The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Code-Red (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2001-2004 (18) 2005-2007 (17) 2008-2022 (10)
Publication types (Num. hits)
article(13) inproceedings(32)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 47 occurrences of 37 keywords

Results
Found 45 publication records. Showing 45 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
116David Moore 0001, Colleen Shannon, Kimberly C. Claffy Code-Red: a case study on the spread and victims of an internet worm. Search on Bibsonomy Internet Measurement Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Code-Red, Code-RedI, CodeRedI, CodeRedII, backscatter, security, worm, virus, epidemiology
55Cliff Changchun Zou, Weibo Gong, Donald F. Towsley Code red worm propagation modeling and analysis. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF internet worm modeling, two-factor worm model, epidemic model
40Erik D. Van der Spek, Pieter Wouters, Herre van Oostendorp Code Red: Triage. Or, COgnition-Based DEsign Rules Enhancing Decisionmaking TRaining in a Game Environment. Search on Bibsonomy VS-GAMES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Code Red Triage, cognition in games, Serious games, instructional design, design guidelines, games-based learning, virtual training
33Attila Ondi, Richard Ford Modeling malcode with Hephaestus: beyond simple spread. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hephaestus, code-red, virus-spread simulation
33Carolyn P. Meinel Cybercrime Treaty Could Chill Research. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cybercrime Treaty, Code Red, SQL Slammer worm, freedom of speech, worms, viruses
33Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray Simulating realistic network worm traffic for worm warning system design and testing. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF code red, network modeling and simulation, slammer, worm detection systems, network security, worms
22Adam Tornhill, Markus Borg Code Red: The Business Impact of Code Quality - A Quantitative Study of 39 Proprietary Production Codebases. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Adam Tornhill, Markus Borg Code red: the business impact of code quality - a quantitative study of 39 proprietary production codebases. Search on Bibsonomy TechDebt@ICSE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
19Cliff Changchun Zou, Lixin Gao 0001, Weibo Gong, Donald F. Towsley Monitoring and early warning for internet worms. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF monitoring, early detection, worm propagation
19Michael Liljenstam, Yougu Yuan, Brian J. Premore, David M. Nicol A Mixed Abstraction Level Simulation Model of Large-Scale Internet Worm Infestations. Search on Bibsonomy MASCOTS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Frieda McAlear, Ian Her Many Horses, Marie Casao, Rebecca Luebker Code Red: Culturally Revitalizing Computing Courses in Native American-Serving Schools. Search on Bibsonomy SIGCSE (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
17Jeritt G. Thayer, Jeffrey M. Miller, Daria F. Ferro, Robert W. Grundmeier, Joseph J. Zorc Code Red! A Pediatric Emergency Department is sort of on FHIR: The Practical Development of an EHR Embedded Interactive Data Visualization. Search on Bibsonomy AMIA The full citation details ... 2018 DBLP  BibTeX  RDF
17Anna Kolesnichenko, Boudewijn R. Haverkort, Anne Remke, Pieter-Tjerk de Boer Fitting a code-red virus spread model: An account of putting theory into practice. Search on Bibsonomy DRCN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Brian Quinn, William Cartwright Spatio-Temporal Analysis of GPS Tracks of CODE RED: MOBILE an Experimental Mobile Scenario and Location Based Training Exercise. Search on Bibsonomy GSR The full citation details ... 2012 DBLP  BibTeX  RDF
17Erik D. Van der Spek COgnition-based DEsign Rules Enhancing Decisionmaking TRaining In A Game Environment (Code Red Triage): doctoral consortium paper. Search on Bibsonomy ECCE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17John W. Lamp The Code Red Epidemic: a Case Study. Search on Bibsonomy J. Res. Pract. Inf. Technol. The full citation details ... 2001 DBLP  BibTeX  RDF
17Hal Berghel The Code Red Worm. Search on Bibsonomy Commun. ACM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Bill Hancock U.S. DoD Puts Up Blocks to Code Red. Search on Bibsonomy Comput. Secur. The full citation details ... 2001 DBLP  BibTeX  RDF
11Xin Xu, Weihua Song, Vir V. Phoha Early detection and propagation mitigation of worm programs. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Lynn Choi, Yong Shin Enforcement of Architectural Safety Guards to Deter Malicious Code Attacks through Buffer Overflow Vulnerabilities. Search on Bibsonomy ARCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson On the adaptive real-time detection of fast-propagating network worms. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi Modeling and Automated Containment of Worms. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment)
9Ram Dantu, João W. Cangussu, Sudeep Patwardhan Fast Worm Containment Using Feedback Control. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF general, network-level security and protection, Computer systems organization, computer systems organization, process control systems, special-purpose and application-based systems, communication/networking and information technology
9Cliff Changchun Zou, Donald F. Towsley, Weibo Gong Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-mail worm, worm modeling, simulation, Network security, epidemic model
9Zesheng Chen, Chao Chen 0001, Chuanyi Ji Understanding Localized-Scanning Worms. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Fabio Ricciato Unwanted traffic in 3G networks. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unwanted traffic, cellular networks, 3G
9Jisheng Wang, David J. Miller 0001, George Kesidis Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9David M. Nicol The impact of stochastic variance on worm propagation and detection. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF modeling, detection, worms, variance
9Jose Nazario Where the worms aren't. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF securty, worms, vulnerabilities, botnets, exploits
9Fabio Ricciato, Philipp Svoboda, Eduard Hasenleithner, Wolfgang Fleischer On the Impact of Unwanted Traffic onto a 3G Network. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Cliff Changchun Zou, Weibo Gong, Donald F. Towsley, Lixin Gao 0001 The monitoring and early detection of internet worms. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network monitoring, internet worm, computer network security, early detection
9Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi Modeling and Automated Containment of Worms. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Zesheng Chen, Chuanyi Ji A self-learning worm using importance scanning. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF importance scanning, self-learning worm, modeling, worm propagation
9Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Masato Uchida Modeling Viral Spread by Random Scanning and Its Relationship with the Epidemiological Model. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Sanjeev Kumar Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ARP attack, Distributed Denial of Service Attacks, Computer Network Security
9Ram Dantu, João W. Cangussu An Architecture for Network Security Using Feedback Control. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Thomas M. Chen, Jean-Marc Robert 0001 Worm Epidemics in High-Speed Networks. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9John Zachary, John C. McEachen, Daniel W. Ettlich Conversation Exchange Dynamics for Real-Time Network Monitoring and Anomaly Detection. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Network assurance, real-time network monitoring, visualization, denial of service, network anomaly detection
9Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning. Search on Bibsonomy IDEAL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Changyeol Choi, Sungsoo Kim, We-Duke Cho Survivality Modeling for Quantitative Security Assessment in Ubiquitous Computing Systems. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Ram Dantu, João W. Cangussu, Arun Yelimeli Dynamic Control of Worm Propagation. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Shou-Chuan Lai, Wen-Chu Kuo, Mu-Cheng Hsie Defending against Internet Worm-like Infestations. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Paul Mullins 0001, Jim Wolfe, Michael Fry 0003, Erik L. Wynters, William C. Calhoun, Robert Montante, William Oblitey Panel on integrating security concepts into existing computer courses. Search on Bibsonomy SIGCSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
9Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang 0001 Observation and analysis of BGP behavior under stress. Search on Bibsonomy Internet Measurement Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #45 of 45 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license