Cliff Zou
Cited by
Cited by
Code red worm propagation modeling and analysis
CC Zou, W Gong, D Towsley
Proceedings of the 9th ACM conference on Computer and communications …, 2002
Modeling Botnet Propagation Using Time Zones.
D Dagon, CC Zou, W Lee
NDSS 6, 2-13, 2006
An advanced hybrid peer-to-peer botnet
P Wang, S Sparks, CC Zou
IEEE Transactions on Dependable and Secure Computing 7 (2), 113-127, 2008
Monitoring and early warning for internet worms
CC Zou, L Gao, W Gong, D Towsley
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Worm propagation modeling and analysis under dynamic quarantine defense
CC Zou, W Gong, D Towsley
Proceedings of the 2003 ACM workshop on Rapid Malcode, 51-60, 2003
The monitoring and early detection of internet worms
CC Zou, W Gong, D Towsley, L Gao
IEEE/ACM Transactions on networking 13 (5), 961-974, 2005
On the performance of Internet worm scanning strategies
CC Zou, D Towsley, W Gong
Performance evaluation 63 (7), 700-723, 2006
Modeling and simulation study of the propagation and defense of internet e-mail worms
CC Zou, D Towsley, W Gong
IEEE Transactions on dependable and secure computing 4 (2), 105-118, 2007
SMM rootkits: a new breed of OS independent malware
S Embleton, S Sparks, C Zou
Proceedings of the 4th international conference on Security and privacy in …, 2008
Optimal roadside units placement in urban areas for vehicular networks
B Aslam, F Amjad, CC Zou
2012 IEEE symposium on computers and communications (ISCC), 000423-000429, 2012
Honeypot-aware advanced botnet construction and maintenance
CC Zou, R Cunningham
International Conference on Dependable Systems and Networks (DSN'06), 199-208, 2006
Routing worm: A fast, selective attack worm based on ip address information
CC Zou, D Towsley, W Gong, S Cai
Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 199-206, 2005
Email worm modeling and defense
CC Zou, D Towsley, W Gong
Proceedings. 13th International Conference on Computer Communications and …, 2004
Defense against sybil attack in vehicular ad hoc network based on roadside unit support
S Park, B Aslam, D Turgut, CC Zou
MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009
Honeypot detection in advanced botnet attacks
P Wang, L Wu, R Cunningham, CC Zou
International Journal of Information and Computer Security 4 (1), 30-51, 2010
Automated vulnerability analysis: Leveraging control flow for evolutionary input crafting
S Sparks, S Embleton, R Cunningham, C Zou
Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007 …, 2007
A systematic study on peer-to-peer botnets
P Wang, L Wu, B Aslam, CC Zou
2009 Proceedings of 18th International Conference on Computer Communications …, 2009
Email virus propagation modeling and analysis
CC Zou, D Towsley, W Gong
Department of Electrical and Computer Engineering, Univ. Massachusetts …, 2003
Modeling and analysis on the propagation dynamics of modern email malware
S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, CC Zou
IEEE transactions on dependable and secure computing 11 (4), 361-374, 2013
Improving software security via runtime instruction-level taint checking
J Kong, CC Zou, H Zhou
Proceedings of the 1st workshop on Architectural and system support for …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20