V. Berk, R. S. Gray, and G. Bakos, Flowscan: Using sensor networks and data fusion for early detection of active worms, SPIE AeroSense, vol.5071, pp.92-104, 2003.

Z. Chen, L. Gao, and K. Kwiat, Modeling the spread of active worms, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003.
DOI : 10.1109/INFCOM.2003.1209211

. Investorwords and . Com, What is forecast? definition and meaning

J. Jung, V. Paxon, A. Berger, and H. Balakrishnan, Fast portscan detection using sequential hypothesis testing, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.211-225, 2004.
DOI : 10.1109/SECPRI.2004.1301325

C. Leckie and R. Kotagiri, A probabilistic approach to detecting network scans, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327), 2002.
DOI : 10.1109/NOMS.2002.1015594

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.132.456

G. Marsaglia, Diehard: a battery of tests of randomness

G. Marsaglia and L. H. Tsay, Matrices and the structure of random number sequences . Linear algebra and its applications 67, pp.147-156, 1985.

J. Nazario, T. Ptacek, and D. Song, Wormability: A description for vulnerabilities, Arbor Networks, 2004.

H. Park, H. Kim, and H. Lee, Is early warning of an imminent worm epidemic possible?, IEEE Network, vol.23, issue.5, pp.14-20, 2009.
DOI : 10.1109/MNET.2009.5274917

H. Park, H. Lee, and H. Kim, Detecting unknown worms using randomness check, IEICE Trans. on Communications E90-B, issue.4, pp.894-903, 2007.
DOI : 10.1007/11919568_77

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.105.319

H. Park, P. Li, D. Gao, H. Lee, and R. H. Deng, Distinguishing between FE and DDoS Using Randomness Check, Information Security Conference(ISC2008), pp.131-145, 2008.
DOI : 10.1007/978-3-540-85886-7_9

S. Sanguanpong and U. Kanlayasiri, Worm damage minimization in enterprise networks, International Journal of Human-Computer Studies, vol.65, issue.1, pp.3-16, 2007.
DOI : 10.1016/j.ijhcs.2006.09.001

S. Staniford, V. Paxson, and N. Weaver, How to own the internet in your spare time, USENIX Security Symposium pp, pp.149-169, 2002.

X. Tong and Z. Wang, A Novel Anomaly Detection Algorithm and Prewarning Technology of Unknown Worms, Communications in Computer and Information Science, vol.30, issue.5, pp.164-171, 2011.
DOI : 10.1360/jos180412

D. Whyte, E. Kranakis, and P. Oorschot, DNS-based detection of scanning worms in an enterprise network, Network and Distributed System Security Symposium (NDSS), 2004.

D. Whyte, P. Oorschot, and E. Kranakis, ARP-based detection of scanning worms within an enterprise network, Annual Computer Security Applications Conference (ACSAC), pp.5-9, 2005.

J. Wu, S. Vangala, L. Gao, and K. Kwiat, An effient architecture and algorithm for detecting worms with various scan techniques, NDSS, 2004.

C. Zou, W. Gong, D. Towsley, and L. Gao, The monitoring and early detection of Internet worms, IEEE/ACM Transactions on Networking, vol.13, issue.5, pp.961-974, 2005.
DOI : 10.1109/TNET.2005.857113