|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 869 occurrences of 475 keywords
|
|
|
Results
Found 1425 publication records. Showing 1401 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
189 | Zesheng Chen, Chuanyi Ji |
A self-learning worm using importance scanning. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
importance scanning, self-learning worm, modeling, worm propagation |
179 | David W. Richardson, Steven D. Gribble, Edward D. Lazowska |
The limits of global scanning worm detectors in the presence of background noise. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
scanning worms, worm models, computer security, worm detection, computer worms |
148 | Xuxian Jiang, Dongyan Xu |
Profiling self-propagating worms via behavioral footprinting. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
behavioral footprinting, content signature, worm profiling, worms |
147 | Frank Castaneda, Emre Can Sezer, Jun Xu 0003 |
WORM vs. WORM: preliminary study of an active counter-attack mechanism. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
anti-worm, good worm, worm |
146 | Dan Ellis |
Worm anatomy and model. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
network security, worm, network modeling, turing machine |
140 | Yang Xiang, Qiang Li 0008 |
Online Tracing Scanning Worm with Sliding Window. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Propagation path, Online tracing, Detection window, Worm |
139 | Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver |
The top speed of flash worms. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
flash worm, simulation, modeling, worms |
136 | Jiaqing Luo, Bin Xiao 0001, Guobin Liu 0003, Qingjun Xiao, Shijie Zhou |
Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
134 | Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray |
Simulating realistic network worm traffic for worm warning system design and testing. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
code red, network modeling and simulation, slammer, worm detection systems, network security, worms |
131 | David M. Nicol |
The impact of stochastic variance on worm propagation and detection. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
modeling, detection, worms, variance |
125 | Wei Yu 0002, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao 0001 |
On Detecting Camouflaging Worm. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
122 | Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai |
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
122 | Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jung-Taek Seo, Jongsub Moon |
An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows. |
ICIC (1) |
2007 |
DBLP DOI BibTeX RDF |
taxonomy of worm, worm packet flows, ubiquitous security, temporal behavior |
121 | Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia |
A behavioral approach to worm detection. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
behavioral signatures, descendant relation, network application architecture, network worms, intrusion detection |
119 | Cliff Changchun Zou, Weibo Gong, Donald F. Towsley |
Code red worm propagation modeling and analysis. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
internet worm modeling, two-factor worm model, epidemic model |
119 | Cliff Changchun Zou, Weibo Gong, Donald F. Towsley |
Worm propagation modeling and analysis under dynamic quarantine defense. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
dynamic quarantine, epidemic model, worm propagation |
116 | Xiong Yang, Jing Lu, Yuguang Zhu, Ping Wang |
Simulation and Evaluation of a New Algorithm of Worm Detection and Containment. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
Algorithm, Worm, Worm detection, Worm Containment |
113 | Bin Wang 0017, Piao Ding, Jinfang Sheng |
P2P Anti-worm: Modeling and Analysis of a New Worm Counter-measurement Strategy. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
112 | Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson |
Preliminary results using scale-down to explore worm dynamics. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
scaledown, slammer, simulation, modeling, worms |
112 | Milan Vojnovic, Ayalvadi J. Ganesh |
On the effectiveness of automatic patching. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
minimum broadcast curve, worm, patching, virus, epidemic, software updates, automatic updates |
110 | Stuart E. Schechter, Michael D. Smith 0001 |
Access for sale: a new class of worm. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
security, cryptography, economics, incentives, worm, virus, threat modelling |
106 | Songqing Chen, Xinyuan Wang 0005, Lei Liu 0021, Xinwen Zhang |
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. |
ANCS |
2006 |
DBLP DOI BibTeX RDF |
wormterminator, zero-day worms, virtual machine, worm containment, polymorphic worms |
104 | Kumar Simkhada, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto |
Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures. |
ISM |
2005 |
DBLP DOI BibTeX RDF |
|
104 | Xuxian Jiang, Xingquan Zhu 0001 |
vEye: behavioral footprinting for self-propagating worm detection and profiling. |
Knowl. Inf. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Behavioral footprinting, Network security, Information systems, Sequence alignment, Worm detection |
104 | Songjie Wei, Jelena Mirkovic |
Correcting congestion-based error in network telescope's observations of worm dynamics. |
Internet Measurement Conference |
2008 |
DBLP DOI BibTeX RDF |
network telescope, observation error, worm spread |
97 | Sapon Tanachaiwiwat, Ahmed Helmy |
Modeling and analysis of worm interactions (war of the worms). |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
95 | Sapon Tanachaiwiwat, Ahmed Helmy |
On the performance evaluation and prediction of encounter-based worm interactions based on node characteristics. |
Challenged Networks |
2007 |
DBLP DOI BibTeX RDF |
encounter-based worms, delay-tolerant networks, worm |
95 | A. M. El-Menshawy, Hossam El Deen Mostafa Faheem, T. Al-Arif, Z. Taha |
Agent Based Framework for Worm Detection. |
SCSS (1) |
2007 |
DBLP DOI BibTeX RDF |
Multi Agent-based systems, Worm detection |
95 | David Moore 0001, Colleen Shannon, Kimberly C. Claffy |
Code-Red: a case study on the spread and victims of an internet worm. |
Internet Measurement Workshop |
2002 |
DBLP DOI BibTeX RDF |
Code-Red, Code-RedI, CodeRedI, CodeRedII, backscatter, security, worm, virus, epidemiology |
94 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
Worm evolution tracking via timing analysis. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
methods of attribution, network security, internet worms |
92 | Madihah Mohd Saudi, Emran Mohd Tamil, Andrea J. Cullen, Mike E. Woodward, Mohd Yamani Idna Bin Idris |
Reverse Engineering: EDOWA Worm Analysis and Classification. |
World Congress on Engineering (Selected Papers) |
2008 |
DBLP DOI BibTeX RDF |
worm analysis, worm classification, Classification, payload |
92 | Fengtao Xiao, Huaping Hu, Bo Liu 0014, Xin Chen |
A Novel Worm Detection Model Based on Host Packet Behavior Ranking. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
behavior based worm detection, user habit model, worm detection |
92 | Chunhe Xia, Yunping Shi, Xiaojian Li, Wei Gao |
P2P worm detection based on application identification. |
Frontiers Comput. Sci. China |
2007 |
DBLP DOI BibTeX RDF |
P2P worm, worm detection, application identification |
91 | Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto |
Signature metrics for accurate and automated worm detection. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
network worms, worm signatures, traffic analysis |
88 | Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford |
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
(viruses, worms, Trojan horses), Servers, Security and Protection |
88 | Qi Liu, Jiwu Jing, Yuewu Wang |
An Improved Method of Hybrid Worm Simulation. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
88 | Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan, Honglan Lao |
Worm Traffic Modeling for Network Performance Analysis. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
88 | Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford |
Virtual Playgrounds for Worm Behavior Investigation. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Intrusion Observation and Analysis, Destructive Experiments, Internet Worms |
88 | Cliff Changchun Zou, Weibo Gong, Donald F. Towsley, Lixin Gao 0001 |
The monitoring and early detection of internet worms. |
IEEE/ACM Trans. Netw. |
2005 |
DBLP DOI BibTeX RDF |
network monitoring, internet worm, computer network security, early detection |
88 | Darrell M. Kienzle, Matthew C. Elder |
Recent worms: a survey and trends. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
survey, malicious code |
86 | Xinyu Yang, Yi Shi, Huijun Zhu |
Detection and location algorithm against local-worm. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
detection and location, worm detection, traffic characteristic |
86 | Min Cai, Kai Hwang 0001, Jianping Pan 0001, Christos Papadopoulos |
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
distributed aggregation tree, cardinality counting, Network security, distributed hash table, traffic measurement, Internet worms, signature generation, worm containment |
85 | Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
Modeling and Automated Containment of Worms. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
(viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment) |
85 | Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel |
A preliminary investigation of worm infections in a bluetooth environment. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
Bluetooth, malware, worms |
85 | Kurt Rohloff, Tamer Basar |
The detection of RCS worm epidemics. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
