OtherDOI
The Cornell commission: on Morris and the worm
Ted Eisenberg,David Gries,Juris Hartmanis,Don Holcomb,M. Stuart Lynn,Thomas Santoro +5 more
- pp 253-259
About:
The article was published on 1991-02-27. It has received 9 citations till now.read more
Citations
More filters
Book ChapterDOI
Behavior-based worm detectors compared
Shad Stafford,Jun Li +1 more
TL;DR: It is shown that the underlying network trace used to evaluate worm detectors significantly impacts their measured performance, and that connection failure monitoring is the most effective algorithm in many environments, but it fails badly at detecting topologically aware worms.
Dissertation
File Detection in Network Traffic Using Approximate Matching
TL;DR: 'known file content' detection in network traffic using approximate matching is presented and performs content analysis on-the-fly and is easy to deploy and maintain, as only file fingerprint is required, instead of verbose rules.
Journal ArticleDOI
On Computer Security Incident Response Teams
TL;DR: This special issue will give a greater understanding of what CSIRTs are and how they work, and security practitioners and policy makers can gain insights into how their work might impact these critical organizations.
Proceedings ArticleDOI
Reflections on UNIX Vulnerabilities
TL;DR: How the nature of vulnerabilities has (and has not) changed since then is examined, and some thoughts on the future of vulnerabilities in the UNIX operating system and its variants and other UNIX-like systems are presented.
Proceedings ArticleDOI
Stealthy software: Next-generation cyber-attacks and defenses
TL;DR: Reactively adaptive malware and automated binary transformation are two recently emerging offensive and defensive technologies that may shape future cyberwarfare weapons.