|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 783 occurrences of 399 keywords
|
|
|
Results
Found 836 publication records. Showing 827 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
164 | Hanxun Zhou, Yingyou Wen, Hong Zhao |
Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
benign worm, two-factor worm model, network security |
149 | Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
Modeling and Automated Containment of Worms. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
(viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment) |
135 | David J. Malan, Michael D. Smith 0001 |
Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS |
105 | Songqing Chen, Xinyuan Wang 0005, Lei Liu 0021, Xinwen Zhang |
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. |
ANCS |
2006 |
DBLP DOI BibTeX RDF |
wormterminator, zero-day worms, virtual machine, worm containment, polymorphic worms |
98 | Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis |
An integrated approach to detection of fast and slow scanning worms. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
detection interval, intrusion detection, anomaly detection, Bayesian inference, worms, probability model |
91 | Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada |
Detection of Silent Worms using Anomaly Connection Tree. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
91 | Wei Yu 0002, Nan Zhang 0004, Wei Zhao 0001 |
Self-adaptive Worms and Countermeasures. |
SSS |
2006 |
DBLP DOI BibTeX RDF |
Game theory, Worm |
91 | Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada |
ACTM: Anomaly Connection Tree Method to detect Silent Worms. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Xiang Fan, Yang Xiang 0001 |
Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
Modeling, Network Security, Worms, Propagation, Invasive Software |
89 | Niels Provos, Joe McClain, Ke Wang 0009 |
Search worms. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
index filtering, security, search, signature, internet worms |
87 | Fernando C. Colón Osorio, Zachi Klopman |
An initial analysis and presentation of malware exhibiting swarm-like behavior. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
swarm worms, swarm intelligence, malware, emergent behavior, internet worms |
82 | Luke Bellamy, Damien Hutchinson, Jason Wells |
User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Taro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada |
Early containment of worms using dummy addresses and connection trace back. |
ICPADS |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Guanling Chen, Robert S. Gray |
Simulating non-scanning worms on peer-to-peer networks. |
Infoscale |
2006 |
DBLP DOI BibTeX RDF |
|
82 | Yousof Al-Hammadi, Christopher Leckie |
Anomaly detection for Internet worms. |
Integrated Network Management |
2005 |
DBLP DOI BibTeX RDF |
|
82 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
Pulse: A Class of Super-Worms against Network Infrastructure. |
ICDCS Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
80 | Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe |
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
Collaboration, Dynamic Programming, Worms, Control Theory |
80 | Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Mattia Monga |
LISABETH: automated content-based signature generator for zero-day polymorphic worms. |
SESS |
2008 |
DBLP DOI BibTeX RDF |
automatic content-based signature generation, intrusion detection, network security, polymorphic worms |
80 | Maziar M. Nekovee |
Epidemic Spreading of Computer Worms in Fixed Wireless Networks. |
BIOWIRE |
2007 |
DBLP DOI BibTeX RDF |
Wireless Computer Worms, Epidemic Spreading, Complex Networks, Modelling and Simulations |
80 | David J. Malan, Michael D. Smith 0001 |
Host-based detection of worms through peer-to-peer cooperation. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
Win32, native API, peer-to-peer, P2P, worms, windows, system calls, temporal consistency, system services |
80 | Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver |
The top speed of flash worms. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
flash worm, simulation, modeling, worms |
73 | Zhenyun Zhuang, Ying Li, Zesheng Chen |
PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Cliff Changchun Zou, Donald F. Towsley, Weibo Gong |
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. |
IEEE Trans. Dependable Secur. Comput. |
2007 |
DBLP DOI BibTeX RDF |
e-mail worm, worm modeling, simulation, Network security, epidemic model |
73 | Yi Tang 0001, Xiangning Dong |
Anting: An Adaptive Scanning Method for Computer Worms. |
Web Intelligence |
2006 |
DBLP DOI BibTeX RDF |
|
73 | Yong Tang 0004, Shigang Chen |
