The Internet as a Complex System, 2002. ,
The Internet as a Large-scale Complex System, Journal of the Royal Statistical Society: Series A (Statistics in Society, vol.170, issue.11, pp.260-260, 2007. ,
D r i v e -By- Downloads, 2008. ,
GENI Research Plan. GDD-06-28, Version 4, 2007. ,
Know Your Enemy: Behind The Scenes Of Malicious Web Servers. The Honeynet Project, 2008. ,
Know Your Enemy: Malicious Web Servers. T h e H o n e ynet Project http, 2008. ,
Capture -A Tool for Behavioural Analysis of Applications and Documents'. In: The Digital Forensic Research Workshop, 2007. ,
HoneyC -The Low-Interaction Client Honeypot, the Proceedings of the 2007 NZCSRCS, 2007. ,
Flawed routers flood university of wisconsin internet time server ,
Characteristics of internet background radiation, Proceedings of the 4th ACM SIGCOMM conference on Internet measurement , IMC '04, pp.27-40, 2004. ,
DOI : 10.1145/1028788.1028794
Internet intrusions: global characteristics and prevalence, Proceedings of the 2003 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp.138-147, 2003. ,
Team Cymru. The Team Cymru Darknet P r o j e c t, cymru.com/Darknet/index.html and Dragon Research Group ,
Complex adaptive systems: a nominal definition, 1996. ,
Managing computer networks security through self-organisation: a complex system perspective. In: Engineering self-organising systems, pp.124-162, 2004. ,
Analysis of active intrusion prevention data for predicting hostile activity in computer networks, Communications of the ACM, vol.50, issue.4, pp.63-68, 2007. ,
DOI : 10.1145/1232743.1232749
A Machine Learning Evaluation of an Artificial Immune System, Evolutionary Computation, vol.1, issue.3, pp.179-212, 2005. ,
DOI : 10.1073/pnas.90.5.1691
Workshop Summary In: HotBots '07, The First Workshop on Hot Topics in Understanding Botnets, 2007. ,
Biologically-inspired Complex Adaptive Systems approaches to Network Intrusion Detection, Information Security Technical Report, vol.12, issue.4, pp.209-217, 2007. ,
DOI : 10.1016/j.istr.2007.09.001
Using collective intelligence to route internet traffic, Advances in Neural Information Processing Systems, 1999. ,
Identification of Malicious Web Pages Through Analysis of Underlying DNS a n d W e b S e r v e r Relationships, 4th IEEE LCN Workshop on Network Security, 2008. ,
Designing Workflows for Grid Enabled Internet Instruments, 2008 Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID), 2008. ,
DOI : 10.1109/CCGRID.2008.112
A Grid-Based Architecture for the Composition and the Execution of Remote Interactive Measurements, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06), 2006. ,
DOI : 10.1109/E-SCIENCE.2006.261055
On the Design and Use of Internet Sinks for Network Abuse Monitoring, 2004. ,
DOI : 10.1007/978-3-540-30143-1_8
The Internet Motion Sensor: A distributed global scoped Internet threat monitoring system, 2004. ,
Wrap Scientific Applications as WSRF Grid Services Using gRAVI, 2009 IEEE International Conference on Web Services, 2009. ,
DOI : 10.1109/ICWS.2009.110
Identification of Malicious Web Pages with Static Heuristics, 2008 Australasian Telecommunication Networks and Applications Conference, 2008. ,
DOI : 10.1109/ATNAC.2008.4783302
C : A V i r t u a l C l i e n t H o n e y p o t, p.pdf, 2010. ,
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009. ,
DOI : 10.1109/SECURWARE.2009.17
Applying AI to Improve the Performance of Client Honeypots, the Passive and Active Measurements Conference, 2009. ,
Inferring Internet denial-of-service activity, ACM Transactions on Computer Systems, vol.24, issue.2, pp.115-139, 2006. ,
DOI : 10.1145/1132026.1132027
Toward understanding distributed blackhole placement, Proceedings of the 2004 ACM workshop on Rapid malcode , WORM '04, pp.54-64, 2004. ,
DOI : 10.1145/1029618.1029627
Observing Internet Worm and Virus Attacks with a Small Network Telescope, Proceedings of the 2nd Workshop on Practical Applications of Stochastic Modelling, pp.113-126, 2005. ,
DOI : 10.1016/j.entcs.2006.03.011
An Empirical Study of Internet Background Radiation Arrival Density and Network Telescope Sampling Strategies, 2007. ,
Internet background radiation arrival density and network telescope sampling strategies, 2007 Australasian Telecommunication Networks and Applications Conference, 2007. ,
DOI : 10.1109/ATNAC.2007.4665254