Nimda

Results: 16



#Item
1Understanding Global Internet Health David Moore () January, 2003

Understanding Global Internet Health David Moore () January, 2003

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-28 14:54:20
2Welcome to Blackhat! Blackhat Security Briefings Singapore, October 4, 2002 Timothy M. Mullen AnchorIS.Com, Inc.

Welcome to Blackhat! Blackhat Security Briefings Singapore, October 4, 2002 Timothy M. Mullen AnchorIS.Com, Inc.

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:23
3WHITE PAPER TREND MICRO™ ENTERPRISE PROTECTION STRATEGY™ DECEMBER 2002

WHITE PAPER TREND MICRO™ ENTERPRISE PROTECTION STRATEGY™ DECEMBER 2002

Add to Reading List

Source URL: www.biznetvigator.com

Language: English - Date: 2008-04-24 04:40:57
4Microsoft Security Fundamentals Andrew Cushman Director Security Engineering & Community Contact: andrewcu at microsoft dot com July 6, 06

Microsoft Security Fundamentals Andrew Cushman Director Security Engineering & Community Contact: andrewcu at microsoft dot com July 6, 06

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
5How to 0wn the Internet in Your Spare Time Stuart Staniford∗ Silicon Defense Vern Paxson† ICSI Center for Internet Research

How to 0wn the Internet in Your Spare Time Stuart Staniford∗ Silicon Defense Vern Paxson† ICSI Center for Internet Research

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2002-05-14 12:59:01
6Microsoft Word - InfoWar.doc

Microsoft Word - InfoWar.doc

Add to Reading List

Source URL: www.bakercyberlawcentre.org

Language: English - Date: 2005-08-22 03:58:01
78 • VIRUS BULLETIN FEBRUARY[removed]VIRUS ANALYSIS 3 Bad Transfer Peter Ferrie and Péter Ször Symantec Security Response, USA

8 • VIRUS BULLETIN FEBRUARY[removed]VIRUS ANALYSIS 3 Bad Transfer Peter Ferrie and Péter Ször Symantec Security Response, USA

Add to Reading List

Source URL: pferrie.host22.com

Language: English - Date: 2011-09-27 16:13:20
8Simulating and optimising worm propagation algorithms Tom Vogt <tom@lemuria.org> 29th September 2003 (updated 9th February 2004) Abstract This paper describes a series of simulations run to estimate various worm growth p

Simulating and optimising worm propagation algorithms Tom Vogt 29th September 2003 (updated 9th February 2004) Abstract This paper describes a series of simulations run to estimate various worm growth p

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2004-02-09 10:36:14
9Large Scale Malicious Code: A Research Agenda ∗† Nicholas Weaver Vern Paxson Silicon Defense & ICSI Center for UC Berkeley Internet Research

Large Scale Malicious Code: A Research Agenda ∗† Nicholas Weaver Vern Paxson Silicon Defense & ICSI Center for UC Berkeley Internet Research

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-05-05 13:14:30
10Microsoft Word - SECURITY TERMS.doc

Microsoft Word - SECURITY TERMS.doc

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2007-08-17 18:53:40