai Rannenberg [Adobe Acrobat]
Traffic Analysis on a Mass Mailing Worm and DNS/SMTP By Yasuo Musashi, Kenichi Sugitani, Ryuichi Matsuba [Adobe Acrobat]


Igor G. Muttik

[FTP]Starship: Interesting Boot Sector Virus By Igor G. Muttik
Comparing The Comparatives By Igor G. Muttik [Adobe Acrobat]


Darren Mutz

Polymorphic Worm Detection Using Structural Information of Executables By Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna [Adobe Acrobat]


Carey Nachenberg

[WEB ARCHIVE]The Future of Malware By Stephen Trilling , Carey Nachenberg [Adobe Acrobat]
Computer Parasitology By Carey Nachenberg [Adobe Acrobat]
Mobile Code Threats, Fact or Fiction By Carey Nachenberg [Adobe Acrobat]
The Evolving Virus Threat By Carey Nachenberg [Adobe Acrobat]
Computer Parasitology By Carey Nachenberg [Adobe Acrobat]


Kurt Natvig

Sandbox Technology Inside AV Scanners By Kurt Natvig [Adobe Acrobat]


Jose Nazario

The Internet Motion Sensor: A distributed Blackhole Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Farnam Jahanian, Jose Nazario [Adobe Acrobat]
The Internet Motion Sensor: A Distributed Global Scoped Internet Threat Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Jose Nazario, Farnam Jahanian [Adobe Acrobat]


Blaine Nelson

A Two-Layer Approach for Novel Email Worm Detection By Steve Martin, Anil Sewani, Blaine Nelson, Karl Chen, Anthony D. Joseph [Adobe Acrobat]


David Nicol

Models of Internet Worm Defens By David Nicol, Micheal Liljenstam [Adobe Acrobat]
Comparing Passive and Active Worm Defenses By Micheal Liljenstam, David Nicol [Adobe Acrobat]
Challenges In Using Simulation to Explain Global Routing Instability By David Nicol [Adobe Acrobat]
Models of Active Worm Defenses By David Nicol, Micheal Liljenstam [Adobe Acrobat]
[Compressed]Multiscale modeling and simulation of worm effects on the internet routing infrastructure By David Nicol, Micheal Liljenstam, Jason Jiu [Adobe Acrobat]
A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations By Micheal Liljenstam, Yuan Yougu, BJ Premore, David Nicol [Adobe Acrobat]


Peng Ning

Abstraction-Based Intrusion Detection In Distributed Environments By Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang [Adobe Acrobat]
CARDS: A distributed system for detecting coordinated attacks By Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia [Adobe Acrobat]


Sanguk Noh

Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning By Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung [Adobe Acrobat]


David OBrien

Recognizing and Recovering from Rootkit Attacks By David OBrien


David R. OHallaron

Seurat: A Pointillist Approach to Anomaly Detection By Yinglian Xie, Hyang-Ah Kim, David R. OHallaron, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]


C. Onwubiko

An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms By L. Hebbes, A. P. Lenaghan, C. Onwubiko [Adobe Acrobat]


Amon Ott

[Broken]Approaches to Integrated Malware Detection and Avoidance By Simone Fischer-Hübner, Amon Ott, Morton Swimmer [Adobe Acrobat]


Laurent Oudot

[Broken]Towards Evil Honeypots?! When they bite back... By Laurent Oudot [Adobe Acrobat]


Martin Overton

FAT32 - a new problem for anti-virus or viruses? By Martin Overton
Anti-Virus in the Corporate Arena By Martin Overton [Adobe Acrobat]
Viruses and Lotus Notes:- Have the Virus Writers Finally Met Their Match By Martin Overton [Adobe Acrobat]
Implementing Anti-Virus (Anti-Malware) Controls in the Corporate Arena By Martin Overton [Adobe Acrobat]
Spyware: Risks, Issues and Prevention By Martin Overton [Adobe Acrobat]
Bots and Botnets - Risks, Issues and Prevention By Martin Overton [Adobe Acrobat]
Anti-Malware Tools: Intrusion Detection Systems By Martin Overton [Adobe Acrobat]
Worm Charming: Taking SMB Lure To The Next Level By Martin Overton [Adobe Acrobat]
Canning More Than SPAM With Bayesian Filtering By Martin Overton [Adobe Acrobat]
Zo-To-Business By Martin Overton [Adobe Acrobat]
Malware in a Pig Pen part 1 By Martin Overton [Adobe Acrobat]
Malware in a Pig Pen part 2 By Martin Overton [Adobe Acrobat]
Mind Wars: Attack of the Memes By Martin Overton [Adobe Acrobat]
You are the Weakest Link, Goodbye! – Passwords, Malware and You By Martin Overton [Adobe Acrobat]
Out of Africa… By Martin Overton [Adobe Acrobat]
Are You Being [Opa]Serv[ed]? By Martin Overton [Adobe Acrobat]
When Worlds Collide: Head Banging in IT Security By Martin Overton [Adobe Acrobat]
You are the Weakest Link, Goodbye! – Malware Social Engineering Comes of Age By Martin Overton [Adobe Acrobat]
Hoaxes and other electronic ephemera: Taming the Beast (or at least managing it) By Martin Overton [Adobe Acrobat]
Safe Hex in the 21st Century – Part 2 By Martin Overton [Adobe Acrobat]
Safe Hex in the 21st Century – Part 1 By Martin Overton [Adobe Acrobat]
Lotus Notes – Part 2 By Martin Overton [Adobe Acrobat]
Lotus Notes – Part 1 By Martin Overton [Adobe Acrobat]


Henry Owen

The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks By John Levine, Richard LaBella, Henry Owen, Didier Contis, Brian Culver [Adobe Acrobat]
HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
Design and Implementation of a Lab Worm By Christopher Church, Tim Schmoyer, Henry Owen [Adobe Acrobat]
Towards an Approach for Automatically Repairing Compromised Network Systems By Henry Owen, Julian B. Grizzard, Sven Krasser, Gregory J. Conti, Eric R. Dodson [Adobe Acrobat]


Francois Paget

[WEB ARCHIVE]Viruses in France: The French Connection II By Francois Paget [Adobe Acrobat]
Computer Viruses: The Technological Leap By Francois Paget [Adobe Acrobat]


Rishikesh Pande

Using Plant Epidemiological Methods To Track Computer Network Worms By Rishikesh Pande [Adobe Acrobat]


Ruoming Pang

[Broken]Characteristics of Internet Background Radiation By Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson , Larry Peterson [Adobe Acrobat]


