Code red worm propagation modeling and analysis CC Zou, W Gong, D Towsley Proceedings of the 9th ACM conference on Computer and communications …, 2002 | 1251 | 2002 |
Modeling Botnet Propagation Using Time Zones. D Dagon, CC Zou, W Lee NDSS 6, 2-13, 2006 | 575 | 2006 |
An advanced hybrid peer-to-peer botnet P Wang, S Sparks, CC Zou IEEE Transactions on Dependable and Secure Computing 7 (2), 113-127, 2008 | 565 | 2008 |
Monitoring and early warning for internet worms CC Zou, L Gao, W Gong, D Towsley Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 548 | 2003 |
Worm propagation modeling and analysis under dynamic quarantine defense CC Zou, W Gong, D Towsley Proceedings of the 2003 ACM workshop on Rapid Malcode, 51-60, 2003 | 426 | 2003 |
The monitoring and early detection of internet worms CC Zou, W Gong, D Towsley, L Gao IEEE/ACM Transactions on networking 13 (5), 961-974, 2005 | 401 | 2005 |
On the performance of Internet worm scanning strategies CC Zou, D Towsley, W Gong Performance evaluation 63 (7), 700-723, 2006 | 365 | 2006 |
Modeling and simulation study of the propagation and defense of internet e-mail worms CC Zou, D Towsley, W Gong IEEE Transactions on dependable and secure computing 4 (2), 105-118, 2007 | 279 | 2007 |
SMM rootkits: a new breed of OS independent malware S Embleton, S Sparks, C Zou Proceedings of the 4th international conference on Security and privacy in …, 2008 | 212 | 2008 |
Optimal roadside units placement in urban areas for vehicular networks B Aslam, F Amjad, CC Zou 2012 IEEE symposium on computers and communications (ISCC), 000423-000429, 2012 | 207 | 2012 |
Honeypot-aware advanced botnet construction and maintenance CC Zou, R Cunningham International Conference on Dependable Systems and Networks (DSN'06), 199-208, 2006 | 205 | 2006 |
Routing worm: A fast, selective attack worm based on ip address information CC Zou, D Towsley, W Gong, S Cai Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 199-206, 2005 | 192 | 2005 |
Email worm modeling and defense CC Zou, D Towsley, W Gong Proceedings. 13th International Conference on Computer Communications and …, 2004 | 190 | 2004 |
Defense against sybil attack in vehicular ad hoc network based on roadside unit support S Park, B Aslam, D Turgut, CC Zou MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009 | 179 | 2009 |
Honeypot detection in advanced botnet attacks P Wang, L Wu, R Cunningham, CC Zou International Journal of Information and Computer Security 4 (1), 30-51, 2010 | 159 | 2010 |
Automated vulnerability analysis: Leveraging control flow for evolutionary input crafting S Sparks, S Embleton, R Cunningham, C Zou Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007 | 152 | 2007 |
A systematic study on peer-to-peer botnets P Wang, L Wu, B Aslam, CC Zou 2009 Proceedings of 18th International Conference on Computer Communications …, 2009 | 146 | 2009 |
Email virus propagation modeling and analysis CC Zou, D Towsley, W Gong Department of Electrical and Computer Engineering, Univ. Massachusetts …, 2003 | 140 | 2003 |
Modeling and analysis on the propagation dynamics of modern email malware S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, CC Zou IEEE transactions on dependable and secure computing 11 (4), 361-374, 2013 | 78 | 2013 |
Peer-to-peer botnets P Wang, B Aslam, CC Zou Handbook of Information and Communication Security, 335-350, 2010 | 74 | 2010 |