References
- 전용희, '인터넷 웜의 탐지 및 대응기술', 한국통신학회지 제22권 제8호, pp. 1088-1103, 2005년 8월
- 신승원, 오진태, 김기영, 장종수, '인터넷 웜 공격탐지 방법 동향', 전자통신동향분석, 제 20권 제1호, pp.9-16, 2005년 2월
- 한국정보보호진흥원, IPv6 보안 기술 해설서, 2005년 10월
- Min Cai et al., 'Collaborative Internet Worm Containment', IEEE Security and Privacy, pp.24-33, May/June 2005
- Sean Convey & Darrin Miller, IPv6 and IPv4 Threat Comparison and Best Practice Evaluation(v1.0)
- J. O. Kephart and S. R. White, 'Directed-graph Epidemiological Models of Computer Viruses', Proc. of the IEEE Symposium on Security and Privacy, pp343-359, 1991
- David Moore et al., 'Inside the Slammer Worm', IEEE Security and Privacy, pp33-39, 2003
- Jose Nazario, Defense and Detection Strategies against Internet Worms, Artech House, 2004
- S. Staniford, V. Paxon and N. Weaver, 'How to Own the Internet in Your Spare Time', 11th Usenix Security Symposium, San Francisco, August 2002
- Arrigo Triulzi, 'Intrusion Detection Systems and IPv6', SPI2003
- N. Weaver, S. Staniford, and V. Paxson, 'Very Fast Containment of Scanning Worms', Proc. of 13th USENIX Security Symposium, pp.29-44, August 2004, California
- Jing Yang, 'Fast Worm Propagation in IPv6 Networks', Malware Seminar Spring, November 2004