Orman, 2003 - Google Patents
The Morris worm: A fifteen-year perspectiveOrman, 2003
View PDF- Document ID
- 2351768608430887546
- Author
- Orman H
- Publication year
- Publication venue
- IEEE Security & Privacy
External Links
Snippet
The Morris worm: a fifteen-year perspective Page 1 The Morris Worm HILARIE ORMAN Purple
Streak PUBLISHED BY THE IEEE COMPUTER SOCIETY ■ 1540-7993/03/$17.00 © 2003
IEEE ■ IEEE SECURITY & PRIVACY 35 On the evening of 2 November 1988, a brush fire …
- 201000009910 diseases by infectious agent 0 description 16
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Orman | The Morris worm: A fifteen-year perspective | |
Kemmerer | Cybersecurity | |
Sabillon et al. | Cybercriminals, cyberattacks and cybercrime | |
Peter et al. | A practical guide to honeypots | |
Bhatnagar et al. | Advance persistant threat and cyber spying-the big picture, its tools, attack vectors and countermeasures | |
Govil | Examining the criminology of bot zoo | |
Foo et al. | Mobile agents for computer intrusion detection | |
Al-Hammadi | Behavioural correlation for malicious bot detection | |
Bryant | PTFM: Purple Team Field Manual | |
Lukatsky et al. | Protect your information with intrusion detection | |
Liu et al. | A goal-oriented approach for modeling and analyzing attack graph | |
Ye | Resilience to DDoS attacks | |
Kalnai et al. | DDoS trojan: A malicious concept that conquered the elf format | |
OGINGA | A MODEL FOR DETECTING INFORMATION TECHNOLOGY INFRASTRUCTURE POLICY VIOLATIONS IN A CLOUD ENVIRONMENT | |
Vasilakis | Penetration testing in computer systems | |
Karn | IT/IOT CYBER EXPLORATION | |
Li | Computer viruses: The threat today and the expected future | |
Rolston | Attack methodology analysis: Emerging trends in computer-based attack methodologies and their applicability to control system networks | |
Mohammed | Automated signature generation for zero-day polymorphic worms using a double-honeynet | |
Stull | Open source tools: applications and implications | |
Heberlein | Automatic Signature Generation Final Report: Addressing Limitation of Approach for Self-Propagating Attacks | |
Verma et al. | Automated multilevel defence model to investigate packets for web interface | |
Shahzad | An investigation of mechanisms to mitigate zero-day computer worms within computer networks | |
Wright | Securing networked applications using cross-referenced Pseudoserver IDS log databases and Java | |
Dhoot | DEVELOPING A LOW COST SOLUTION FOR ENTERPRISE SECURITY |