First Page | Document Content | |
---|---|---|
![]() Date: 2005-08-22 03:58:01Code Red Blended threat Nimda Computer virus Antivirus software SQL Slammer Trojan horse Morris worm Vector Malware System software Computer worms | Add to Reading List |
![]() | Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin PoosankamDocID: 1oZUv - View Document |
![]() | Interdomain Routing Streams Timothy G. Griffin∗ Zhuoqing Morley Mao† AbstractDocID: 1ovh5 - View Document |
![]() | Preliminary Results Using Scale-Down to Explore Worm Dynamics Nicholas Weaver∗ Ihab Hamadeh†DocID: 1lLx5 - View Document |
![]() | The Top Speed of Flash Worms Stuart Staniford∗ David Moore† Vern Paxson‡DocID: 1lakD - View Document |
![]() | reflections on witty by Nicholas Weaver Nicholas Weaver is a postdoctoral researcher at theDocID: 1l1Uk - View Document |