[go: up one dir, main page]

Orman, 2003 - Google Patents

The Morris worm: A fifteen-year perspective

Orman, 2003

View PDF
Document ID
2351768608430887546
Author
Orman H
Publication year
Publication venue
IEEE Security & Privacy

External Links

Snippet

The Morris worm: a fifteen-year perspective Page 1 The Morris Worm HILARIE ORMAN Purple Streak PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/03/$17.00 © 2003 IEEE ■ IEEE SECURITY & PRIVACY 35 On the evening of 2 November 1988, a brush fire …
Continue reading at www.cs.umd.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Orman The Morris worm: A fifteen-year perspective
Kemmerer Cybersecurity
Sabillon et al. Cybercriminals, cyberattacks and cybercrime
Peter et al. A practical guide to honeypots
Bhatnagar et al. Advance persistant threat and cyber spying-the big picture, its tools, attack vectors and countermeasures
Govil Examining the criminology of bot zoo
Foo et al. Mobile agents for computer intrusion detection
Al-Hammadi Behavioural correlation for malicious bot detection
Bryant PTFM: Purple Team Field Manual
Lukatsky et al. Protect your information with intrusion detection
Liu et al. A goal-oriented approach for modeling and analyzing attack graph
Ye Resilience to DDoS attacks
Kalnai et al. DDoS trojan: A malicious concept that conquered the elf format
OGINGA A MODEL FOR DETECTING INFORMATION TECHNOLOGY INFRASTRUCTURE POLICY VIOLATIONS IN A CLOUD ENVIRONMENT
Vasilakis Penetration testing in computer systems
Karn IT/IOT CYBER EXPLORATION
Li Computer viruses: The threat today and the expected future
Rolston Attack methodology analysis: Emerging trends in computer-based attack methodologies and their applicability to control system networks
Mohammed Automated signature generation for zero-day polymorphic worms using a double-honeynet
Stull Open source tools: applications and implications
Heberlein Automatic Signature Generation Final Report: Addressing Limitation of Approach for Self-Propagating Attacks
Verma et al. Automated multilevel defence model to investigate packets for web interface
Shahzad An investigation of mechanisms to mitigate zero-day computer worms within computer networks
Wright Securing networked applications using cross-referenced Pseudoserver IDS log databases and Java
Dhoot DEVELOPING A LOW COST SOLUTION FOR ENTERPRISE SECURITY