SQL Slammer

Results: 54



#Item
1Computer worms / Computer network security / Warhol worm / SQL Slammer / Computer security / Antibody

Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin Poosankam

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
2Internet Standards / Routing / Computer networking / Internet protocols / Border Gateway Protocol / Autonomous system / Route Views / Router / Routing protocol / SQL Slammer / IP hijacking

Interdomain Routing Streams Timothy G. Griffin∗ Zhuoqing Morley Mao† Abstract

Add to Reading List

Source URL: sahara.cs.berkeley.edu

Language: English - Date: 2004-05-07 19:48:08
3Cyberwarfare / Computer security / Security / Computer network security / Denial-of-service attacks / SQL Slammer / Code Red / Computer worm / Witty

Preliminary Results Using Scale-Down to Explore Worm Dynamics Nicholas Weaver∗ Ihab Hamadeh†

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:10
4Malware / Computer worms / Denial-of-service attacks / SQL Slammer / Warhol worm / Witty / Code Red / Transmission Control Protocol / Transport layer / Computer network security

The Top Speed of Flash Worms Stuart Staniford∗ David Moore† Vern Paxson‡

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:06
5Computer security / Cyberwarfare / Computing / Software bugs / Computer worms / Computer network security / Witty / Hacking / Software testing / Buffer overflow / Stack buffer overflow / SQL Slammer

reflections on witty by Nicholas Weaver Nicholas Weaver is a postdoctoral researcher at the

Add to Reading List

Source URL: www1.icsi.berkeley.edu

Language: English - Date: 2012-09-26 16:43:03
6Computer worms / Cyberwarfare / Warhol worm / Data security / Intrusion detection system / SQL Slammer / Snort / Botnet / Anomaly detection / Computer network security / System software / Software

Stuart Staniford, PhD 812 Irish Settlement Rd, Freeville, NYoffice/fax (cell/voicemail)

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English
7Computer network security / Nimda / SQL Slammer / Code Red II / Computer worm / Denial-of-service attack / Root name server / Code Red / Mydoom / Malware / System software / Denial-of-service attacks

Understanding Global Internet Health David Moore () January, 2003

Add to Reading List

Source URL: www.caida.org

Language: English - Date: 2015-05-28 14:54:20
8Computer virus / Zotob / Mydoom / SQL Slammer / Storm Worm / Macro virus / Computer worms / Malware / System software / W32

Attachment 1 Computer Virus Incident Report for NovemberVirus Detection Count by Month 2. Virus Report Count by Month

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-23 07:51:49
9Malware / Denial-of-service attacks / SQL Slammer / Computer worm / Dataflow / Vulnerability / Type I and type II errors / System software / Computer security / Cyberwarfare

Vigilante: End-to-End Containment of Internet Worms Manuel Costa Joint work with: Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham

Add to Reading List

Source URL: www.fp6-noah.org

Language: English - Date: 2007-12-14 13:39:06
10Cyberwarfare / Morris worm / Parasitic worm / Antibody / Computer security / Failure / Computer worms / Warhol worm / SQL Slammer

Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin Poosankam

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2014-02-03 21:49:58
UPDATE