Christos Papodopoulos

WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees By Min Cai, Kai Hwang, Shanshan Song, Runfang Zhou, Christos Papodopoulos [Adobe Acrobat]


Colin Parris

Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]


Vern Paxson

[Broken]How to Own the Internet in Your Spare Time. By Nicholas Weaver, Vern Paxson , Stuart Staniford
Protocol-Independent Adaptive Replay of Application Dialog By Weidong Cui, Vern Paxson , Nicholas Weaver, Randy H. Katz [Adobe Acrobat]
Preliminary Results Using Scale-Down To Explore Worm Dynamics By Nicholas Weaver, Vern Paxson , Ihab Hamadeh, George Kesidis [Adobe Acrobat]
Outwitting the Witty Worm: Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event By Nicholas Weaver, Vern Paxson , Abhishek Kumar
The Top Speed Of Flash Worms By Stuart Staniford, David Moore, Vern Paxson , Nicholas Weaver [Adobe Acrobat]
Very Fast Containment of Scanning Worms By Nicholas Weaver, Stuart Staniford, Vern Paxson
[Broken]Characteristics of Internet Background Radiation By Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson , Larry Peterson [Adobe Acrobat]
A Worst-Case Worm By Nicholas Weaver, Vern Paxson [Adobe Acrobat]


Cyrus Pelkari

Fighting Fire with Fire: Designing a "Good" Computer Virus By Cyrus Pelkari


Frederic Perriot

Let Free(dom) Ring! By Peter Szor, Frederic Perriot [Adobe Acrobat]
Chiba Witty Blues By Peter Ferrie, Peter Szor, Frederic Perriot [Adobe Acrobat]
Blast Off! By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]
Virus Analysis 1: Worm Wars By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]


Kalyan S. Perumalla

High-Fidelity Modeling of Computer Network Worms By Kalyan S. Perumalla, Srikanth Sundaragopalan [Adobe Acrobat]


A. Padgett Peterson

Six Bytes By A. Padgett Peterson


Larry Peterson

[Broken]Characteristics of Internet Background Radiation By Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson , Larry Peterson [Adobe Acrobat]


Nam Phamdo

Requirements On Worm Mitigation Technologies In MANETS By Robert Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis [Adobe Acrobat]


Cynthia A. Phillips

[Broken]Constructing Computer Virus Phylogenies By Leslie Ann Goldberg, Paul W. Goldberg, Cynthia A. Phillips, Gregory B. Sorkin [GhostScript/GSView]


Bernhard Plattner

Entropy Based Worm And Anomaly Detection In Fast IP Networks By Arno Wagner, Bernhard Plattner [Adobe Acrobat]
Experiences with Worm Propagation Simulations By Arno Wagner, Bernhard Plattner, Thomas Dubendorfer, Roman Hiestand [Adobe Acrobat]


Phillip Porras

Epidemic Profiles And Defense Of Scale-Free Networks By Linda Briesemeister, Patrick Lincoln, Phillip Porras [Adobe Acrobat]
Microscopic Simulation Of A Group Defense Strategy By Linda Briesemeister, Phillip Porras [Adobe Acrobat]
Model Checking of Worm Quarantine and Counter-Quarantine under a Group Defense By Linda Briesemeister, Phillip Porras, Ashish Tiwari [Adobe Acrobat]
A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]


Georgios Portokalidis

SweetBait: Zero-Hour Worm Detection and Containment Using Honeypots By Georgios Portokalidis, Herbert Bos [Adobe Acrobat]


BJ Premore

A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations By Micheal Liljenstam, Yuan Yougu, BJ Premore, David Nicol [Adobe Acrobat]


Edward J. Pring

Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar


Niels Provos

A Hybrid Honeypot Architecture For Scalable Network Monitoring By Micheal Bailey, Evan Cooke, David Watson, Farnam Jahanian, Niels Provos [Adobe Acrobat]
A Virtual Honeypot Framework By Niels Provos [Adobe Acrobat]


Xinzhou Qin

HoneyStat: Local Worm Detection Using Honeypots By David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, John Levine, Henry Owen [Adobe Acrobat]
Worm Detection Using Local Networks By Xinzhou Qin, David Dagon, Guofei Gu, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]


Yisreal Radai

[Broken]The Anti-Viral Software of MS-DOS 6 By Yisreal Radai
[Broken][Compressed]Integrity Checking for Anti-Viral Purposes: Theory and Practice By Yisreal Radai [GhostScript/GSView]


Peter V. Radatti

Computer Viruses In Unix Networks By Peter V. Radatti
Plausibility of UNIX Virus Attacks By Peter V. Radatti
Heterogeneous Computer Viruses In A Networked Unix Enviroment By Peter V. Radatti
Anti-Virus for Multimedia Publishers By Peter V. Radatti
CyberSoft Virus Description Language By Peter V. Radatti


Hayder Radha

A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks By Syed A. Khayam, Hayder Radha [Adobe Acrobat]
Using Signal Processing Techniques to Model Worm Propagation over Wireless Sensor Networks By Syed A. Khayam, Hayder Radha [Adobe Acrobat]
Analyzing the Spread of Active Worms over VANET By Syed A. Khayam, Hayder Radha [Adobe Acrobat]


Sridhar Radhakrishnan

[Broken]Optimal Control of Treatment Costs for Internet Worm By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]
[Broken]Measurement and Analysis of Worm Propagation on Internet Network Topology By Jonghyun Kim, Sridhar Radhakrishnan, Sudarshan K. Dhall [Adobe Acrobat]


Moheeb Abu Rajab

Requirements On Worm Mitigation Technologies In MANETS By Robert Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis [Adobe Acrobat]
On the Effectiveness of Distributed Worm Monitoring By Andreas Terzis, Fabian Monrose, Moheeb Abu Rajab [Adobe Acrobat]


Ken Ramsay

SMB Shares and Worms - A Parasitic Relationship? By Ken Ramsay [Adobe Acrobat]


Sanjay Ranka

An Internet-Worm Early Warning System By Shigang Chen, Sanjay Ranka [Adobe Acrobat]


Kai Rannenberg

Detection of Mass Mailing Worm-infected PC terminals by Observing DNS Query Access By Yasuo Musashi, Kai Rannenberg [Adobe Acrobat]


Sylvia Ratnasamy

A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers By Ankur Jain, Joseph M. Hellerstein, Sylvia Ratnasamy, David Wetherall [Adobe Acrobat]


Frederic Raynal

Malicious cryptography, part one By Frederic Raynal
Malicious cryptography, part two By Frederic Raynal