83 | Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Nigel H. Lin, Louis H. Lin |
A Behavior-Based Anti-Worm System. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
Lambent Anti-Worm System (LAWS), Malicious worm, Mobile Agent, Intrusion Detection System (IDS) |
82 | Parbati K. Manna, Shigang Chen, Sanjay Ranka |
Exact Modeling of Propagation for Permutation-Scanning Worms. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
79 | Fengtao Xiao, Huaping Hu, Xin Chen, Bo Liu 0014 |
ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
79 | Yu Yao, Liqiong Wu, Fuxiang Gao, Wei Yang, Ge Yu 0001 |
A WAW Model of P2P-based Anti-worm. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
79 | Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna |
Polymorphic Worm Detection Using Structural Information of Executables. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
79 | Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis |
The effect of DNS delays on worm propagation in an IPv6 Internet. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
79 | David J. Malan, Michael D. Smith 0001 |
Host-based detection of worms through peer-to-peer cooperation. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
Win32, native API, peer-to-peer, P2P, worms, windows, system calls, temporal consistency, system services |
79 | Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham |
A taxonomy of computer worms. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
mobile malicious code, taxonomy, motivation, attackers, computer worms |
77 | Zhengtao Xiang, Yufeng Chen, Yabo Dong, Honglan Lao |
Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
76 | Yang Xiang, Qiang Li 0008, Dong Guo 0002 |
Online Accumulation: Reconstruction of Worm Propagation Path. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
Propagation path, Online tracing, Worm, Containment |
76 | James Aspnes, Navin Rustagi, Jared Saia |
Worm Versus Alert: Who Wins in a Battle for Control of a Large-Scale Network?. |
OPODIS |
2007 |
DBLP DOI BibTeX RDF |
Self-certifying alert, epidemic processes, peer-to-peer, overlay network, worm, expander graphs |
76 | Arno Wagner, Thomas Dübendorfer, Roman Hiestand, Christoph Göldi, Bernhard Plattner |
A Fast Worm Scan Detection Tool for VPN Congestion Avoidance. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
Bro, detection, worm, Scan, gateway, VPN |
76 | Alan Roberts, Antonios Symvonis |
A General Method for Deflection Worm Routing on Meshes Based on Packet Routing Algorithms. |
IEEE Trans. Parallel Distributed Syst. |
1997 |
DBLP DOI BibTeX RDF |
on-line routing algorithm, worm routing, packet routing, permutation routing, Deflection routing, mesh connected computer |
76 | Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting |
A hybrid quarantine defense. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
network modeling and simulation, worm detection systems, network security, worms |
74 | Miad Faezipour, Mehrdad Nourani, Rina Panigrahy |
A hardware platform for efficient worm outbreak detection. |
ACM Trans. Design Autom. Electr. Syst. |
2009 |
DBLP DOI BibTeX RDF |
shared counters, worm outbreak, hashing, false positive, Network Intrusion Detection System, false negative, polymorphic worm |
74 | David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song |
Design space and analysis of worm defense strategies. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
defense strategy analysis, local containment, proactive protection, worm taxonomy, worms, blacklisting, antibody, worm propagation |
73 | Shigang Chen, Yong Tang 0004 |
Slowing Down Internet Worms. |
ICDCS |
2004 |
DBLP DOI BibTeX RDF |
|
70 | Yuewu Wang, Peng Liu 0005, Jiwu Jing, Xiaoqi Jia |
A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. |
Annual Simulation Symposium |
2008 |
DBLP DOI BibTeX RDF |
|
70 | Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino |
Extracting Worm-Infected Hosts Using White List. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
|
70 | Narisa Zhao, Xianfeng Zhang |
The Worm Propagation Model and Control Strategy Based on Distributed Honeynet. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
70 | Maziar M. Nekovee |
Modeling the Spread of Worm Epidemics in Vehicular Ad Hoc Networks. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
70 | Linda Briesemeister, Phillip A. Porras |
Automatically deducing propagation sequences that circumvent a collaborative worm defense. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
70 | Ping Wang, Binxing Fang, Xiao-chun Yun |
Model and Estimation of Worm Propagation Under Network Partition. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
70 | Guofei Gu, Monirul Islam Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley |
Worm Detection, Early Warning and Response Based on Local Victim Information. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
69 | Jose Nazario |
Where the worms aren't. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
