[ Pobierz całość w formacie PDF ]
26. Barry, J.: The story of influenza. In Knobler S, Mack A, M.A.L.S., ed.: The Threat
of Pandemic Influenza: Are We Ready? The National Academies Press (2005) 58
27. Quarterman, J.S.: Monoculture considered harmful. First Monday 7(2) (2002)
28. Bailey, M.G.: Malware resistant networking using system diversity. In: SIGITE
05: Proceedings of the 6th conference on Information technology education, New
York, NY, ACM Press (2005) 191 197
29. Moore, D., Shannon, C., k claffy: Code-Red: a case study on the spread and
victims of an internet worm. In: IMW 02: Proceedings of the 2nd ACM SIGCOMM
Workshop on Internet Measurement, New York, NY, ACM Press (2002) 273 284
30. Forrest, S., Somayaji, A., Ackley, D.: Building diverse computer systems. In:
HOTOS 97: Proceedings of the 6th Workshop on Hot Topics in Operating Systems
(HotOS-VI), Washington, DC, IEEE Computer Society (1997) 67
31. Zhang, Y., Vin, H., Alvisi, L., Lee, W., Dao, S.K.: Heterogeneous networking: a
new survivability paradigm. In: NSPW 01: Proceedings of the 2001 workshop on
New security paradigms, New York, NY, ACM Press (2001) 33 39
32. Geer, D.: Cyberinsecurity: The cost of monopoly. Technical report, Computer and
Communications Industry Association (September 2003)
33. Survey, N.http://news.netcraft.com/accessed Feb.7th, 2007.
34. Wheeler, D.A.: Why open source software. http://www.dwheeler.com/oss_fs_
why.html#market_share(November 2005) accessed Feb. 7th, 2007.
15
35. Todar, K.: Growth of bacterial populations. http://textbookofbacteriology.
net/growth.html(2002) U Wis. (Madison) Dep. of Bacteriology.
36. Gingerich, P.: Quantification and comparison of evolutionary rates. American
Journal of Science 293A (1993) 453 478
37. Kraus, J.: Selbstreproduktion bei Programmen. Master s thesis, Universität Dort-
mund (Germany) (February 1980)
38. Peikari, C.: Analyzing the crossover virus: The first pc to windows handheld cross-
infector.http://www.informit.com/articles/printerfriendly.aspx?p=458169
(March 2006) accessed Oct. 17th, 2007.
39. Pastor-Satorras, R., Vespignani, A.: Epidemic spreading in scale-free networks.
Phys. Rev. Lett. 86(14) (Apr 2001) 3200 3203
40. Inc, C.: Malware outbreak trend report: Bagle-worm. Technical report (March
2007) accessed Oct. 17th, 2007.
41. Inc, C.: Server-side polymorphic viruses surge past av defenses. Technical report
(May 2007) accessed Oct. 17th, 2007.
