Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,954,299 papers from all fields of science
Search
Sign In
Create Free Account
Code Red (computer worm)
Known as:
Hacked By Chinese
, Hacked By Chinese!
, Code Red
Expand
Code Red was a computer worm observed on the Internet on July 15, 2001. It attacked computers running Microsoft's IIS web server. The Code Red worm…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
11 relations
Anti-worm
Buffer overflow
Computer virus
DShield
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2009
Review
2009
Climate Code Red: the Case for Emergency Action [Book Review]
C. Keys
2009
Corpus ID: 163230164
Review(s) of: Climate Code Red: the Case for Emergency Action, by David Spratt and Philip Sutton, ISBN (13): 9781921372209, RRP…
Expand
2008
2008
On the efficiency of using space-filling curves in network traffic representation
T. Samak
,
S. Ghanem
,
M. A. Ismail
IEEE INFOCOM Workshops
2008
Corpus ID: 9744034
Network monitors produce a huge amount of traffic data continuously. This data needs to be stored and communicated for analysis…
Expand
2008
2008
Climate Code Red: The Case for Emergency Action
David Spratt
,
P. Sutton
2008
Corpus ID: 155362750
Review
2005
Review
2005
A 10 Gb/s Firewall System for Network Security in Photonic Era
M. Katayama
,
Hidenori Kai
,
+4 authors
N. Yamanaka
IEICE transactions on communications
2005
Corpus ID: 14700167
Although the Internet is playing an increasingly significant role in global communication, it remains vulnerable to malicious…
Expand
2005
2005
An Improved Worm Mitigation Model for Evaluating the Spread of Aggressive Network Worms
Cyril Onwubiko
,
A. Lenaghan
,
L. Hebbes
EUROCON Conference
2005
Corpus ID: 13887083
An enhancement to existing epidemiological worm models is proposed which is used to simulate the spread of aggressive worms…
Expand
2002
2002
Chapter 9 Security Issues Resulting from Interoperability
J. Hamilton
2002
Corpus ID: 14242615
Once coalition networks are established, the vulnerability of information systems may increase. Internal propagation of a worm…
Expand
2002
2002
Current approaches to detecting intrusions
L. Gonzalez
2002
Corpus ID: 1436970
Before the flourishing of the Internet, computers were limited to the walls of the organization where computers were linked to…
Expand
2001
2001
Heterogeneous Sensor Correlation: A Case Study of Live Traffic Analysis
D. Andersson
,
Martin W. Fong
,
A. Valdes
2001
Corpus ID: 14159625
As enterprises deploy multiple intrusion detection sensors at key points in their networks, the issue of correlating messages…
Expand
2001
2001
Global Routing Instabilities Triggered by Code Red II and Nimda Worm Attacks
J. Cowie
,
A. Ogielski
,
Brian J. Premore
,
Yougu Yuan
2001
Corpus ID: 41204854
We analyze the large, long-lasting, widespread instabilities of the global BGP routing system observed during the Code Red II and…
Expand
1984
1984
Categorical color coding by pigeons
T. Zentall
,
C. A. Edwards
1984
Corpus ID: 53368740
Pigeons were trained on two independent tasks. One involved red and yellow hues, the other involved blue and green hues. For half…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE