Code red worm propagation modeling and analysis CC Zou, W Gong, D Towsley Proceedings of the 9th ACM conference on Computer and communications …, 2002 | 1247 | 2002 |
Modeling Botnet Propagation Using Time Zones. D Dagon, CC Zou, W Lee NDSS 6, 2-13, 2006 | 572 | 2006 |
An advanced hybrid peer-to-peer botnet P Wang, S Sparks, CC Zou IEEE Transactions on Dependable and Secure Computing 7 (2), 113-127, 2008 | 563 | 2008 |
Monitoring and early warning for internet worms CC Zou, L Gao, W Gong, D Towsley Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 550 | 2003 |
Worm propagation modeling and analysis under dynamic quarantine defense CC Zou, W Gong, D Towsley Proceedings of the 2003 ACM workshop on Rapid Malcode, 51-60, 2003 | 425 | 2003 |
The monitoring and early detection of internet worms CC Zou, W Gong, D Towsley, L Gao IEEE/ACM Transactions on networking 13 (5), 961-974, 2005 | 400 | 2005 |
On the performance of Internet worm scanning strategies CC Zou, D Towsley, W Gong Performance evaluation 63 (7), 700-723, 2006 | 365 | 2006 |
Modeling and simulation study of the propagation and defense of internet e-mail worms CC Zou, D Towsley, W Gong IEEE Transactions on dependable and secure computing 4 (2), 105-118, 2007 | 274 | 2007 |
SMM rootkits: a new breed of OS independent malware S Embleton, S Sparks, C Zou Proceedings of the 4th international conference on Security and privacy in …, 2008 | 210 | 2008 |
Honeypot-aware advanced botnet construction and maintenance CC Zou, R Cunningham International Conference on Dependable Systems and Networks (DSN'06), 199-208, 2006 | 205 | 2006 |
Optimal roadside units placement in urban areas for vehicular networks B Aslam, F Amjad, CC Zou 2012 IEEE symposium on computers and communications (ISCC), 000423-000429, 2012 | 204 | 2012 |
Routing worm: A fast, selective attack worm based on ip address information CC Zou, D Towsley, W Gong, S Cai Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 199-206, 2005 | 192 | 2005 |
Email worm modeling and defense CC Zou, D Towsley, W Gong Proceedings. 13th International Conference on Computer Communications and …, 2004 | 188 | 2004 |
Defense against sybil attack in vehicular ad hoc network based on roadside unit support S Park, B Aslam, D Turgut, CC Zou MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009 | 175 | 2009 |
Honeypot detection in advanced botnet attacks P Wang, L Wu, R Cunningham, CC Zou International Journal of Information and Computer Security 4 (1), 30-51, 2010 | 161 | 2010 |
Automated vulnerability analysis: Leveraging control flow for evolutionary input crafting S Sparks, S Embleton, R Cunningham, C Zou Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 151 | 2007 |
A systematic study on peer-to-peer botnets P Wang, L Wu, B Aslam, CC Zou 2009 Proceedings of 18th International Conference on Computer Communications …, 2009 | 141 | 2009 |
Email virus propagation modeling and analysis CC Zou, D Towsley, W Gong Department of Electrical and Computer Engineering, Univ. Massachusetts …, 2003 | 140 | 2003 |
Modeling and analysis on the propagation dynamics of modern email malware S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, CC Zou IEEE transactions on dependable and secure computing 11 (4), 361-374, 2013 | 79 | 2013 |
Improving software security via runtime instruction-level taint checking J Kong, CC Zou, H Zhou Proceedings of the 1st workshop on Architectural and system support for …, 2006 | 73 | 2006 |