Analyzing and modeling real-world phenomena with complex networks: a survey of applications

LF Costa, ON Oliveira Jr, G Travieso… - Advances in …, 2011 - Taylor & Francis
The success of new scientific areas can be assessed by their potential in contributing to new
theoretical approaches and in applications to real-world problems. Complex networks have …

Method and system for detecting malicious and/or botnet-related domain names

R Perdisci, W Lee - US Patent 10,027,688, 2018 - Google Patents
A method and system of detecting a malicious and/or botnet-related domain name,
comprising: reviewing a domain name used in Domain Name System (DNS) traffic in a …

Method and system for detecting and responding to attacking networks

D Dagon, N Feamster, W Lee, R Edmonds… - US Patent …, 2013 - Google Patents
A system and method for detecting a first network of compromised computers in a second
network of computers, comprising: collecting Domain Name System (DNS) data for the …

[PDF][PDF] Modeling Botnet Propagation Using Time Zones.

D Dagon, CC Zou, W Lee - NDSS, 2006 - priv.gg
Time zones play an important and unexplored role in malware epidemics. To understand
how time and location affect malware spread dynamics, we studied botnets, or large …

The monitoring and early detection of internet worms

CC Zou, W Gong, D Towsley… - IEEE/ACM Transactions …, 2005 - ieeexplore.ieee.org
After many Internet-scale worm incidents in recent years, it is clear that a simple self-
propagating worm can quickly spread across the Internet and cause severe damage to our …

Cascading failures and resilience optimization of hospital infrastructure systems against the COVID-19

H Dui, K Liu, S Wu - Computers & Industrial Engineering, 2023 - Elsevier
The outbreak of the Coronavirus Disease 2019 (COVID-19) has put the resilience of a
country's healthcare infrastructure to the most severe test. The challenge of taking …

Method and system for determining whether domain names are legitimate or malicious

M Antonakakis, R Perdisci, D Dagon, W Lee - US Patent 9,516,058, 2016 - Google Patents
4,843,540 A 6, 1989 Stolfo 4,860,201 A 8, 1989 Stolfo et al. 5,363,473 A 11/1994 Stolfo et al.
5,497.486 A 3, 1996 Stolfo et al. 5,563,783 A 10, 1996 Stolfo et al. 5,668,897 A 9, 1997 …

Systems, methods, and media protecting a digital data processing device from attack

S Sidiroglou, AD Keromytis, SJ Stolfo - US Patent 8,407,785, 2013 - Google Patents
US PATENT DOCUMENTS 7,526,758 B2 4/2009 Hasse et al. 7,639,714 B2 12/2009 Stolfo
et al. 7,818,781 B2 10/2010 Golan et al. 7,975,059 B2 7/2011 Wang et al. 8,074,115 B2 …

Method and system for detecting malicious domain names at an upper DNS hierarchy

M Antonakakis, R Perdisci, W Lee… - US Patent …, 2014 - Google Patents
7,277,961 7,331,060 7,372,809 7,383,577 7,424,619 7,426,576 7,448,084 7,483,947 7.487,
544 7,536,360 7,634,808 7,639,714 7,657,935 7,665,131 7,698.442 7,752,125 7,752,665 …

Spatial-temporal modeling of malware propagation in networks

Z Chen, C Ji - IEEE Transactions on Neural networks, 2005 - ieeexplore.ieee.org
Network security is an important task of network management. One threat to network security
is malware (malicious software) propagation. One type of malware is called topological …