Defending against Internet worms: a signature-based approach. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou |
Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
71 | Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford |
Virtual Playgrounds for Worm Behavior Investigation. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
Intrusion Observation and Analysis, Destructive Experiments, Internet Worms |
71 | Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis |
Defending against hitlist worms using network address space randomization. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
network security, randomization, traffic analysis, internet worms |
71 | Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang |
A study of mass-mailing worms. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
network security, traffic analysis, internet worms |
64 | Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos |
Treating scalability and modelling human countermeasures against local preference worms via gradient models. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Fangqi Sun, Liang Xu, Zhendong Su 0001 |
Client-Side Detection of XSS Worms by Monitoring Payload Propagation. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
cross-site scripting worm, client-side detection, Web application security |
64 | Liang Xie 0002, Hui Song, Sencun Zhu |
On the Effectiveness of Internal Patching Against File-Sharing Worms. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, Laurissa N. Tokarchuk |
Propagation Model of Active Worms in P2P Networks. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Parbati K. Manna, Shigang Chen, Sanjay Ranka |
Exact Modeling of Propagation for Permutation-Scanning Worms. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Parbati K. Manna, Sanjay Ranka, Shigang Chen |
DAWN: A Novel Strategy for Detecting ASCII Worms in Networks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary |
The Quest for Multi-headed Worms. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Srinivas Shakkottai, R. Srikant 0001 |
Peer to Peer Networks for Defense Against Internet Worms. |
IEEE J. Sel. Areas Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Yong Tang, Xicheng Lu, Bin Xiao 0001 |
Generating Simplified Regular Expression Signatures for Polymorphic Worms. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Theodor Richardson, Chin-Tser Huang |
Containing Hitlist-Based Worms with Polymorphic Signatures. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Sapon Tanachaiwiwat, Ahmed Helmy |
Modeling and analysis of worm interactions (war of the worms). |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Jingbo Hao, Jianping Yin, Boyun Zhang |
A Computational Model of Computer Worms Based on Persistent Turing Machines. |
IEEE ICCI |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Guanhua Yan, Stephan J. Eidenbenz |
Bluetooth Worms: Models, Dynamics, and Defense Implications. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 |
Vigilante: end-to-end containment of internet worms. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
self-certifying alerts, data flow analysis, control flow analysis, worm containment |
62 | Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto |
Signature metrics for accurate and automated worm detection. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
network worms, worm signatures, traffic analysis |
62 | Kurt Rohloff, Tamer Basar |
Deterministic and stochastic models for the detection of random constant scanning worms. |
ACM Trans. Model. Comput. Simul. |
2008 |
DBLP DOI BibTeX RDF |
Worms, hypothesis testing, stochastic analysis, epidemic modeling |
62 | Yong Tang 0004, Shigang Chen |
An Automated Signature-Based Approach against Polymorphic Internet Worms. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Internet security, worm detection, polymorphic worms |
62 | Justin Ma, Geoffrey M. Voelker, Stefan Savage |
Self-stopping worms. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
self-stop, malware, worms, distributed protocols |
62 | Mohammad Mannan, Paul C. van Oorschot |
On instant messaging worms, analysis and countermeasures. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
instant messaging worms, scale-free networks |
60 | Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms |
59 | Dhabaleswar K. Panda 0001 |
Global reduction in wormhole k-ary n-cube networks with multidestination exchange worms. |
IPPS |
1995 |
DBLP DOI BibTeX RDF |
global reduction, wormhole k-ary n-cube networks, multidestination exchange worms, multidestination message passing mechanism, pairwise exchange worms, complete global reduction, barrier synchronization operations, message passing interface standard, unicast-based message passing, communication startup time, data size, fast global reduction, message passing, synchronisation, hypercube networks, system size |
