|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 118 occurrences of 68 keywords
|
|
|
Results
Found 46 publication records. Showing 46 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | David M. Nicol |
The impact of stochastic variance on worm propagation and detection. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
modeling, detection, worms, variance |
1 | Niels Provos, Joe McClain, Ke Wang 0009 |
Search worms. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
index filtering, security, search, signature, internet worms |
1 | Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao |
Internet-scale malware mitigation: combining intelligence of the control and data plane. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
internet motion sensor, routing anomaly, network security, BGP, computer worms |
1 | Jose Nazario |
Where the worms aren't. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
securty, worms, vulnerabilities, botnets, exploits |
1 | Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto |
Signature metrics for accurate and automated worm detection. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
network worms, worm signatures, traffic analysis |
1 | Xuxian Jiang, Dongyan Xu |
Profiling self-propagating worms via behavioral footprinting. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
behavioral footprinting, content signature, worm profiling, worms |
1 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
On the impact of dynamic addressing on malware propagation. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
private address space, network security, internet worms, network address translation |
1 | Mohamed R. Chouchane, Arun Lakhotia |
Using engine signature to detect metamorphic malware. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
metamorphic engine, virus scanner |
1 | Farnam Jahanian (eds.) |
Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006 |
WORM |
2006 |
DBLP BibTeX RDF |
|
1 | Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel |
A preliminary investigation of worm infections in a bluetooth environment. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
Bluetooth, malware, worms |
1 | Giovanni Di Crescenzo, Faramak Vakil |
Cryptographic hashing for virus localization. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
cryptographic hashing, virus tolerance, integrity verification, virus detection |
1 | David J. Malan, Michael D. Smith 0001 |
Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS |
1 | Kurt Rohloff, Tamer Basar |
The detection of RCS worm epidemics. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Justin Ma, Geoffrey M. Voelker, Stefan Savage |
Self-stopping worms. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
self-stop, malware, worms, distributed protocols |
1 | Vijay Atluri, Angelos D. Keromytis (eds.) |
Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 |
WORM |
2005 |
DBLP BibTeX RDF |
|
1 | Milan Vojnovic, Ayalvadi J. Ganesh |
On the effectiveness of automatic patching. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
minimum broadcast curve, worm, patching, virus, epidemic, software updates, automatic updates |
1 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
Worm evolution tracking via timing analysis. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
methods of attribution, network security, internet worms |
1 | David J. Malan, Michael D. Smith 0001 |
Host-based detection of worms through peer-to-peer cooperation. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
Win32, native API, peer-to-peer, P2P, worms, windows, system calls, temporal consistency, system services |
1 | Zesheng Chen, Chuanyi Ji |
A self-learning worm using importance scanning. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
importance scanning, self-learning worm, modeling, worm propagation |
1 | David W. Richardson, Steven D. Gribble, Edward D. Lazowska |
The limits of global scanning worm detectors in the presence of background noise. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
scanning worms, worm models, computer security, worm detection, computer worms |
1 | Brian Hernacki |
Emerging threats. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis |
Defending against hitlist worms using network address space randomization. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
network security, randomization, traffic analysis, internet worms |
1 | Stefan Savage |
Scalable internet threat monitoring. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Vern Paxson |
An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Mannan, Paul C. van Oorschot |
On instant messaging worms, analysis and countermeasures. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
instant messaging worms, scale-free networks |
1 | Vern Paxson (eds.) |
Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004 |
WORM |
2004 |
DBLP BibTeX RDF |
|
1 | James E. Just, Mark R. Cornwell |
Review and analysis of synthetic diversity for breaking monocultures. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
diversity, vulnerability, n-version programming |
1 | Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting |
A hybrid quarantine defense. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
network modeling and simulation, worm detection systems, network security, worms |
1 | Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver |
The top speed of flash worms. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
flash worm, simulation, modeling, worms |
1 | Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia |
A behavioral approach to worm detection. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
behavioral signatures, descendant relation, network application architecture, network worms, intrusion detection |
1 | Frank Castaneda, Emre Can Sezer, Jun Xu 0003 |
WORM vs. WORM: preliminary study of an active counter-attack mechanism. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
anti-worm, good worm, worm |
1 | Jintao Xiong |
ACT: attachment chain tracing scheme for email virus detection and control. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
contact tracing, transmission chain, worm defense |
1 | Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson 0001, Farnam Jahanian, Danny McPherson |
Toward understanding distributed blackhole placement. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
blackhole monitoring, blackhole placement, globally scoped threats, internet motion sensor, network security, computer worms |
1 | Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang |
A study of mass-mailing worms. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
network security, traffic analysis, internet worms |
1 | Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson |
Preliminary results using scale-down to explore worm dynamics. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
scaledown, slammer, simulation, modeling, worms |
1 | Stuart E. Schechter, Michael D. Smith 0001 |
Access for sale: a new class of worm. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
security, cryptography, economics, incentives, worm, virus, threat modelling |
1 | Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray |
Simulating realistic network worm traffic for worm warning system design and testing. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
code red, network modeling and simulation, slammer, worm detection systems, network security, worms |
1 | Cliff Changchun Zou, Weibo Gong, Donald F. Towsley |
Worm propagation modeling and analysis under dynamic quarantine defense. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
dynamic quarantine, epidemic model, worm propagation |
1 | Linda Briesemeister, Patrick Lincoln, Phillip A. Porras |
Epidemic profiles and defense of scale-free networks. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
computer epidemics, self-propagating malicious code, scale-free networks |
1 | Dan Ellis |
Worm anatomy and model. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
network security, worm, network modeling, turing machine |
1 | Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham |
Detection of injected, dynamically generated, and obfuscated malicious code. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection |
1 | Yang Wang 0008, Chenxi Wang |
Modeling the effects of timing parameters on virus propagation. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
security, epidemiology, computer virus, anti-virus |
1 | Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham |
A taxonomy of computer worms. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
mobile malicious code, taxonomy, motivation, attackers, computer worms |
1 | Stuart Staniford, Stefan Savage (eds.) |
Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003 |
WORM |
2003 |
DBLP BibTeX RDF |
|
1 | Darrell M. Kienzle, Matthew C. Elder |
Recent worms: a survey and trends. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
survey, malicious code |
1 | Arno Wagner, Thomas Dübendorfer, Bernhard Plattner, Roman Hiestand |
Experiences with worm propagation simulations. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
simulation, latency, bandwidth, internet worms |
Displaying result #1 - #46 of 46 (100 per page; Change: )
|
|