Computer worm (English Wikipedia)

Analysis of information sources in references of the Wikipedia article "Computer worm" in English language version.

refsWebsite
Global rank English rank
2nd place
2nd place
5th place
5th place
11th place
8th place
18th place
17th place
4th place
4th place
1st place
1st place
69th place
59th place
low place
low place
8th place
10th place
3rd place
3rd place
12th place
11th place
6th place
6th place
6,184th place
4,465th place
214th place
176th place
low place
low place
low place
low place
low place
low place
low place
low place
731st place
638th place
8,991st place
6,535th place
907th place
580th place
193rd place
152nd place
4,803rd place
3,931st place
low place
low place
9,751st place
7,165th place
low place
low place
153rd place
151st place
383rd place
320th place
low place
low place
low place
low place
699th place
479th place

archive.org (Global: 6th place; English: 6th place)

arxiv.org (Global: 69th place; English: 59th place)

avast.com (Global: low place; English: low place)

bbc.co.uk (Global: 8th place; English: 10th place)

bbc.co.uk

  • Barwise, Mike. "What is an internet worm?". BBC. Archived from the original on 2015-03-24. Retrieved 9 September 2010.

news.bbc.co.uk

books.google.com (Global: 3rd place; English: 3rd place)

  • IEEE Annals of the History of Computing. Vol. 27–28. IEEE Computer Society. 2005. p. 74. [...]from one machine to another led to experimentation with the Creeper program, which became the world's first computer virus: a computation that used the network to recreate itself on another node, and spread from node to node. The source code of creeper remains unknown.

cert.org (Global: low place; English: low place)

cloudflare.com (Global: 8,991st place; English: 6,535th place)

doi.org (Global: 2nd place; English: 2nd place)

f-secure.com (Global: low place; English: low place)

giac.org (Global: low place; English: low place)

github.com (Global: 383rd place; English: 320th place)

harvard.edu (Global: 18th place; English: 17th place)

ui.adsabs.harvard.edu

ietf.org (Global: 214th place; English: 176th place)

datatracker.ietf.org

jhu.edu (Global: 699th place; English: 479th place)

muse.jhu.edu

microsoft.com (Global: 153rd place; English: 151st place)

support.microsoft.com

newswise.com (Global: 9,751st place; English: 7,165th place)

nih.gov (Global: 4th place; English: 4th place)

pubmed.ncbi.nlm.nih.gov

ncbi.nlm.nih.gov

nwsource.com (Global: 907th place; English: 580th place)

seattletimes.nwsource.com

paulgraham.com (Global: low place; English: low place)

rfc-editor.org (Global: 6,184th place; English: 4,465th place)

sagepub.com (Global: 731st place; English: 638th place)

journals.sagepub.com

securitydigest.org (Global: low place; English: low place)

semanticscholar.org (Global: 11th place; English: 8th place)

api.semanticscholar.org

theguardian.com (Global: 12th place; English: 11th place)

ubuntu.com (Global: 4,803rd place; English: 3,931st place)

veracode.com (Global: low place; English: low place)

vnunet.com (Global: low place; English: low place)

vx-underground.org (Global: low place; English: low place)

web.archive.org (Global: 1st place; English: 1st place)

  • Barwise, Mike. "What is an internet worm?". BBC. Archived from the original on 2015-03-24. Retrieved 9 September 2010.
  • "Phage mailing list". securitydigest.org. Archived from the original on 2011-07-26. Retrieved 2014-09-17.
  • Ray, Tiernan (February 18, 2004). "Business & Technology: E-mail viruses blamed as spam rises sharply". The Seattle Times. Archived from the original on August 26, 2012. Retrieved May 18, 2007.
  • "Threat Description Email-Worm". Archived from the original on 2018-01-16. Retrieved 2018-12-25.
  • "vnunet.com 'Anti-worms' fight off Code Red threat". Sep 14, 2001. Archived from the original on 2001-09-14.

wired.com (Global: 193rd place; English: 152nd place)

worldcat.org (Global: 5th place; English: 5th place)

search.worldcat.org