David Reddick

Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection By John Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks [Adobe Acrobat]
Internet Worm and Virus Protection in Dynamically Reconfigurable Hardware By John Lockwood, James Moscola, Matthew Kulig, David Reddick, Tim Brooks [Adobe Acrobat]


A. L. Narasimha Reddy

Detecting Traffic Anomalies through aggregate analysis of packet header data By Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci [Adobe Acrobat]


Micheal K. Reiter

Seurat: A Pointillist Approach to Anomaly Detection By Yinglian Xie, Hyang-Ah Kim, David R. OHallaron, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Worm Origin Identification Using Random Walks By Yinglian Xie, Vyas Sekar, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Toward a Framework for Internet Forensic Analysis By Vyas Sekar, Yinglian Xie, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]


Erika Rice

The Effect of Infection Time on Internet Worm Propagation By Erika Rice [Adobe Acrobat]


George F. Riley

Simulating Internet Worms By George F. Riley, Monirul I. Sharif, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]


David Ripley

Analysis of the "SQL Slammer" worm and its effects on Indiana University and related institutions By Gregory Travis, Ed Balas, David Ripley, Steven Wallace [Adobe Acrobat]


Jean-Marc Robert

The Evolution Of Viruses And Worms By Thomas M. Chen, Jean-Marc Robert [Adobe Acrobat]
Worm Epidemics in High-Speed Networks By Thomas M. Chen, Jean-Marc Robert [Adobe Acrobat]


William Robertson

Polymorphic Worm Detection Using Structural Information of Executables By Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna [Adobe Acrobat]


Jensenn Roculan

SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]


Hannah Rosenbaum

The Safety of Internet Search Engines By Ben Edelman, Hannah Rosenbaum


Robert Rosenberger

False Authority Syndrome By Robert Rosenberger


Roussi Roussev

[FTP]Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities By Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev [Adobe Acrobat]


Jeff Rowe

A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]


Antony Rowstron

[FTP]Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]
Can we contain Internet worms? By Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron [Adobe Acrobat]


Konstantinin Rozinov

Reverse Code Engineering: An In-Depth Analysis of the Bagle Virus By Konstantinin Rozinov [Adobe Acrobat]


Paul Ruth

Worm Meets Beehive By Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun [Adobe Acrobat]


Keywon Ryu

Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning By Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung [Adobe Acrobat]


Christopher M. Salter

The Case For Using Layered Defenses To Stop Worms By David J. Albanese, Micheal J. Wiacek, Christopher M. Salter, Jeffrey A. Six [Adobe Acrobat]


David Sancho

Rootkits: The new wave of invisible malware is here By David Sancho [Adobe Acrobat]


Stefan Savage

Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
Internet Quarantine: Requirements for Containing Self-Propagating Code By David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
The EarlyBird System for Real-time Detection of Unknown Worms By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage
Automated Worm Fingerprinting By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage [Adobe Acrobat]


Riccardo Scandariato

The Design and Evaluation of a Defense System for Internet Worms By Riccardo Scandariato, John C. Knight [Adobe Acrobat]
An Automated Defense System to Counter Internet Worms By Riccardo Scandariato, John C. Knight [Adobe Acrobat]


Stuart E. Schechter

Inoculating SSH Against Address-Harvesting Worms By Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain [Adobe Acrobat]
Fast Detection of Scanning Worm Infections By Jaeyeon Jung, Stuart E. Schechter, Arthur Berger [Adobe Acrobat]
Access For Sale: A New Class Of Worm By Stuart E. Schechter, Micheal D Smith [Adobe Acrobat]


Laurie A. Schintler

Least Effort Strategies for Cybersecurity By Sean P. Gorman, Rajendra G. Kulkarni, Laurie A. Schintler, Roger R. Stough [Adobe Acrobat]


Tim Schmoyer

Design and Implementation of a Lab Worm By Christopher Church, Tim Schmoyer, Henry Owen [Adobe Acrobat]


Matthew G. Schultz

MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables By Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyyab , Salvatore J. Stolfo [GhostScript/GSView]
Data Mining Methods for Detection of New Malicious Executables By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [Adobe Acrobat]
[Broken]Learning To Detect New and Unknown Malicious Programs By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [GhostScript/GSView]


Don Seeley

A Tour of the [internet] Worm By Don Seeley [GhostScript/GSView]


Alla Segal

An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer


R. Sekar

An Approach For Detecting Self-Propagating Email Using Anomaly Detection By Ajay Gupta, R. Sekar [Adobe Acrobat]


Vyas Sekar

Worm Origin Identification Using Random Walks By Yinglian Xie, Vyas Sekar, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Toward a Framework for Internet Forensic Analysis By Vyas Sekar, Yinglian Xie, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]


Sarah Sel

Impact of network design on worm propagation By Brian Carrier, Sundararaman Jeyaraman, Sarah Sel [Adobe Acrobat]


Anil Sewani

A Two-Layer Approach for Novel Email Worm Detection By Steve Martin, Anil Sewani, Blaine Nelson, Karl Chen, Anthony D. Joseph [Adobe Acrobat]
Semi-Supervised Learning on Email Characteristics for Novel Worm Detection By Steve Martin, Anil Sewani [Adobe Acrobat]


Emre Can Sezery

WORM vs. WORM: Preliminary Study of an Active CounterAttack Mechanism By Frank Castaneda, Emre Can Sezery, Jun Xu [Adobe Acrobat]


Colleen Shannon

The Nyxem Email Virus: Analysis and Inferences By David Moore, Colleen Shannon
Code-Red: A Case Study on the Spread and Victims of an Internet Worm By David Moore, Colleen Shannon, Jeffery Brown [Adobe Acrobat]
Internet Quarantine: Requirements for Containing Self-Propagating Code By David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
The Spread of the Witty Worm By Colleen Shannon, David Moore


Monirul I. Sharif

Simulating Internet Worms By George F. Riley, Monirul I. Sharif, Wenke Lee [Adobe Acrobat]
Worm Detection, Early Warning and Response Based on Local Victim Information By Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley [Adobe Acrobat]


John F. Shoch

The "Worm" Programs Early Experience With A Distributed Computation By John F. Shoch, Jon A. Hupp [Adobe Acrobat]


Amichai Shulman

Web Application Worms: Myth or Reality? By Amichai Shulman


Stelios Sidiroglou

A Network Worm Vaccine Architecture By Stelios Sidiroglou, Angelos Keromytis [Adobe Acrobat]
[Broken]Countering Network Worms Through Automatic Patch Generation By Stelios Sidiroglou, Angelos Keromytis [Adobe Acrobat]


