R. Chertov, S. Fahmy, and N. B. Shroff, Emulation versus Simulation: A Case Study of TCP-Targeted Denial of Service Attacks, In Proceedings of 2nd International IEEE/CreateNet Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom), March 2006.
L. Li, I. Hamadeh, S. Jiwasurat, G. Kesidis, P. Liu, C. Neuman, “Emulating Sequential Scanning Worms on the DETER Testbed”, In Proceedings of 2nd International IEEE/CreateNet Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom), March 2006.
S. Sellke,
N. B. Shroff, and S. Bagchi,
Modeling
and Automated Containment of Worms, In Proceedings of the International
Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, June
28-July 1, 2005.
L. Li, S. Jiwasurat, P. Liu, G. Kesidis,
“Emulation of Single Packet UDP Scanning Worms in Large Enterprises”, In Proc. 19 International Teletraffic Congress (ITC19),
August 2005.
G. Kesidis, I. Hamadeh and
N. Weaver, S. Staniford
and V. Paxson, Very fast
containment of scanning worms, in Proc. USENIX Security,
J. Just, G. Kesidis, K. Levitt, J. Rowe, F. Wu, P. Porras, “Lack of science
for testing the effectiveness of large-scale cyber defenses”, in Proc. NSPW,
N. Weaver, I. Hamadeh, G. Kesidis
and V. Paxson, “Preliminary results using
scale-down to explore worm dynamics”, in Proc. ACM WORM,
P. Porras, L. Biesemeister,
K. Levitt, J. Rowe, K. Skinner, A. Ting, “A
hybrid quarantine defense”, in Proc. ACM WORM,
S.T. Teoh, K. Zhang, S.-M. Tseng, K.-L.
Ma and S. F. Wu, “Combining visual and automated data
mining for near-real-time anomaly detection and analysis in BGP”, in Proc. ACM VizSEC/CMSEC-04,