User:Invokerishard/Computer worm/Bibliography

Quality Sources
1.Wehner, Stephanie1 Analyzing worms and network traffic using compression. Journal of Computer Security. 2007, Vol. 15 Issue 3, p303-320. 18p. 6 Diagrams, 1 Chart, 1 Graph.

https://libproxy.albany.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=24417921&site=ehost-live

2.Bronk, Christopher，Tikk-Ringas, ''Eneken The Cyber Attack on Saudi Aramco.Survival (00396338). Apr/May2013, Vol. 55 Issue 2, p81-96. 16p.''

https://libproxy.albany.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=86689165&site=ehost-liveOn the Trail of the Conficker Worm.

3.Lawton, George，On the Trail of the Conficker Worm. Computer (00189162). Jun2009, Vol. 42 Issue 6, p19-22. 4p. 1 Chart

https://libproxy.albany.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=42648582&site=ehost-live