42. Schechtman, G.M.: Manipulating the ooda loop: The overlooked role of information
resource management in information warfare. Master s thesis, Air Force Institute
of Technology (1996)
43. Ullman, D.G.: OO-OO-OO! the sound of a broken OODA loop. Journal of
Defense Software Engineering 20(4) (April 2007) 22 25
44. Kullback, S., Leibler, R.A.: On information and sufficiency. The Annals of Math-
ematical Statistics 22(1) (March 1951) 79 86
45. Hoepers, C., Steding-Jessen, K., Montes, A.: Honeynets Applied to the CSIRT
Scenario. In: Proceedings of the 15th Annual Computer Security Incident Handling
Conference, Ottawa, Canada (June 2003)
46. Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.C.: The Nepenthes
Platform: An Efficient Approach to Collect Malware. [13] 165 184
47. Crandall, J.R., Su, Z., Wu, S.F., Chong, F.T.: On deriving unknown vulnerabilities
from zero-day polymorphic and metamorphic worm exploits. In: CCS 05: Proceed-
ings of the 12th ACM conference on Computer and communications security, New
York, NY, ACM Press (2005) 235 248
48. Eagle, C.: Ripple in the gene pool. In: Defcon 14, Las Vegas (NV) (July 2006)
49. Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., Boneh, D.: On the
effectiveness of address-space randomization. In: CCS 04: Proceedings of the 11th
ACM conference on Computer and communications security, New York, NY, ACM
Press (2004) 298 307
50. Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A content anomaly detector resis-
tant to mimicry attack. [13] 226 248
51. Bilar, D.: On callgraphs and generative mechanisms. Journal in Computer Virology
3(4) (November 2007)
52. George Cybenko, Vincent H. Berk, V.C.R.S.G., Jiang, G.: An overview of process
query systems. In: Proceedings of the SPIE: Sensors, and Command, Control,
Communications, and Intelligence (C3I) Technologies for Homeland Security and
Homeland Defense. Volume 5403. (2004)
53. Roblee, C., Cybenko, G.: Implementing large-scale autonomic server monitoring
using process query systems. In: ICAC 05: Proceedings of the Second International
Conference on Automatic Computing, Washington, DC, IEEE Computer Society
(2005) 123 133
54. Cybenko, G.: The mathematics and algorithmics of process detection. Institute
for Pure and Applied Mathematics (UCLA) (7 2005)
16
55. Goldin, D., Wegner, P.: The church-turing thesis: Breaking the myth. Lecture
Notes in Computer Science: New Computational Paradigms (2005) 152 168
56. Rado, T.: On non-computable functions. Bell Systems Technical Journal 41(3)
(May 1962) 877 884
57. Goldin, D.Q., Smolka, S.A., Wegner, P.: Interactive Computation: The New
Paradigm. Springer (September 2006)
58. Binmore, K.: Playing for real: a text on game theory. Oxford University Press
(2007)
59. Shor, M.: Notes on game theory.http://www.gametheory.net/lectures/(2007)
60. Liston, T.: Labrea.http://www.hackbusters.net(2003)
61. Borders, K., Zhao, X., Prakash, A.: Siren: Catching evasive malware (short paper).
In: SP 06: Proceedings of the 2006 IEEE Symposium on Security and Privacy,
Washington, DC, IEEE Computer Society (2006) 78 85
62. Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in
network intrusion detection. In: Proceedings of the 42nd IEEE Conference on
Decision and Control, Maui (HI) (December 2003)
63. Liu, Y., Comaniciu, C., Man, H.: A bayesian game approach for intrusion detection
in wireless ad hoc networks. In: GameNets 06: Proceeding from the 2006 workshop
on Game theory for communications and networks, New York, NY, ACM Press
(2006) 4