55 | Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 |
Vigilante: End-to-end containment of Internet worm epidemics. |
ACM Trans. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
self-certifying alerts, vulnerability condition slicing, program analysis, dynamic data-flow analysis, Worm containment |
55 | A. M. El-Menshawy, Hossam El Deen Mostafa Faheem, T. Al-Arif, Z. Taha |
Agent Based Framework for Worm Detection. |
SCSS (1) |
2007 |
DBLP DOI BibTeX RDF |
Multi Agent-based systems, Worm detection |
55 | Hatem M. El-Boghdadi, Mohamed Bohalfaeh |
Code Generation: On the Scheduling of DAGs Using Worm-Partition. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Oliver Sharma, Mark A. Girolami, Joseph S. Sventek |
Detecting worm variants using machine learning. |
CoNEXT |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata |
A New Approach to Early Detection of an Unknown Worm. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Tao Gong, Zixing Cai |
Anti-worm Immunization of Web System Based on Normal Model and BP Neural Network. |
ISNN (2) |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong |
E-mail Worm Detection Using the Analysis of Behavior. |
ICDCIT |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna |
Polymorphic Worm Detection Using Structural Information of Executables. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Shou-Chuan Lai, Wen-Chu Kuo, Mu-Cheng Hsie |
Defending against Internet Worm-like Infestations. |
AINA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Rajeev Sivaram, Ram Kesavan, Dhabaleswar K. Panda 0001, Craig B. Stunkel |
Architectural Support for Efficient Multicasting in Irregular Networks. |
IEEE Trans. Parallel Distributed Syst. |
2001 |
DBLP DOI BibTeX RDF |
cut-through routing, performance evaluation, multicast, broadcast, collective communication, Parallel computer architecture, irregular networks, switch-based networks |
55 | Guanhua Yan, Stephan J. Eidenbenz |
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). |
IEEE Trans. Mob. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Nikzad Babaii Rizvandi, Aleksandra Pizurica, Wilfried Philips |
Machine vision detection of isolated and overlapped nematode worms using skeleton analysis. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada |
A Distributed Detection of Hit-List Worms. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson |
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Matthew Van Gundy, Hao Chen 0003, Zhendong Su 0001, Giovanni Vigna |
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Hyundo Park, Heejo Lee |
Detecting Unknown Worms Using Randomness Check. |
ICOIN |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
Modeling and Automated Containment of Worms. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
55 | James Newsome, Brad Karp, Dawn Xiaodong Song |
Polygraph: Automatically Generating Signatures for Polymorphic Worms. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Ping Wang, Binxing Fang, Xiao-chun Yun |
A New User-Habit Based Approach for Early Warning of Worms. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
Detecting Intra-enterprise Scanning Worms based on Address Resolution. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Florian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith |
Digging For Worms, Fishing For Answers. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
53 | Joe Szabo, John Aycock, Randal Acton, Jörg Denzinger |
The tale of the weather worm. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
network security, emergencies, worms, geolocation, disasters, information policy |
53 | David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song |
Design space and analysis of worm defense strategies. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
defense strategy analysis, local containment, proactive protection, worm taxonomy, worms, blacklisting, antibody, worm propagation |
53 | Arno Wagner, Thomas Dübendorfer, Bernhard Plattner, Roman Hiestand |
Experiences with worm propagation simulations. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
simulation, latency, bandwidth, internet worms |
52 | David M. Nicol |
Efficient simulation of Internet worms. |
ACM Trans. Model. Comput. Simul. |
2008 |
DBLP DOI BibTeX RDF |
simulation, modeling, denial-of-service, Worms |
52 | George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnovic |
A model of the spread of randomly scanning Internet worms that saturate access links. |
ACM Trans. Model. Comput. Simul. |
2008 |
DBLP DOI BibTeX RDF |
communications/computer networking, modeling, Internet worms, epidemiology |
52 | Nikzad Babaii Rizvandi, Aleksandra Pizurica, Wilfried Philips |
