Cliff Stoll
Proceedings of 12th National Computer Security Conf., Baltimore, October 12, 1989, pp.369-377
October 1989
By comparing worms that propagate over the networks, we can learn about the threats to our computing communities. These worms take advantage, of operating system features as well as holes. They provide an adversary with both a denial of service weapon, as well as a means of gathering information. They can be studied with techniques developed for medical epidemics.