64. von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart auto-
matically. Commun. ACM 47(2) (February 2004) 56 60
65. NEC: SEAL VoIP anti-spam. http://www.itwire.com.au/content/view/8981/
127/(accessed Feb. 11th,2007)
66. Wasenaar, T., Blaser, M.: Contagion on the internet. Emerging Infectious Diseases
8(3) (March 2002) 335 336
67. Hall, K.J.: Thwarting Network Stealth Worms in Networks Through Biological
Epidemiology. PhD thesis, Virginia Polytechnic Institute and State University
(May 2006)
68. Crandall, J.R., Wassermann, G., de Oliveira, D.A.S., Su, Z., Wu, S.F., Chong, F.T.:
Temporal search: detecting hidden malware timebombs with virtual machines. In:
ASPLOS-XII: Proceedings of the 12th international conference on Architectural
support for programming languages and operating systems, New York, NY, ACM
Press (2006) 25 36
69. Zou, C.C., Gong, W., Towsley, D.: Worm propagation modeling and analysis
under dynamic quarantine defense. In: WORM 03: Proceedings of the 2003 ACM
workshop on Rapid malcode, New York, NY, ACM Press (2003) 51 60 [ Pobierz całość w formacie PDF ]
zanotowane.pl doc.pisz.pl pdf.pisz.pl ocenkijessi.opx.pl
26. Barry, J.: The story of influenza. In Knobler S, Mack A, M.A.L.S., ed.: The Threat
of Pandemic Influenza: Are We Ready? The National Academies Press (2005) 58
27. Quarterman, J.S.: Monoculture considered harmful. First Monday 7(2) (2002)
28. Bailey, M.G.: Malware resistant networking using system diversity. In: SIGITE
05: Proceedings of the 6th conference on Information technology education, New
York, NY, ACM Press (2005) 191 197
29. Moore, D., Shannon, C., k claffy: Code-Red: a case study on the spread and
victims of an internet worm. In: IMW 02: Proceedings of the 2nd ACM SIGCOMM
Workshop on Internet Measurement, New York, NY, ACM Press (2002) 273 284
30. Forrest, S., Somayaji, A., Ackley, D.: Building diverse computer systems. In:
HOTOS 97: Proceedings of the 6th Workshop on Hot Topics in Operating Systems
(HotOS-VI), Washington, DC, IEEE Computer Society (1997) 67
31. Zhang, Y., Vin, H., Alvisi, L., Lee, W., Dao, S.K.: Heterogeneous networking: a
new survivability paradigm. In: NSPW 01: Proceedings of the 2001 workshop on
New security paradigms, New York, NY, ACM Press (2001) 33 39
32. Geer, D.: Cyberinsecurity: The cost of monopoly. Technical report, Computer and
Communications Industry Association (September 2003)
33. Survey, N.http://news.netcraft.com/accessed Feb.7th, 2007.
34. Wheeler, D.A.: Why open source software. http://www.dwheeler.com/oss_fs_
why.html#market_share(November 2005) accessed Feb. 7th, 2007.
15
35. Todar, K.: Growth of bacterial populations. http://textbookofbacteriology.
net/growth.html(2002) U Wis. (Madison) Dep. of Bacteriology.
36. Gingerich, P.: Quantification and comparison of evolutionary rates. American
Journal of Science 293A (1993) 453 478
37. Kraus, J.: Selbstreproduktion bei Programmen. Master s thesis, Universität Dort-
mund (Germany) (February 1980)
38. Peikari, C.: Analyzing the crossover virus: The first pc to windows handheld cross-
infector.http://www.informit.com/articles/printerfriendly.aspx?p=458169
(March 2006) accessed Oct. 17th, 2007.
39. Pastor-Satorras, R., Vespignani, A.: Epidemic spreading in scale-free networks.
Phys. Rev. Lett. 86(14) (Apr 2001) 3200 3203
40. Inc, C.: Malware outbreak trend report: Bagle-worm. Technical report (March
2007) accessed Oct. 17th, 2007.
41. Inc, C.: Server-side polymorphic viruses surge past av defenses. Technical report
(May 2007) accessed Oct. 17th, 2007.