securty, worms, vulnerabilities, botnets, exploits |
68 | Dan Wu, Dongyang Long, Changji Wang, Zhanpeng Guan |
Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy. |
ICA3PP |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Jingbo Hao, Jianping Yin |
A Preliminary Study of Coordinated Worm Networks. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
coordinated worm network, peer-to-peer, application, construction |
67 | Yi Yang 0002, Sencun Zhu, Guohong Cao |
Improving sensor network immunity under worm attacks: a software diversity approach. |
MobiHoc |
2008 |
DBLP DOI BibTeX RDF |
sensor worm, graph coloring, sensor network security, percolation theory, software diversity |
67 | Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada |
Optimum Identification of Worm-Infected Hosts. |
IPOM |
2008 |
DBLP DOI BibTeX RDF |
sampling, detection, Worm, optimum design |
67 | Cliff Changchun Zou, Donald F. Towsley, Weibo Gong |
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
e-mail worm, worm modeling, simulation, Network security, epidemic model |
67 | Arno Wagner, Thomas Dübendorfer, Bernhard Plattner, Roman Hiestand |
Experiences with worm propagation simulations. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
simulation, latency, bandwidth, internet worms |
65 | Hanxun Zhou, Yingyou Wen, Hong Zhao |
Detecting early worm propagation based on entropy. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
Chebyshev's inequality, network security, entropy, worm, worm detection |
65 | Colleen Shannon, David Moore 0001 |
The Spread of the Witty Worm. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Witty worm, Internet worm |
64 | Chen Bo, Binxing Fang, Xiao-chun Yun |
Adaptive Method for Monitoring Network and Early Detection of Internet Worms. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Wei Shi, Qiang Li 0008, Jian Kang, Dong Guo 0002 |
Reconstruction of Worm Propagation Path by Causality. |
NAS |
2009 |
DBLP DOI BibTeX RDF |
|
61 | Yejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin |
A P2P E-commerce Related Network Security Issue: P2P Worm. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Peer-to-Peer, Invasive software |
61 | Zesheng Chen, Chao Chen 0001 |
A Closed-Form Expression for Static Worm-Scanning Strategies. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Xiaofeng Nie, Yuewu Wang, Jiwu Jing, Qi Liu |
Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Hanchuan Peng, Fuhui Long, Eugene W. Myers |
Straightening Worm Images. |
ISBI |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li 0001 |
Investigating the Impact of Real-World Factors on Internet Worm Propagation. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Sapon Tanachaiwiwat, Ahmed Helmy |
Computer worm ecology in encounter-based networks. |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
61 | Monirul Islam Sharif, George F. Riley, Wenke Lee |
Comparative Study between Analytical Models and Packet-Level Worm Simulations. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Songjie Wei, Jelena Mirkovic, D. Martin Swany |
Distributed Worm Simulation with a Realistic Internet Model. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Urupoj Kanlayasiri, Surasak Sanguanpong |
Key Factors Influencing Worm Infection in Enterprise Networks. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma 0001 |
Worm Propagation Modeling and Analysis on Network. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
61 | David M. Nicol, Michael Liljenstam |
Models and Analysis of Active Worm Defense. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Michael Liljenstam, David M. Nicol |
Comparing Passive and Active Worm Defenses. |
QEST |
2004 |
DBLP DOI BibTeX RDF |
|
61 | Stavros Christodoulakis, Daniel Alexander Ford |
Retrieval Performance Versus Disc Space Utilization on WORM Optical Discs. |
SIGMOD Conference |
1989 |
DBLP DOI BibTeX RDF |
|
61 | Cliff Changchun Zou, Lixin Gao 0001, Weibo Gong, Donald F. Towsley |
Monitoring and early warning for internet worms. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
monitoring, early detection, worm propagation |
60 | Niels Provos, Joe McClain, Ke Wang 0009 |
Search worms. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
index filtering, security, search, signature, internet worms |
60 | David J. Malan, Michael D. Smith 0001 |
Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS |
60 | Vern Paxson |
An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Mohammad Mannan, Paul C. van Oorschot |
On instant messaging worms, analysis and countermeasures. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
instant messaging worms, scale-free networks |
59 | Attila Ondi, Richard Ford |
How good is good enough? Metrics for worm/anti-worm evaluation. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Mustafa Jarrar, Anne Salaün |
WORM CoRe 2003 PC Co-chairs' Message. |
OTM Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1401 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|