Defending against hitlist worms using network address space randomization
- 1 August 2007
- journal article
- Published by Elsevier BV in Computer Networks
- Vol. 51 (12), 3471-3490
- https://doi.org/10.1016/j.comnet.2007.02.006
Abstract
No abstract availableThis publication has 20 references indexed in Scilit:
- The top speed of flash wormsPublished by Association for Computing Machinery (ACM) ,2004
- Fast Detection of Scanning Worm InfectionsLecture Notes in Computer Science, 2004
- Monitoring and early warning for internet wormsPublished by Association for Computing Machinery (ACM) ,2003
- Inside the Slammer wormIEEE Security & Privacy, 2003
- Randomized instruction set emulation to disrupt binary code injection attacksPublished by Association for Computing Machinery (ACM) ,2003
- Code-RedPublished by Association for Computing Machinery (ACM) ,2002
- Dynamic Host Configuration Protocol1997
- Sharing and protection in a single-address-space operating systemACM Transactions on Computer Systems, 1994
- Computer virusesComputers & Security, 1987
- Bootstrap Protocol1985