|| Yong Tang and Shigang Chen, “Defending Against Internet Worms: A Signature-Based Approach “ IEEE INFOCOM, Miami, FL, March, 2005.|
 Michele Garetto, Weibo Gong, and Don Towsley, “Modeling Malware Spreading Dynamics “ IEEE INFOCOM, San Francisco, CA, USA, April, 2003.
 “On the Effectiveness of Distributed Worm Monitoring “USENIX Security Symposium, 2005
 “Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models “Annual Computer Security Applications Conference (ACSAC 2005)
 Gaurav Kataria,Gaurav Anand, Rudolph Araujo, Ramayya Krishnan,Adrian Perrig "A Distributed Stealthy Coordination Mechanism for Worm Synchronization",IEEE Securecomm & Workshop, 2006.
 Zhenkai Liang, R. Sekar"Fast and automated generation of attack signatures: a basis for building self-protecting servers",Conference on Computer and Communications Security,Proceedings of the 12th ACM conference on Computer and communications security
 Randy Smith, Cristian Estan, Somesh Jha"Backtracking Algorithmic Complexity Attacks Against a NIDS ",Annual Computer Security Applications Conference (ACSAC 2006)
 “2003 CSI/FBI Computer Crime and Security Survey. Security”，http:// www.reddshell.com/docs/csi_fbi_2003.pdf
 “Linux Networking Kernel” http://www.ecsl.cs.sunysb.edu/elibrary/linux/network/LinuxKernel.pdf
 H. Shacham, M. Page, B. Pfaff, Eu-Jin Goh, N. Modadugu, and Dan Boneh . “On the Effectiveness of Address-Space Randomization ” Proceedings of the 11th ACM conference on Computer and communications security, 2004
 T. Bu, A. Chen, S. V. Wiel, and T. Woo “Design And Evaluation of A Fast And Robust Worm Detection Algorithm” INFOCOM 2006. In the Proceedings of 25th IEEE International Conference on Computer Communications.
 D. Moore, C. Shannon, G. M. Voelker, and S. Savage “Internet Quarantine: Requirements for Containing Self-Propagating Code” ,2003
 Fu-Hau Hsu, Fanglu Guo, and Tzi-cker Chiueh, “Scalable Network-based Buffer Overflow Attack Detection” in Proceedings of ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2006), San Jose, California, USA, December, 2006.
 S. Staniford, V. Paxson and N. Weaver “The Top Speed of Flash Worms” In the proceedings of the ACM Workshop on Rapid Malcode (WORM ), Fairfax, VA, Oct. 2004
 J. Xu, P. Ning, C. Kil, Y. Zhai, C. Bookholt, "Automatic diagnosis and response to memory corruption vulnerabilities" ACM Conference on Computer Communications Security (CCS 2005)
 J. Ma, G. M. Voelker, and Stefan Savage “Self-Stopping Worms” In the proceedings of the ACM Workshop on Rapid Malcode (WORM ), Fairfax, VA, Oct. 2005
 Zheng, H., & Duan, H. “Active Technologies to Contain Internet Worm.” Worm blog. Retrieved April 1, 2007, from “wiki.ccert.edu.cn/doc/spark/ActiveTechnologiestoContainInternetWorm.pdf”
 N. Weaver, V. Paxson, S. Staniford, and R. Cunningham “A Taxonomy of Computer Worms”, Proceedings of the 2003 ACM workshop on Rapid Malcode, 2003
 S. Staniford, V. Paxson and N. Weaver “How To Own The Internet In Your Spare Time” In the Proceedings of USENIX Security Symposium, San Francisco, CA, Aug. 2002
 Newsome, J. Karp, B. Song, D. “Polygraph: automatically generating signatures for polymorphic worms”, Security and Privacy, IEEE Symposium , 8-11 May 2005
 Costa,M. Crowcroft, J. Castro,M. Rowstron,A. Zhou,L. Zhang,L. Barham,P. “Vigilante: end-to-end containment of internet worms”, ACM Symposium on Operating Systems Principles, 2005
 O. Kolesnikov and W. Lee. “Advanced polymorphic worms: Evading IDS by blending in with normal traffic”
 Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer and Mattia Monga. “Automated Content-Based Signatures Generator for Zero-day Polymorphic Worms”
 Z. Chen, L. Gao, and K. Kwiat. “Modeling the Spread of Active Worms”. IEEE INFOCOMM, 2003.
 C. Zu, W. Gong, and D. Towsley. “Worm Propagation Modeling and Analysis under Dynamic Quarantine Defense”. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), pages 51–60, 2003.
 Kelly Jackson Higgins, Senior Editor, Dark Reading. “Botnets Battle Over Turf” ,April 2007
 Kelly Jackson Higgins, Senior Editor, Dark Reading. “Black Hat: Botnets Go One-on-One”, Feb 2007.
 C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, “StackGuard: Automatic Adaptive Detection and Prevention of Buffer Overflow Attacks,” USENIX Security Conference, San Antonio, Texas, Jan.1998.
 Ali Rahbar , “An analysis of Microsoft Windows Vista’s ASLR”, Oct 2006.
 C. Zou, W. Gong, and D. Towsley. Code RedWorm Propagation Modeling and Analysis. In Proceedings of ACM Conference on Computer and Communication Security (CCS), pages 138–147, 2002.
 H.W. Hethcote. The Mathematics of Infectious Diseases. In SIAM Reviews, Vol. 42 No. 4, 2000.
 G. Gu, M. Sharif, X. Qin, D. Dagon, W. Lee, and G. Riley. Worm Detection, Early Warning and Response Based on Local Victim Information. In Proceedings of 20th Annual Computer Security Applications Conference, December 2004
 P. Barford and V. Yegneswaran, “An inside look at botnets,” in Special Workshop on Malware Detection, Advances in Information Security, 2006.
 J. Stewart, “Storm worm DDoS attack.” http://www.secureworks.com/research/threats/ view.html?threat=storm-worm, February 2007.
 Sumeet Singh, Cristian Estanm, George Varghese, Stefan Savage, “Automated Worm Fingerprinting”, 6th Symposium on Operating Systems Design and Implementation, 2004
 Hovav Shacham, "The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86)", 14th ACM Conference on Computer and Communications Security (October 2007)
 Z. Liang and R. Sekar, ``Fast and Automated Generation of Attack Signatures: A Basis for Building Self-Protecting Servers,’’ In Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005.
 Bulba and Kil3r, “Bypassing StackGuard and StackShield”. http://www.phrack.org/issues.html?issue=56&id=5
 S. Bhatkar, D. DuVarney, and R. Sekar “Address Obfuscation: An Efficient Approach to Combat a Broad Range of Memory Error Exploits,” Proc. 12th USENIX Sec. Symp, USENIX, Aug. 2003.
 StackShield. http://www.angelfire.com/sk/stackshield
 H.-A. Kim and B. Karp, ``Autograph: Toward Automated, Distributed Worm Signature Detection,’’ In Proceedings of the 13th USENIX Security Symposium, August 2004.
 Zheng H, Duan HX, “Active Defense System to Contain Internet Worm. XCON 2004”, Beijing
 Alexey Smirnov, Tzi-cker Chiueh, “Automatic Patch Generation for Buffer Overflow Attacks“, IAS 2007
 Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto, “ShieldGen Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing“, Security and Privacy, 2007. SP '07. IEEE Symposium on