B. Sikdar

Early Detection of BGP Instabilities Resulting from Internet Worm Attacks By S. Deshpande, M. Thottan, B. Sikdar [Adobe Acrobat]


Prabhat Kumar Singh

A Physiological Decomposition of Virus and Worm Programs By Prabhat Kumar Singh [Adobe Acrobat]


Sumeet Singh

The EarlyBird System for Real-time Detection of Unknown Worms By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage
Automated Worm Fingerprinting By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage [Adobe Acrobat]


Jeffrey A. Six

The Case For Using Layered Defenses To Stop Worms By David J. Albanese, Micheal J. Wiacek, Christopher M. Salter, Jeffrey A. Six [Adobe Acrobat]


Keith Skinner

A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]


Steven M. Sladaritz



Robert Slade

Antiviral Checklist By Robert Slade
[Broken]History of Computer Viruses By Robert Slade


Micheal D Smith

Access For Sale: A New Class Of Worm By Stuart E. Schechter, Micheal D Smith [Adobe Acrobat]


Alex C. Snoeren

Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]


Alan Solomon

[Broken]A Brief History of PC Viruses By Alan Solomon


Shanshan Song

Collaborative Internet Worm Containment By Min Cai, Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Yu Chen [Adobe Acrobat]
WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees By Min Cai, Kai Hwang, Shanshan Song, Runfang Zhou, Christos Papodopoulos [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]


Dawn Song

New Streaming Algorithms for Fast Detection of Superspreaders By Shobha Venkataraman, Dawn Song, Phillip B. Gibbons, Avrim Blum [Adobe Acrobat]
Dynamic Quarantine of Internet Worms By Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger [Adobe Acrobat]


Gregory B. Sorkin

[Broken]Fighting Computer Viruses By Jeffrey O. Kephart, Gregory B. Sorkin, David M. Chess
[Broken]Constructing Computer Virus Phylogenies By Leslie Ann Goldberg, Paul W. Goldberg, Cynthia A. Phillips, Gregory B. Sorkin [GhostScript/GSView]
Neural Networks for Computer Virus Recognition By Jeffrey O. Kephart, Gerald Tesauro, Gregory B. Sorkin
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White


Eugene H. Spafford

A Generic Virus Scanner in C By Sundeep Kumar, Eugene H. Spafford [Adobe Acrobat]
Virtual Playgrounds For Worm Behavior Investigation By Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford [Adobe Acrobat]


Diomidis Spinellis

Security Applications of Peer-to-Peer Networks By Vasileios Vlachos, Stephanos Androutsellis-Theotokis, Diomidis Spinellis [Adobe Acrobat]


Jaideep Srivastava

MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]


Mika Stahlberg

Hide 'N Seek Revisited - Full Stealth Is Back By Kimmo Kasslin, Mika Stahlberg, Samuli Larvala, Antti Tikkanen [Adobe Acrobat]


Stuart Staniford

Flash Worms: Thirty Seconds to Infect the Internet. By Gary Grim, Stuart Staniford, Roelof Jonkman
[Broken]How to Own the Internet in Your Spare Time. By Nicholas Weaver, Vern Paxson , Stuart Staniford
The Top Speed Of Flash Worms By Stuart Staniford, David Moore, Vern Paxson , Nicholas Weaver [Adobe Acrobat]
Very Fast Containment of Scanning Worms By Nicholas Weaver, Stuart Staniford, Vern Paxson


Craig S. Stevenson

Accurately Detecting Source Code of Attacks That Increase Privilege By Robert K. Cunningham, Craig S. Stevenson [Adobe Acrobat]


Will Stockwell

Inoculating SSH Against Address-Harvesting Worms By Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia McLain [Adobe Acrobat]


David Stodolsky

[FTP]Infection Control Among Computers By David Stodolsky


Ion Stoica

Analyzing Cooperative Containment of Fast Scanning Worms By Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz [Adobe Acrobat]


Salvatore J. Stolfo

MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables By Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyyab , Salvatore J. Stolfo [GhostScript/GSView]
Data Mining Methods for Detection of New Malicious Executables By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [Adobe Acrobat]
Anomalous Payload-based Network Intrusion Detection By Ke Wang, Salvatore J. Stolfo [Adobe Acrobat]
[Broken]Learning To Detect New and Unknown Malicious Programs By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [GhostScript/GSView]


Vance Stone

W32 Deloder Worm: The Building of an Army By Vance Stone [Adobe Acrobat]


Roger R. Stough

Least Effort Strategies for Cybersecurity By Sean P. Gorman, Rajendra G. Kulkarni, Laurie A. Schintler, Roger R. Stough [Adobe Acrobat]


Zhendong Su

On Deriving Unknown Vulnerabilities from ZeroDay Polymorphic and Metamorphic Worm Exploits By Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, Frederic T. Chong [Adobe Acrobat]


Lakshminarayanan Subramanian

Analyzing Cooperative Containment of Fast Scanning Worms By Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz [Adobe Acrobat]


Kenichi Sugitani

Indirect Detection Of Mass Mailing Worm-Infected PC Terminals For Learners By Yasuo Musashi, Ryuichi Matsuba, Kenichi Sugitani [Adobe Acrobat]
Detection of Mass Mailing Worm-infected IP address by Analysis of Syslog for DNS server By Ryuichi Matsuba, Kenichi Sugitani, Yasuo Musashi [Adobe Acrobat]
Traffic Analysis on a Mass Mailing Worm and DNS/SMTP By Yasuo Musashi, Kenichi Sugitani, Ryuichi Matsuba [Adobe Acrobat]


Jianzhong Sun

Worm Meets Beehive By Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun [Adobe Acrobat]


Srikanth Sundaragopalan

High-Fidelity Modeling of Computer Network Worms By Kalyan S. Perumalla, Srikanth Sundaragopalan [Adobe Acrobat]


Martin Swany

Distributed Worm Simulation with a Realistic Internet Model By Sonjie Wei, Jelena Mirkovic, Martin Swany [Adobe Acrobat]


Ray Sweidan

Detecting New Malicious Code Using N-grams Signatures By Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan [Adobe Acrobat]


Morton Swimmer

An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
Dynamic Detection and Classification of Computer Viruses Using General Behaviour Patterns By Baudouin Le Charlier, Abdelaziz Mounji , Morton Swimmer [GhostScript/GSView]
[Broken]Approaches to Integrated Malware Detection and Avoidance By Simone Fischer-Hübner, Amon Ott, Morton Swimmer [Adobe Acrobat]
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
[Broken]Review and Outlook of Detection of Viruses Using Intrusion Detection By Morton Swimmer [Adobe Acrobat]
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White


