Morris worm

Results: 43



#Item
1COMPUTING PRACTICES The

COMPUTING PRACTICES The "Worm" Programs Early Experience with a Distributed Computation

Add to Reading List

Source URL: www.eecs.harvard.edu

Language: English
2Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Memory Corruption Attacks The (almost) Complete History thinkst applied research haroon meer

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:53:12
3Mobile Contagion: Simulation of Infection & Defense Everett Anderson Kevin Eustice Shane Markstrum Mark Hansen Peter Reiher Computer Science Computer Science Computer Science

Mobile Contagion: Simulation of Infection & Defense Everett Anderson Kevin Eustice Shane Markstrum Mark Hansen Peter Reiher Computer Science Computer Science Computer Science

Add to Reading List

Source URL: lasr.cs.ucla.edu

Language: English - Date: 2005-06-22 14:08:19
4Stop complaining and solve a security problem instead  Stop complaining and… Solve a Security Problem Instead

Stop complaining and solve a security problem instead Stop complaining and… Solve a Security Problem Instead

Add to Reading List

Source URL: blog.ivanristic.com

Language: English - Date: 2013-02-15 05:44:27
5COMPUTING PRACTICES The

COMPUTING PRACTICES The "Worm" Programs Early Experience with a Distributed Computation

Add to Reading List

Source URL: vxheaven.org

Language: English - Date: 2005-06-18 21:19:10
6Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu  Pongsin Poosankam

Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin Poosankam

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-02-03 21:49:58
7A Worst-Case Worm ∗ Nicholas Weaver International Computer Science Institute   Vern Paxson

A Worst-Case Worm ∗ Nicholas Weaver International Computer Science Institute Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-06-08 10:49:32
8How to 0wn the Internet in Your Spare Time Stuart Staniford∗ Silicon Defense Vern Paxson† ICSI Center for Internet Research

How to 0wn the Internet in Your Spare Time Stuart Staniford∗ Silicon Defense Vern Paxson† ICSI Center for Internet Research

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2002-05-14 12:59:01
9WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism ∗† Frank Castaneda ˜

WORM vs. WORM: Preliminary Study of an Active Counter-Attack Mechanism ∗† Frank Castaneda ˜

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-11-02 14:39:42
10Addressing the Threat of Internet Worms Vern Paxson ICSI Center for Internet Research and Lawrence Berkeley National Laboratory

Addressing the Threat of Internet Worms Vern Paxson ICSI Center for Internet Research and Lawrence Berkeley National Laboratory

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2005-02-23 19:36:23