|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 783 occurrences of 399 keywords
|
|
|
Results
Found 836 publication records. Showing 827 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
164 | Hanxun Zhou, Yingyou Wen, Hong Zhao |
Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms.  |
ICN  |
2007 |
DBLP DOI BibTeX RDF |
benign worm, two-factor worm model, network security |
149 | Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
Modeling and Automated Containment of Worms.  |
IEEE Trans. Dependable Secur. Comput.  |
2008 |
DBLP DOI BibTeX RDF |
(viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment) |
135 | David J. Malan, Michael D. Smith 0001 |
Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms.  |
WORM  |
2006 |
DBLP DOI BibTeX RDF |
collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS |
105 | Songqing Chen, Xinyuan Wang 0005, Lei Liu 0021, Xinwen Zhang |
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms.  |
ANCS  |
2006 |
DBLP DOI BibTeX RDF |
wormterminator, zero-day worms, virtual machine, worm containment, polymorphic worms |
98 | Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis |
An integrated approach to detection of fast and slow scanning worms.  |
AsiaCCS  |
2009 |
DBLP DOI BibTeX RDF |
detection interval, intrusion detection, anomaly detection, Bayesian inference, worms, probability model |
91 | Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada |
Detection of Silent Worms using Anomaly Connection Tree.  |
AINA  |
2007 |
DBLP DOI BibTeX RDF |
|
91 | Wei Yu 0002, Nan Zhang 0004, Wei Zhao 0001 |
Self-adaptive Worms and Countermeasures.  |
SSS  |
2006 |
DBLP DOI BibTeX RDF |
Game theory, Worm |
91 | Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada |
ACTM: Anomaly Connection Tree Method to detect Silent Worms.  |
AINA (1)  |
2006 |
DBLP DOI BibTeX RDF |
|
89 | Xiang Fan, Yang Xiang 0001 |
Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques.  |
NPC  |
2008 |
DBLP DOI BibTeX RDF |
Modeling, Network Security, Worms, Propagation, Invasive Software |
89 | Niels Provos, Joe McClain, Ke Wang 0009 |
Search worms.  |
WORM  |
2006 |
DBLP DOI BibTeX RDF |
index filtering, security, search, signature, internet worms |
87 | Fernando C. Colón Osorio, Zachi Klopman |
An initial analysis and presentation of malware exhibiting swarm-like behavior.  |
SAC  |
2006 |
DBLP DOI BibTeX RDF |
swarm worms, swarm intelligence, malware, emergent behavior, internet worms |
82 | Luke Bellamy, Damien Hutchinson, Jason Wells |
User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear?  |
ACIS-ICIS  |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Taro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada |
Early containment of worms using dummy addresses and connection trace back.  |
ICPADS  |
2007 |
DBLP DOI BibTeX RDF |
|
82 | Guanling Chen, Robert S. Gray |
Simulating non-scanning worms on peer-to-peer networks.  |
Infoscale  |
2006 |
DBLP DOI BibTeX RDF |
|
82 | Yousof Al-Hammadi, Christopher Leckie |
Anomaly detection for Internet worms.  |
Integrated Network Management  |
2005 |
DBLP DOI BibTeX RDF |
|
82 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
Pulse: A Class of Super-Worms against Network Infrastructure.  |
ICDCS Workshops  |
2003 |
DBLP DOI BibTeX RDF |
|
80 | Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe |
Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach.  |
RAID  |
2008 |
DBLP DOI BibTeX RDF |
Collaboration, Dynamic Programming, Worms, Control Theory |
80 | Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Mattia Monga |
LISABETH: automated content-based signature generator for zero-day polymorphic worms.  |
SESS  |
2008 |
DBLP DOI BibTeX RDF |
automatic content-based signature generation, intrusion detection, network security, polymorphic worms |
80 | Maziar M. Nekovee |
Epidemic Spreading of Computer Worms in Fixed Wireless Networks.  |
BIOWIRE  |
2007 |
DBLP DOI BibTeX RDF |
Wireless Computer Worms, Epidemic Spreading, Complex Networks, Modelling and Simulations |
80 | David J. Malan, Michael D. Smith 0001 |
Host-based detection of worms through peer-to-peer cooperation.  |