Peter Szor

Attacks on Win32 Platforms: II By Peter Szor [Adobe Acrobat]
Netware Execute Only Attribute - Considered Harmful By Peter Szor [Adobe Acrobat]
Memory Scanning Under Windows NT By Peter Szor [Adobe Acrobat]
Hunting For Metamorphic By Peter Szor, Peter Ferrie [Adobe Acrobat]
Let Free(dom) Ring! By Peter Szor, Frederic Perriot [Adobe Acrobat]
Chiba Witty Blues By Peter Ferrie, Peter Szor, Frederic Perriot [Adobe Acrobat]
Blast Off! By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]
EPOCalypse NOW! (The Explosion of Win32 Worm Threats) By Peter Szor [Adobe Acrobat]
Virus Analysis 1: Worm Wars By Peter Ferrie, Frederic Perriot, Peter Szor [Adobe Acrobat]


Boleslaw K. Szymanski

A Reputation-based System for the Quarantine of Widespread Malicious Behavior By Scott E. Coull, Boleslaw K. Szymanski [Adobe Acrobat]


Pang-Ning Tan

MINDS - Minnesota Intrusion Detection System By Levent Ertoz, Eric Eilertson, Aleksandar Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Paul Dokas [Adobe Acrobat]


Yong Tang

Defending Against Internet Worms: A Signature-Based Approach By Yong Tang, Shigang Chen [Adobe Acrobat]
Slowing Down Internet Worms By Shigang Chen, Yong Tang [Adobe Acrobat]


James Tarala

Virus Generators: Understanding the Threat By James Tarala [Adobe Acrobat]


Stuart Taylor

[Broken]The Complexities of Viral VB Scripts By Stuart Taylor [Adobe Acrobat]


Scott D. Tenaglia

A behavioral approach to worm detection By Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia [Adobe Acrobat]


Andreas Terzis

Requirements On Worm Mitigation Technologies In MANETS By Robert Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis [Adobe Acrobat]
On the Effectiveness of Distributed Worm Monitoring By Andreas Terzis, Fabian Monrose, Moheeb Abu Rajab [Adobe Acrobat]


Gerald Tesauro

Neural Networks for Computer Virus Recognition By Jeffrey O. Kephart, Gerald Tesauro, Gregory B. Sorkin
[Broken]Automatically Generated Win32 Heuristic Virus Detection By William C. Arnold, Gerald Tesauro [Adobe Acrobat]


Carole Theriault

Computer viruses demystified By Carole Theriault [Adobe Acrobat]


M. Thottan

Early Detection of BGP Instabilities Resulting from Internet Worm Attacks By S. Deshpande, M. Thottan, B. Sikdar [Adobe Acrobat]


Antti Tikkanen

Hide 'N Seek Revisited - Full Stealth Is Back By Kimmo Kasslin, Mika Stahlberg, Samuli Larvala, Antti Tikkanen [Adobe Acrobat]


Yu-Cheng Allen Ting

A Hybrid Quarantine Defense By Phillip Porras, Linda Briesemeister, Keith Skinner, Karl Levitt, Jeff Rowe, Yu-Cheng Allen Ting [Adobe Acrobat]


Peter Tippett

ICSA Labs 6th Annual Virus Prevalence Survey 2000 By Lawrence M. Bridwell , Peter Tippett [Adobe Acrobat]


Ashish Tiwari

Model Checking of Worm Quarantine and Counter-Quarantine under a Group Defense By Linda Briesemeister, Phillip Porras, Ashish Tiwari [Adobe Acrobat]


Matthew Todd

Worms as Attack Vectors: Theory, Threats, and Defenses By Matthew Todd [Adobe Acrobat]


Thomas Toth

Connection-history based anomaly detection By Thomas Toth, Christopher Kruegel [Adobe Acrobat]


Don Towsley

The Effect Of Network Topology On The Spread Of Epidemics By Ayalvadi Ganesh, L. Massoulie, Don Towsley [Adobe Acrobat]
Adaptive Defense Against Various Network Attacks By Don Towsley, Cliff Changchun Zou, Nick Duffield, Weibo Gong [Adobe Acrobat]
Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
A Firewall Network System for Worm Defense in Enterprise Networks By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]
Monitoring and Early Warning for Internet Worms By Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley [Adobe Acrobat]
Feedback Email Worm Defense System for Enterprise Network By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
The Monitoring and Early Detection of Internet Worms By Cliff Changchun Zou, Weibo Gong, Don Towsley, Lixin Gao [Adobe Acrobat]
Routing Worm: A Fast, Selective Attack Worm based on IP Address Information By Cliff Changchun Zou, Don Towsley, Weibo Gong, Songlin Cai [Adobe Acrobat]
Email Virus Propagation Modeling and Analysis By Cliff Changchun Zou, Don Towsley, Weibo Gong
[Broken]Code red worm propagation modeling and analysis By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
On the Performance of Internet Worm Scanning Strategies By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]


Gregory Travis

Analysis of the "SQL Slammer" worm and its effects on Indiana University and related institutions By Gregory Travis, Ed Balas, David Ripley, Steven Wallace [Adobe Acrobat]


Stephen Trilling

[WEB ARCHIVE]The Future of Malware By Stephen Trilling , Carey Nachenberg [Adobe Acrobat]


Gene Tsudik

Itinerant Agents for Mobile Computing By David M. Chess, Benjamin Grosof, Colin Harrison, David Levine, Colin Parris, Gene Tsudik [GhostScript/GSView]


Johannes Ullrich

Internet Intrusions: Global Characteristics and Prevalence By Vinod Yegneswaran, Paul Barford, Johannes Ullrich [Adobe Acrobat]


Ulrich Ultes-Nitsche

Adaptive Detection Of Worms/Viruses In Firewalls By InSeon Yoo, Ulrich Ultes-Nitsche [Adobe Acrobat]


P. C. van Oorschot

Addressing Malicious SMTP-based Mass-Mailing Activity Within An Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
ARP-based Detection of Scanning Worms Within an Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
DNS-based Detection of Scanning Worms in an Enterprise Network By David Whyte, Evangelos Kranakis, P. C. van Oorschot [Adobe Acrobat]


Mario van Velzen

SQLExp SQL Server Worm Analysis By Jensenn Roculan, Sean Hittel, Daniel Hanson, Jason V. Miller, Bartek Kostanecki, Jesse Gough, Mario van Velzen, Oliver Friedrichs [Adobe Acrobat]


Erik Vandekeift

Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]


Nicolas Vanderavero

The HoneyTank: A Scalable Approach To Collect Malicious Internet Traffic By Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, Baudouin Le Charlier [Adobe Acrobat]