42. Schechtman, G.M.: Manipulating the ooda loop: The overlooked role of information
resource management in information warfare. Master s thesis, Air Force Institute
of Technology (1996)
43. Ullman, D.G.: OO-OO-OO! the sound of a broken OODA loop. Journal of
Defense Software Engineering 20(4) (April 2007) 22 25
44. Kullback, S., Leibler, R.A.: On information and sufficiency. The Annals of Math-
ematical Statistics 22(1) (March 1951) 79 86
45. Hoepers, C., Steding-Jessen, K., Montes, A.: Honeynets Applied to the CSIRT
Scenario. In: Proceedings of the 15th Annual Computer Security Incident Handling
Conference, Ottawa, Canada (June 2003)
46. Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.C.: The Nepenthes
Platform: An Efficient Approach to Collect Malware. [13] 165 184
47. Crandall, J.R., Su, Z., Wu, S.F., Chong, F.T.: On deriving unknown vulnerabilities
from zero-day polymorphic and metamorphic worm exploits. In: CCS 05: Proceed-
ings of the 12th ACM conference on Computer and communications security, New
York, NY, ACM Press (2005) 235 248
48. Eagle, C.: Ripple in the gene pool. In: Defcon 14, Las Vegas (NV) (July 2006)
49. Shacham, H., Page, M., Pfaff, B., Goh, E.J., Modadugu, N., Boneh, D.: On the
effectiveness of address-space randomization. In: CCS 04: Proceedings of the 11th
ACM conference on Computer and communications security, New York, NY, ACM
Press (2004) 298 307
50. Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A content anomaly detector resis-
tant to mimicry attack. [13] 226 248
51. Bilar, D.: On callgraphs and generative mechanisms. Journal in Computer Virology
3(4) (November 2007)
52. George Cybenko, Vincent H. Berk, V.C.R.S.G., Jiang, G.: An overview of process
query systems. In: Proceedings of the SPIE: Sensors, and Command, Control,
Communications, and Intelligence (C3I) Technologies for Homeland Security and
Homeland Defense. Volume 5403. (2004)
53. Roblee, C., Cybenko, G.: Implementing large-scale autonomic server monitoring
using process query systems. In: ICAC 05: Proceedings of the Second International
Conference on Automatic Computing, Washington, DC, IEEE Computer Society
(2005) 123 133
54. Cybenko, G.: The mathematics and algorithmics of process detection. Institute
for Pure and Applied Mathematics (UCLA) (7 2005)
16
55. Goldin, D., Wegner, P.: The church-turing thesis: Breaking the myth. Lecture
Notes in Computer Science: New Computational Paradigms (2005) 152 168
56. Rado, T.: On non-computable functions. Bell Systems Technical Journal 41(3)
(May 1962) 877 884
57. Goldin, D.Q., Smolka, S.A., Wegner, P.: Interactive Computation: The New
Paradigm. Springer (September 2006)
58. Binmore, K.: Playing for real: a text on game theory. Oxford University Press
(2007)
59. Shor, M.: Notes on game theory.http://www.gametheory.net/lectures/(2007)
60. Liston, T.: Labrea.http://www.hackbusters.net(2003)
61. Borders, K., Zhao, X., Prakash, A.: Siren: Catching evasive malware (short paper).
In: SP 06: Proceedings of the 2006 IEEE Symposium on Security and Privacy,
Washington, DC, IEEE Computer Society (2006) 78 85
62. Alpcan, T., Basar, T.: A game theoretic approach to decision and analysis in
network intrusion detection. In: Proceedings of the 42nd IEEE Conference on
Decision and Control, Maui (HI) (December 2003)
63. Liu, Y., Comaniciu, C., Man, H.: A bayesian game approach for intrusion detection
in wireless ad hoc networks. In: GameNets 06: Proceeding from the 2006 workshop
on Game theory for communications and networks, New York, NY, ACM Press
(2006) 4
64. von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart auto-
matically. Commun. ACM 47(2) (February 2004) 56 60
65. NEC: SEAL VoIP anti-spam. http://www.itwire.com.au/content/view/8981/
127/(accessed Feb. 11th,2007)
66. Wasenaar, T., Blaser, M.: Contagion on the internet. Emerging Infectious Diseases
8(3) (March 2002) 335 336
67. Hall, K.J.: Thwarting Network Stealth Worms in Networks Through Biological
Epidemiology. PhD thesis, Virginia Polytechnic Institute and State University
(May 2006)
68. Crandall, J.R., Wassermann, G., de Oliveira, D.A.S., Su, Z., Wu, S.F., Chong, F.T.:
Temporal search: detecting hidden malware timebombs with virtual machines. In:
ASPLOS-XII: Proceedings of the 12th international conference on Architectural
support for programming languages and operating systems, New York, NY, ACM
Press (2006) 25 36
69. Zou, C.C., Gong, W., Towsley, D.: Worm propagation modeling and analysis
under dynamic quarantine defense. In: WORM 03: Proceedings of the 2003 ACM
workshop on Rapid malcode, New York, NY, ACM Press (2003) 51 60 [ Pobierz całość w formacie PDF ]