Code red worm propagation modeling and analysis release_ju5sjmknynardbhnkantya3l7a

by Cliff Changchun Zou, Weibo Gong, Don Towsley

Published in Conference on Computer and Communications Security by ACM Press.

2002   p138-147

Archived Files and Locations

application/pdf   177.6 kB
file_yyetb2uff5hqroe77gi3vnlv3u
www.megasecurity.org (web)
www.eecs.ucf.edu (web)
www.itsec.gov.cn (web)
web.archive.org (webarchive)
www.cs.ucf.edu (web)
+ 37 more URLs
application/pdf   130.7 kB
file_bivaxirkgfelnfpskkegag5lfe
tennis.ecs.umass.edu (web)
web.archive.org (webarchive)
application/pdf   130.8 kB
file_u7sfn5if3zb2pnth22q5jur4aa
www-unix.ecs.umass.edu (web)
web.archive.org (webarchive)
application/pdf   130.8 kB
file_rmnba2tf5jcllfvxdq7mcxotiu
web.archive.org (webarchive)
www.cs.unc.edu (web)
application/pdf   197.2 kB
file_pafv5qrhkffrppo6cl2m4wcesy
www1.cs.columbia.edu (web)
web.archive.org (webarchive)
web.archive.org (webarchive)
dpnm.postech.ac.kr:80 (web)
web.archive.org (webarchive)
Read Archived PDF
Preserved and Accessible
Type  paper-conference
Stage   published
Year   2002
Work Entity
access all versions, variants, and formats of this works (eg, pre-prints)
Catalog Record
Revision: 5c531325-2ce8-4c57-9e7f-651f63e0e9a5
API URL: JSON