Pierre Vandevenne

Partition Field Guide By Pierre Vandevenne
Partition Field Guide Part 2 By Pierre Vandevenne
Partition Field Guide Part 3 By Pierre Vandevenne
Partition Field Guide Part 4 By Pierre Vandevenne
Partition Field Guide Part 5 By Pierre Vandevenne


Sarma Vangala

An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques By Jiang Wu, Sarma Vangala, Lixin Gao, Kevin Kwiat [Adobe Acrobat]


Marina Vannucci

Detecting Traffic Anomalies through aggregate analysis of packet header data By Seong Soo Kim, A. L. Narasimha Reddy, Marina Vannucci [Adobe Acrobat]


George Varghese

The EarlyBird System for Real-time Detection of Unknown Worms By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage
Automated Worm Fingerprinting By Sumeet Singh, Cristian Estan, George Varghese, Stefan Savage [Adobe Acrobat]


Frans Veldman

EMULATORS or Generic Decryptors By Frans Veldman


Shobha Venkataraman

New Streaming Algorithms for Fast Detection of Superspreaders By Shobha Venkataraman, Dawn Song, Phillip B. Gibbons, Avrim Blum [Adobe Acrobat]


Robert Vibert

A Day in the Life of an Anti-Virus Lab By Robert Vibert


Giovanni Vigna

[Compressed]Attack Languages By Giovanni Vigna, Steven T. Eckmann, Richard A. Kemmerer [GhostScript/GSView]
[Compressed]STATL: An Attack Language for State-based Intrusion Detection By Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer [GhostScript/GSView]
Polymorphic Worm Detection Using Structural Information of Executables By Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna [Adobe Acrobat]


Vasileios Vlachos

Security Applications of Peer-to-Peer Networks By Vasileios Vlachos, Stephanos Androutsellis-Theotokis, Diomidis Spinellis [Adobe Acrobat]


Geoffrey M. Voelker

Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]
Internet Quarantine: Requirements for Containing Self-Propagating Code By David Moore, Colleen Shannon, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]


Milan Vojnovic

On the Race of Worms, Alerts and Patches By Milan Vojnovic, Ayalvadi Ganesh [Adobe Acrobat]


Micheal Vrable

Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm By David Moore, Micheal Vrable, Justin Ma, Jay Chen, Erik Vandekeift, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage [Adobe Acrobat]


John P. Wack

[Broken]Computer Viruses and Related Threats: A Management Guide By Lisa Carnahan, John P. Wack [GhostScript/GSView]
Computer Virus Attacks By John P. Wack, Stanley A. Kurzban


Arno Wagner

Entropy Based Worm And Anomaly Detection In Fast IP Networks By Arno Wagner, Bernhard Plattner [Adobe Acrobat]
Experiences with Worm Propagation Simulations By Arno Wagner, Bernhard Plattner, Thomas Dubendorfer, Roman Hiestand [Adobe Acrobat]


Steven Wallace

Analysis of the "SQL Slammer" worm and its effects on Indiana University and related institutions By Gregory Travis, Ed Balas, David Ripley, Steven Wallace [Adobe Acrobat]


Yi-Min Wang

[FTP]Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities By Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev [Adobe Acrobat]


Xiaoyang Sean Wang

Abstraction-Based Intrusion Detection In Distributed Environments By Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang [Adobe Acrobat]
CARDS: A distributed system for detecting coordinated attacks By Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia [Adobe Acrobat]


Helen J. Wang

Virtual Playgrounds For Worm Behavior Investigation By Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford [Adobe Acrobat]


Chenxi Wang

[FTP]On Computer Viral Infection and the Effect of Immunization By Chenxi Wang, John C. Knight, Matthew C. Elder [Adobe Acrobat]
Modeling the Effects of Timing Parameters on Virus Propagation By Yang Wang, Chenxi Wang [Adobe Acrobat]
Dynamic Quarantine of Internet Worms By Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger [Adobe Acrobat]


Ke Wang

Anomalous Payload-based Network Intrusion Detection By Ke Wang, Salvatore J. Stolfo [Adobe Acrobat]


Yang Wang

Modeling the Effects of Timing Parameters on Virus Propagation By Yang Wang, Chenxi Wang [Adobe Acrobat]


David Watson

A Hybrid Honeypot Architecture For Scalable Network Monitoring By Micheal Bailey, Evan Cooke, David Watson, Farnam Jahanian, Niels Provos [Adobe Acrobat]
The Internet Motion Sensor: A distributed Blackhole Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Farnam Jahanian, Jose Nazario [Adobe Acrobat]
Toward Understanding Distributed Blackhole Placement By Evan Cooke, Micheal Bailey, Morley Mao, David Watson, Farnam Jahanian, Danny McPherson [Adobe Acrobat]
The Internet Motion Sensor: A Distributed Global Scoped Internet Threat Monitoring System By Evan Cooke, Micheal Bailey, David Watson, Jose Nazario, Farnam Jahanian [Adobe Acrobat]


Nicholas Weaver

[Broken]How to Own the Internet in Your Spare Time. By Nicholas Weaver, Vern Paxson , Stuart Staniford
[Broken]Potential Strategies for High Speed Active Worms: A Worst Case Analysis. By Nicholas Weaver [Adobe Acrobat]
[Broken]Warhol Worms: The Potential for Very Fast Internet Plagues By Nicholas Weaver
Future Defenses: Technologies to Stop the Unknown Attack. By Nicholas Weaver
Protocol-Independent Adaptive Replay of Application Dialog By Weidong Cui, Vern Paxson , Nicholas Weaver, Randy H. Katz [Adobe Acrobat]
Preliminary Results Using Scale-Down To Explore Worm Dynamics By Nicholas Weaver, Vern Paxson , Ihab Hamadeh, George Kesidis [Adobe Acrobat]
Outwitting the Witty Worm: Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event By Nicholas Weaver, Vern Paxson , Abhishek Kumar
[Broken]How many ways to Own the Internet? Towards Viable Worm Defenses By Nicholas Weaver [Open Office]
The Top Speed Of Flash Worms By Stuart Staniford, David Moore, Vern Paxson , Nicholas Weaver [Adobe Acrobat]
Reflections on Witty: Analyzing the Attacker By Daniel R. Ellis, Nicholas Weaver
Very Fast Containment of Scanning Worms By Nicholas Weaver, Stuart Staniford, Vern Paxson
A Worst-Case Worm By Nicholas Weaver, Vern Paxson [Adobe Acrobat]


Stephanie Wehner

Analyzing Worms And Network Traffic Using Compression By Stephanie Wehner [Adobe Acrobat]


