Search Results
- Articles
- Books & Media
- Our Website
- Collection Guides
- Archival Materials
ArticlesSee all articles results »
From journals and magazines
-
Hybrid Epidemics—A Case Study on Computer Worm Conficker
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF615cIFUUA0UIJBSMDBSez1-iFVlRwrUcKrJi0tcLF2N-smUmpHdXPojR_BL-SXMLN-qEaVQFw2yu6slczueGbtb74h5JVjKcEd5Zu-m-LTKleYgmrYXyDnXNjCSXXZa__dN_vzzB9HW4TVuTAatC_FspetLnrZcqGxlesL2a9xYv34Y-Rgmo_F-ttkGw4w9RG9vP2CAbtulSNHPatfLUlvnWeqh-9ZHQ9r9EHU7_kUYYg33JFm7W_uzTvrVV7cFnj-iZ-84ZDG98m9KpI0wvIX75ItlT0gu5WtFsabilD67UMSTq4xL8sYldVgZfHrx8_QiMB_GQgjvDbyzKirOxhnEMQaB4tDTAVcIubioL84fES-jEcn0cSsSieY0g3sKxPUonwhpITjH2hd0UCKQQDemSoOK8Btyh0rhV7Xn1tI4mcpJlM7cD3ueIoyukcMHkipXMZQ3hkIAbEaOHw2pzx1pTcfdAitVZfIilAc61qsEv2WzIODRamJBHWfVLrvELOZtS4JNf4iP8RVaWSRDlt35JfnSbUpkjnzhaIC2QSZwy2Hc-kqW3qpbcMyc7dDnuOaJmVuaWPUSehgChO4ZNohL7UEUmJkiLk555uiSKZHp_8gdDxrCb2uhNIc1CF5lecA_wmptlqS-y1JMGzZGt7DHVhrpUgs5I4LsFY0zKx35e3DL5phvCji6DKVb7SMbQ_AAVod8rjcxI1ma5PoEK-1vVuqb4-AgWpG8sogn_z3zKfkLkSiDGEZFtsnO1eXG_WsrM_RBSOfnWL71YPWj6wuuROeRPExfA5Hn-JZVz9IgXYcf4C-STQdf4dv0_AI2xGOvB_2ugjrjXULM7djhjJw4_gNXFlkBg
Plo S One, Volume 10, Issue 5.
Journal Article : Full Text Online
-
A Large-Scale Empirical Study of Conficker
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFH6oJz04dYJzKhU8iXVtmqYNjIGIQ8WLThFPJUkTHKgTtx38781L0qEg4q3Q3_ny8l6S730P4IimWgqqy7hkBlermIxl5mh_XNVCEkmNK3tdXj-R27tyeL4EJ4tcGK21I5_pUzx0e_n1RM1xqaxng210b8uwXPDE52o1o6716j7tLc9ZbCcZWdjBTBPeu78ajrxYp42_M4pp0998kCuq8nMkJsG9DFvw2HyY41afem6JX2X4Qbpu1Bv_-w8bsB4izujMd5FNWNJvW9BqqjlEwbi3YO2bNGEb0rPoBkni8ciCqKOL1_exExOJkHj4GU1M1H8eYLrgGHkZ_d7zYBsehhf355dxKK8Qq4zkM4uOENZhM0VEaaxh1oRJa--lKrRhRElth0GlEpOUNa1ronHmkzNR8NJQw21YsgOR4EpplucWVUETKW08Z4OCvM6EYaqokw4kTUtXKoiOY-2Ll8pNPhJeITgVglMFcDpwvLjl3Stu_HVxG5t4cWFo3Q50GzirYJPTihMUrqEp7cDh4qw1JtwhEW96Mp8i342jpGBKd39_cBdW7euJp-7swcrsY673fR2JA9cfvwDE1Nx2
Ieee Transactions On Information Forensics And Security, Volume 7, Issue 2, pp. 676 - 690
Journal Article : Full Text Online
-
On the Trail of the Conficker Worm
http://duke.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwED42n_TB6SY4p1JhL4rd-ittAmMgxSHCEEUZPpUkvbLB2ES3_98kTYuDPfjW0msJSa53ufvuO4B-5KPgEVKXxoWOVsXCFaGB_TGZcxGIqDBtr-nzZ_D6RidpA-7rWhhENOAzHOhLk8vP13KrQ2VDouuJadKEZsK8slarzhhE1DJO-lqB48DW4vkeG07TkpdSna93rI9pp7L7Dw6tYZm0YFYNyaCqByWqpIwv7MCtK97G_47-BI6tr-k8lJvjFBq4akOr6uPgWLVuw9EfUsIO3L6sHOUVOsqKLZbOujA3o_lY1wYuNAhjNJyPnZnydc_gY_L4nj65tqGCK0M_3LhIOOVc2S1UpywUVJCY-3GeSIzQYzQRIUWSY8S4ZBpySJERpLlQPl0hfYbhOTicSYkxIWodeeQJoTw45QaQPORFLJPc68JdNcOZtDTjutvFMjPHDY9l01T3vmSZWo4u9Gvhr5JdY79YR09nLWJnsgu9aukyq3k_SjzRpPu-eummfqpURudB-ArXWyUSJ76uignoxf4P9-CwTBrpYMslHGy-t3hVdou4NrvuFyxE1jM
Computer (Long Beach, Calif.), Volume 42, Issue 6, pp. 19 - 22
Journal Article : Full Text Online
Books & MediaSee all books & media results »
Books, music, movies and more
-
The Counterintelligence chronology : spying by and against the United States from the 1700s (...)
https://find.library.duke.edu/catalog/DUKE99119517188208501
Book : View Online
-
Moving target defense II : application of game theory and adversarial modeling
https://find.library.duke.edu/catalog/DUKE99119540677808501
Book : View Online
-
Worm : The First Digital World War.
https://find.library.duke.edu/catalog/DUKE008310489
Book : View Online
Collection Guides
Detailed inventories of archival collections
Some materials and descriptions may include offensive content. More info