WORM  |
2005 |
DBLP DOI BibTeX RDF |
Win32, native API, peer-to-peer, P2P, worms, windows, system calls, temporal consistency, system services |
80 | Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver |
The top speed of flash worms.  |
WORM  |
2004 |
DBLP DOI BibTeX RDF |
flash worm, simulation, modeling, worms |
73 | Zhenyun Zhuang, Ying Li, Zesheng Chen |
PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms.  |
COMPSAC (1)  |
2009 |
DBLP DOI BibTeX RDF |
|
73 | Cliff Changchun Zou, Donald F. Towsley, Weibo Gong |
Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms.  |
IEEE Trans. Dependable Secur. Comput.  |
2007 |
DBLP DOI BibTeX RDF |
e-mail worm, worm modeling, simulation, Network security, epidemic model |
73 | Yi Tang 0001, Xiangning Dong |
Anting: An Adaptive Scanning Method for Computer Worms.  |
Web Intelligence  |
2006 |
DBLP DOI BibTeX RDF |
|
73 | Yong Tang 0004, Shigang Chen |
Defending against Internet worms: a signature-based approach.  |
INFOCOM  |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou |
Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks.  |
IAS  |
2009 |
DBLP DOI BibTeX RDF |
|
71 | Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford |
Virtual Playgrounds for Worm Behavior Investigation.  |
RAID  |
2005 |
DBLP DOI BibTeX RDF |
Intrusion Observation and Analysis, Destructive Experiments, Internet Worms |
71 | Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis |
Defending against hitlist worms using network address space randomization.  |
WORM  |
2005 |
DBLP DOI BibTeX RDF |
network security, randomization, traffic analysis, internet worms |
71 | Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang |
A study of mass-mailing worms.  |
WORM  |
2004 |
DBLP DOI BibTeX RDF |
network security, traffic analysis, internet worms |
64 | Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos |
Treating scalability and modelling human countermeasures against local preference worms via gradient models.  |
J. Comput. Virol.  |
2009 |
DBLP DOI BibTeX RDF |
|
64 | Fangqi Sun, Liang Xu, Zhendong Su 0001 |
Client-Side Detection of XSS Worms by Monitoring Payload Propagation.  |
ESORICS  |
2009 |
DBLP DOI BibTeX RDF |
cross-site scripting worm, client-side detection, Web application security |
64 | Liang Xie 0002, Hui Song, Sencun Zhu |
On the Effectiveness of Internal Patching Against File-Sharing Worms.  |
ACNS  |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, Laurissa N. Tokarchuk |
Propagation Model of Active Worms in P2P Networks.  |
ICYCS  |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Parbati K. Manna, Shigang Chen, Sanjay Ranka |
Exact Modeling of Propagation for Permutation-Scanning Worms.  |
INFOCOM  |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Parbati K. Manna, Sanjay Ranka, Shigang Chen |
DAWN: A Novel Strategy for Detecting ASCII Worms in Networks.  |
INFOCOM  |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary |
The Quest for Multi-headed Worms.  |
DIMVA  |
2008 |
DBLP DOI BibTeX RDF |
|
64 | Srinivas Shakkottai, R. Srikant 0001 |
Peer to Peer Networks for Defense Against Internet Worms.  |
IEEE J. Sel. Areas Commun.  |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Yong Tang, Xicheng Lu, Bin Xiao 0001 |
Generating Simplified Regular Expression Signatures for Polymorphic Worms.  |
ATC  |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Theodor Richardson, Chin-Tser Huang |
Containing Hitlist-Based Worms with Polymorphic Signatures.  |
ICCCN  |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Sapon Tanachaiwiwat, Ahmed Helmy |
Modeling and analysis of worm interactions (war of the worms).  |
BROADNETS  |
2007 |
DBLP DOI BibTeX RDF |
|
64 | Jingbo Hao, Jianping Yin, Boyun Zhang |
A Computational Model of Computer Worms Based on Persistent Turing Machines.  |
IEEE ICCI  |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Guanhua Yan, Stephan J. Eidenbenz |
Bluetooth Worms: Models, Dynamics, and Defense Implications.  |
ACSAC  |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 |
Vigilante: end-to-end containment of internet worms.  |