Sonjie Wei

Distributed Worm Simulation with a Realistic Internet Model By Sonjie Wei, Jelena Mirkovic, Martin Swany [Adobe Acrobat]


Joe Wells

Hoaxes & Hypes By Richard Ford, Sarah Gordon, Joe Wells
How to Spot a Virus Hoax By Joe Wells
[Broken]A Credibility Model for Antivirus Industry Self-Regulation By Joe Wells [Adobe Acrobat]
A Radical New Approach to Virus Scanning By Joe Wells
Environmental Impact: Microsoft Operating Systems and the Computer Virus Threat By Joe Wells


David Wetherall

A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers By Ankur Jain, Joseph M. Hellerstein, Sylvia Ratnasamy, David Wetherall [Adobe Acrobat]


Ian Whalley

An Environment for Controlled Worm Replication and Analysis (or: Internet-inna-Box) By Ian Whalley, David M. Chess, William C. Arnold, John F. Morar, Morton Swimmer, Alla Segal
[Broken]Viruses in Chicago: The Threat to Windows 95 By Ian Whalley
Testing Times for Trojans By Ian Whalley
An Environment for Controlled Worm Replication and Analysis or Internet-inna-Box By Ian Whalley, William C. Arnold, David M. Chess, John F. Morar, Alla Segal, Morton Swimmer


Steve R. White

IBM: Coping With Computer Viruses and Related Problems By Steve R. White, David M. Chess, Jimmy Kuo
Computer Viruses: A Global Perspective By Steve R. White, Jeffrey O. Kephart, David M. Chess
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
An Undetectable Computer Virus By David M. Chess, Steve R. White
How Prevalent are Computer Viruses? By Jeffrey O. Kephart, Steve R. White
[Broken]Measuring Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Measuring and Modeling Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Directed-Graph Epidemological Models of Computer Viruses By Jeffrey O. Kephart, Steve R. White
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White
Open Problems in Computer Virus Research By Steve R. White
Virus Bulletin 2010: A Retrospective By Steve R. White
Measuring and Modeling Computer Virus Prevalence By Jeffrey O. Kephart, Steve R. White
Computers and Epidemiology By Jeffrey O. Kephart, David M. Chess, Steve R. White
Anatomy of a Commercial-Grade Immune System By Steve R. White, Morton Swimmer, Edward J. Pring, William C. Arnold, David M. Chess, John F. Morar
Blueprint for a Computer Immune System By Jeffrey O. Kephart, Gregory B. Sorkin, Morton Swimmer, Steve R. White


David Whyte

Addressing Malicious SMTP-based Mass-Mailing Activity Within An Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
ARP-based Detection of Scanning Worms Within an Enterprise Network By David Whyte, P. C. van Oorschot, Evangelos Kranakis [Adobe Acrobat]
DNS-based Detection of Scanning Worms in an Enterprise Network By David Whyte, Evangelos Kranakis, P. C. van Oorschot [Adobe Acrobat]


Micheal J. Wiacek

The Case For Using Layered Defenses To Stop Worms By David J. Albanese, Micheal J. Wiacek, Christopher M. Salter, Jeffrey A. Six [Adobe Acrobat]


Georg Wicherski

Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks By Felix C. Freiling, Thorsten Holz, Georg Wicherski [Adobe Acrobat]


Brandon Wiley

Curious Yellow: The First Coordinated Worm Design By Brandon Wiley


William 0. Wilson

Cooperative Automated worm Response and Detection ImmuNe ALgorithm (CARDINAL) inspired by T-cell Immunity and Tolerance By Jungwon Kim, William 0. Wilson, Uwe Aickelin, Julie McLeod [Adobe Acrobat]


Cynthia Wong

Dynamic Quarantine of Internet Worms By Cynthia Wong, Chenxi Wang, Dawn Song, Stan Bielski, Gregory R. Ganger [Adobe Acrobat]


Charles P. Wright

Avfs: An On-Access Anti-Virus File System By Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok


S. Felix Wu

On Deriving Unknown Vulnerabilities from ZeroDay Polymorphic and Metamorphic Worm Exploits By Jedidiah R. Crandall, Zhendong Su, S. Felix Wu, Frederic T. Chong [Adobe Acrobat]


Kuang Wu

[Broken]A Behavior-Based Anti-Worm System By Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Kuang Wu, Nigel H. Lin, Louis H. Lin [Open Office]


Jiang Wu

An Effective Architecture and Algorithm for Detecting Worms with Various Scan Techniques By Jiang Wu, Sarma Vangala, Lixin Gao, Kevin Kwiat [Adobe Acrobat]


Yun Xiaochun

Broadband Network Virus Detection System Based on Bypass Monitor By Wu Bing, Yun Xiaochun, Xiao Xinguang [Adobe Acrobat]


Yinglian Xie

Seurat: A Pointillist Approach to Anomaly Detection By Yinglian Xie, Hyang-Ah Kim, David R. OHallaron, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Worm Origin Identification Using Random Walks By Yinglian Xie, Vyas Sekar, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Toward a Framework for Internet Forensic Analysis By Vyas Sekar, Yinglian Xie, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]


Xiao Xinguang

Broadband Network Virus Detection System Based on Bypass Monitor By Wu Bing, Yun Xiaochun, Xiao Xinguang [Adobe Acrobat]


Jintao Xiong

ACT: Attachment Chain Tracing Scheme for Email Virus Detection and Control By Jintao Xiong [Adobe Acrobat]


Dongyan Xu

Virtual Playgrounds For Worm Behavior Investigation By Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford [Adobe Acrobat]
Collapsar: A VM-Based Architecture for Network Attack Detention By Xuxian Jiang, Dongyan Xu [Open Office]
Worm Meets Beehive By Xuxian Jiang, Dongyan Xu, Shan Lei, Paul Ruth, Jianzhong Sun [Adobe Acrobat]


Jun Xu

WORM vs. WORM: Preliminary Study of an Active CounterAttack Mechanism By Frank Castaneda, Emre Can Sezery, Jun Xu [Adobe Acrobat]


Dong Xuan

Analyzing Impacts of Peer-to-Peer Systems on Propagation of Active Worm Attacks By Wei Yu, Corey Boyer, Dong Xuan [Adobe Acrobat]


Sung Moo Yang

Wandering and Cruise By Sung Moo Yang
[WEB ARCHIVE]Productivity Technology and AntiVirus Industry By Sung Moo Yang
[Broken][Compressed]The Behavioral Solution By Sung Moo Yang [Open Office]
[WEB ARCHIVE][Compressed]The Behavior Cruise By Sung Moo Yang [Open Office]
[WEB ARCHIVE]Autonomous Mobile Cyber Weapon By Sung Moo Yang
[WEB ARCHIVE]AMCW - A New Weapon for the New Millennium By Sung Moo Yang
[WEB ARCHIVE]Reproduction of Viruses By Sung Moo Yang