Automatic Individual Detection and Separation of Multiple Overlapped Nematode Worms Using Skeleton Analysis. |
ICIAR |
2008 |
DBLP DOI BibTeX RDF |
Overlap worms, Skeleton angle analysis, Computer vision, Image processing, Worm detection |
52 | Paul C. van Oorschot, Jean-Marc Robert 0001, Miguel Vargas Martin |
A monitoring system for detecting repeated packets with applications to computer worms. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Intrusion detection, Network security, Anomaly detection, Traffic monitoring, Computer worms |
52 | Xuxian Jiang, Dongyan Xu |
Profiling self-propagating worms via behavioral footprinting. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
behavioral footprinting, content signature, worm profiling, worms |
52 | Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham |
A taxonomy of computer worms. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
mobile malicious code, taxonomy, motivation, attackers, computer worms |
46 | Xuxian Jiang, Xingquan Zhu 0001 |
vEye: behavioral footprinting for self-propagating worm detection and profiling. |
Knowl. Inf. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Behavioral footprinting, Network security, Information systems, Sequence alignment, Worm detection |
46 | Yi Yang 0002, Sencun Zhu, Guohong Cao |
Improving sensor network immunity under worm attacks: a software diversity approach. |
MobiHoc |
2008 |
DBLP DOI BibTeX RDF |
sensor worm, graph coloring, sensor network security, percolation theory, software diversity |
46 | Madihah Mohd Saudi, Emran Mohd Tamil, Andrea J. Cullen, Mike E. Woodward, Mohd Yamani Idna Bin Idris |
Reverse Engineering: EDOWA Worm Analysis and Classification. |
World Congress on Engineering (Selected Papers) |
2008 |
DBLP DOI BibTeX RDF |
worm analysis, worm classification, Classification, payload |
46 | Dima Stopel, Zvi Boger, Robert Moskovitch, Yuval Shahar, Yuval Elovici |
Application of Artificial Neural Networks Techniques to Computer Worm Detection. |
IJCNN |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai |
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Frank Castaneda, Emre Can Sezer, Jun Xu 0003 |
WORM vs. WORM: preliminary study of an active counter-attack mechanism. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
anti-worm, good worm, worm |
46 | Rajeev Sivaram, Dhabaleswar K. Panda 0001, Craig B. Stunkel |
Efficient Broadcast and Multicast on Multistage Interconnection Networks Using Multiport Encoding. |
IEEE Trans. Parallel Distributed Syst. |
1998 |
DBLP DOI BibTeX RDF |
multicast, broadcast, wormhole routing, multistage interconnection networks, collective communication, interprocessor communication, Parallel computer architecture, virtual cut-through |
45 | Dima Stopel, Robert Moskovitch, Zvi Boger, Yuval Shahar, Yuval Elovici |
Using artificial neural networks to detect unknown computer worms. |
Neural Comput. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Feature selection, Artificial neural networks, Worm detection, HIDS |
45 | Mohammad Reza Faghani, Hossein Saidi 0001 |
Social Networks' XSS Worms. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson |
On the adaptive real-time detection of fast-propagating network worms. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim |
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Zesheng Chen, Chao Chen 0001, Chuanyi Ji |
Understanding Localized-Scanning Worms. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Yuriy Bulygin |
Epidemics of Mobile Worms. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Mohamed Abdelhafez, George F. Riley, Robert G. Cole, Nam Phamdo |
Modeling and Simulations of TCP MANET Worms. |
PADS |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Zhichun Li, Lanjia Wang, Yan Chen 0004, Zhi Fu |
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Scott E. Coull, Boleslaw K. Szymanski |
On the Development of an Internetwork-Centric Defense for Scanning Worms. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Byungseung Kim, Saewoong Bahk |
Relative Entropy-Based Filtering of Internet Worms by Inspecting TCP SYN Retry Packets. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham |
Feature Based Techniques for Auto-Detection of Novel Email Worms. |
PAKDD |
2007 |
DBLP DOI BibTeX RDF |
Email worm, classification technique, data mining, feature selection, Principal Component Analysis |
45 | Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu |
On capturing and containing E-mail worms. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Ihab Hamadeh, George Kesidis |
Toward a Framework for Forensic Analysis of Scanning Worms. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 827 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|