Z. Chen, L. Gao, and K. Kwiat. Modeling the Spread of Active Worms. In IEEE INFOCOM 2003, 2003.
B. Greene and D. McPherson. Sink Holes: A Swiss Army Knife ISP Security Tool. http://www.arbornetworks.com/downloads/research36/ Sinkhole Tutorial June03.pdf.
L. T. Heberleid, G. Dias, B. Mukerjeeand Levitt K, J. Wood, and D. Wolber. A Network Security Monitor. In Proceedings of the IEEE Symposium on Research in Privacy, 1990.
A. Myers, E. Ng, and H. Zhang. Rethinking the Service: Scaling Ethernet to a Million Nodes. In ACM SIGCOMM HotNets 2004, San Diego, CA, USA, November 2004.
D. C. Plummer. RFC 826: Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48.bit Ethernet address for transmission on Ethernet hardware. http://www.ietf.org, November 1982.
M. Roesch. Snort: Lightweight Intrusion Detection for Networks. In Proceedings of the 13th Conference on System Administration, November 1999.
S. Sharma, K. Gopalan, S. Nanda, and T. Chiueh. Viking: A Multi-Spanningtree Ethernet Architecture for Metropolitan Area and Cluster networks. In IEEE INFOCOM 2004, Hong Kong, China, March 2004.
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A Taxonomy of Computer Worms. In In the First ACM Workshop on Rapid Malcode (WORM), Washington DC, USA, October 2003.
M. Zec, M. Mikuc, and M. Zagar. Estimating the Impact of Interrupts Coalescing Delays on Steady State TCP Throughput. In Proceedings of the 10th SoftCOM 2002, 2002.