Jiahai Yang

CARDS: A distributed system for detecting coordinated attacks By Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia [Adobe Acrobat]


Jing Yang

Fast Worm Propagation in IPv6 Networks By Jing Yang [Open Office]


Vinod Yegneswaran

An Inside Look at Botnets By Paul Barford, Vinod Yegneswaran [Adobe Acrobat]
Internet Intrusions: Global Characteristics and Prevalence By Vinod Yegneswaran, Paul Barford, Johannes Ullrich [Adobe Acrobat]
[Broken]Characteristics of Internet Background Radiation By Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson , Larry Peterson [Adobe Acrobat]


Tarkan Yetiser

Polymorphic Viruses By Tarkan Yetiser


Xiaoxin Yin

Correlation between NetFlow System and Network Views for Intrusion Detection By Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, William Yurcik [Adobe Acrobat]


InSeon Yoo

Adaptive Detection Of Worms/Viruses In Firewalls By InSeon Yoo, Ulrich Ultes-Nitsche [Adobe Acrobat]


Yuan Yougu

A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations By Micheal Liljenstam, Yuan Yougu, BJ Premore, David Nicol [Adobe Acrobat]


Wei Yu

Analyze the Worm-based Attack in Large Scale P2P Networks By Wei Yu [Adobe Acrobat]
Analyzing Impacts of Peer-to-Peer Systems on Propagation of Active Worm Attacks By Wei Yu, Corey Boyer, Dong Xuan [Adobe Acrobat]


William Yurcik

Correlation between NetFlow System and Network Views for Intrusion Detection By Cristina Abad, Yifan Li, Kiran Lakkaraju, Xiaoxin Yin, William Yurcik [Adobe Acrobat]


Erez Zadok

MEF: Malicious Email Filter: A UNIX Mail Filter that Detects Malicious Windows Executables By Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Manasi Bhattacharyyab , Salvatore J. Stolfo [GhostScript/GSView]
Data Mining Methods for Detection of New Malicious Executables By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [Adobe Acrobat]
[Broken]Learning To Detect New and Unknown Malicious Programs By Eleazar Eskin, Matthew G. Schultz, Erez Zadok, Salvatore J. Stolfo [GhostScript/GSView]
Avfs: An On-Access Anti-Virus File System By Yevgeniy Miretskiy, Abhijith Das, Charles P. Wright, Erez Zadok


Diego Zamboni

Using Internal Sensors For Computer Intrusion Detection By Diego Zamboni [Adobe Acrobat]


Kim Zelonis

A Public Health Approach to Preventing Malware Propagation By Kim Zelonis [Adobe Acrobat]


Lenny Zeltser

The Evolution Of Malicious Agents By Lenny Zeltser [Adobe Acrobat]


Lintao Zhang

A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]


Hui Zhang

Seurat: A Pointillist Approach to Anomaly Detection By Yinglian Xie, Hyang-Ah Kim, David R. OHallaron, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
Worm Origin Identification Using Random Walks By Yinglian Xie, Vyas Sekar, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]
[Broken]A Scalable High Performance Network Monitoring Agent For CERNET By Hui Zhang [Adobe Acrobat]
Toward a Framework for Internet Forensic Analysis By Vyas Sekar, Yinglian Xie, David A. Maltz, Micheal K. Reiter, Hui Zhang [Adobe Acrobat]


Beichuan Zhang

Analysis of BGP Update Surge during Slammer Worm Attack By Mohit Lad, Xiaoliang Zhao, Beichuan Zhang, Dan Massey, Lixia Zhang [Adobe Acrobat]


Lixia Zhang

Analysis of BGP Update Surge during Slammer Worm Attack By Mohit Lad, Xiaoliang Zhao, Beichuan Zhang, Dan Massey, Lixia Zhang [Adobe Acrobat]


Xiaoliang Zhao

Analysis of BGP Update Surge during Slammer Worm Attack By Mohit Lad, Xiaoliang Zhao, Beichuan Zhang, Dan Massey, Lixia Zhang [Adobe Acrobat]


Hui Zheng

Active Technologies To Containe Internet Worm By Hui Zheng, Haixin Duan [Adobe Acrobat]


Runfang Zhou

WormShield: Collaborative Worm Signature Detection Using Distributed Aggregation Trees By Min Cai, Kai Hwang, Shanshan Song, Runfang Zhou, Christos Papodopoulos [Adobe Acrobat]
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks By Kai Hwang, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen, Ying Chen, Runfang Zhou, Xiaosong Lou [Adobe Acrobat]


Lidong Zhou

A First Look at Peer-to-Peer Worms: Threats and Defenses By Lidong Zhou, Lintao Zhang, Frank McSherry, Nicole Immorlica, Manuel Costa, Steve Chien [Adobe Acrobat]


Cliff Changchun Zou

Modelling Botnet Propagation Using Time Zones By David Dagon, Cliff Changchun Zou, Wenke Lee [Adobe Acrobat]
Adaptive Defense Against Various Network Attacks By Don Towsley, Cliff Changchun Zou, Nick Duffield, Weibo Gong [Adobe Acrobat]
Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
A Firewall Network System for Worm Defense in Enterprise Networks By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]
Monitoring and Early Warning for Internet Worms By Cliff Changchun Zou, Lixin Gao, Weibo Gong, Don Towsley [Adobe Acrobat]
Feedback Email Worm Defense System for Enterprise Network By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
The Monitoring and Early Detection of Internet Worms By Cliff Changchun Zou, Weibo Gong, Don Towsley, Lixin Gao [Adobe Acrobat]
Routing Worm: A Fast, Selective Attack Worm based on IP Address Information By Cliff Changchun Zou, Don Towsley, Weibo Gong, Songlin Cai [Adobe Acrobat]
Email Virus Propagation Modeling and Analysis By Cliff Changchun Zou, Don Towsley, Weibo Gong
[Broken]Code red worm propagation modeling and analysis By Cliff Changchun Zou, Weibo Gong, Don Towsley [Adobe Acrobat]
On the Performance of Internet Worm Scanning Strategies By Cliff Changchun Zou, Don Towsley, Weibo Gong [Adobe Acrobat]
Witty Worm Propagation Modeling By Cliff Changchun Zou


last modified Thursday, January 04, 2007 : this page created by software written by kurt wismer