The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Welchia with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004 (1) 2005 (5) 2007 (1) 2008 (1)
Publication types (Num. hits)
article(1) inproceedings(7)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 16 occurrences of 11 keywords

Results
Found 8 publication records. Showing 8 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Michael D. Bailey, Evan Cooke, Farnam Jahanian, David Watson 0001, Jose Nazario The Blaster Worm: Then and Now. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Blaster, Welchia, MSBlast, worm, Windows
24Carrie Gates, John McHugh The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Sapon Tanachaiwiwat, Ahmed Helmy Modeling and analysis of worm interactions (war of the worms). Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Hideki Koike, Kazuhiro Ohno, Kanba Koizumi Visualizing Cyber Attacks using IP Matrix. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF virus visualization, worm visualization, Internet forecasting, information visualization, intrusion detection, information security, Internet worm, computer virus
24Kazuhiro Ohno, Hideki Koike, Kanba Koizumi IPMatrix: An Effective Visualization Framework for Cyber Threat Monitoring. Search on Bibsonomy IV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information visualization, intrusion detection, information security, Internet worm, computer virus
24Xin Xu, Weihua Song, Vir V. Phoha Early detection and propagation mitigation of worm programs. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Dan Albrich Automating windows security: building a security CD. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF automated security, custom CD-ROM, scripting, patch management
24Joel Sommers, Vinod Yegneswaran, Paul Barford A framework for malicious workload generation. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF traffic generation, network intrusions
Displaying result #1 - #8 of 8 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license