SOSP  |
2005 |
DBLP DOI BibTeX RDF |
self-certifying alerts, data flow analysis, control flow analysis, worm containment |
62 | Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto |
Signature metrics for accurate and automated worm detection.  |
WORM  |
2006 |
DBLP DOI BibTeX RDF |
network worms, worm signatures, traffic analysis |
62 | Kurt Rohloff, Tamer Basar |
Deterministic and stochastic models for the detection of random constant scanning worms.  |
ACM Trans. Model. Comput. Simul.  |
2008 |
DBLP DOI BibTeX RDF |
Worms, hypothesis testing, stochastic analysis, epidemic modeling |
62 | Yong Tang 0004, Shigang Chen |
An Automated Signature-Based Approach against Polymorphic Internet Worms.  |
IEEE Trans. Parallel Distributed Syst.  |
2007 |
DBLP DOI BibTeX RDF |
Internet security, worm detection, polymorphic worms |
62 | Justin Ma, Geoffrey M. Voelker, Stefan Savage |
Self-stopping worms.  |
WORM  |
2005 |
DBLP DOI BibTeX RDF |
self-stop, malware, worms, distributed protocols |
62 | Mohammad Mannan, Paul C. van Oorschot |
On instant messaging worms, analysis and countermeasures.  |
WORM  |
2005 |
DBLP DOI BibTeX RDF |
instant messaging worms, scale-free networks |
60 | Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.  |
CCS  |
2005 |
DBLP DOI BibTeX RDF |
metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms |
59 | Dhabaleswar K. Panda 0001 |
Global reduction in wormhole k-ary n-cube networks with multidestination exchange worms.  |
IPPS  |
1995 |
DBLP DOI BibTeX RDF |
global reduction, wormhole k-ary n-cube networks, multidestination exchange worms, multidestination message passing mechanism, pairwise exchange worms, complete global reduction, barrier synchronization operations, message passing interface standard, unicast-based message passing, communication startup time, data size, fast global reduction, message passing, synchronisation, hypercube networks, system size |
55 | Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 |
Vigilante: End-to-end containment of Internet worm epidemics.  |
ACM Trans. Comput. Syst.  |
2008 |
DBLP DOI BibTeX RDF |
self-certifying alerts, vulnerability condition slicing, program analysis, dynamic data-flow analysis, Worm containment |
55 | A. M. El-Menshawy, Hossam El Deen Mostafa Faheem, T. Al-Arif, Z. Taha |
Agent Based Framework for Worm Detection.  |
SCSS (1)  |
2007 |
DBLP DOI BibTeX RDF |
Multi Agent-based systems, Worm detection |
55 | Hatem M. El-Boghdadi, Mohamed Bohalfaeh |
Code Generation: On the Scheduling of DAGs Using Worm-Partition.  |
IPDPS  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Oliver Sharma, Mark A. Girolami, Joseph S. Sventek |
Detecting worm variants using machine learning.  |
CoNEXT  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata |
A New Approach to Early Detection of an Unknown Worm.  |
AINA Workshops (1)  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Tao Gong, Zixing Cai |
Anti-worm Immunization of Web System Based on Normal Model and BP Neural Network.  |
ISNN (2)  |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong |
E-mail Worm Detection Using the Analysis of Behavior.  |
ICDCIT  |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna |
Polymorphic Worm Detection Using Structural Information of Executables.  |
RAID  |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Shou-Chuan Lai, Wen-Chu Kuo, Mu-Cheng Hsie |
Defending against Internet Worm-like Infestations.  |
AINA (1)  |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Rajeev Sivaram, Ram Kesavan, Dhabaleswar K. Panda 0001, Craig B. Stunkel |
Architectural Support for Efficient Multicasting in Irregular Networks.  |
IEEE Trans. Parallel Distributed Syst.  |
2001 |
DBLP DOI BibTeX RDF |
cut-through routing, performance evaluation, multicast, broadcast, collective communication, Parallel computer architecture, irregular networks, switch-based networks |
55 | Guanhua Yan, Stephan J. Eidenbenz |
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version).  |
IEEE Trans. Mob. Comput.  |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Nikzad Babaii Rizvandi, Aleksandra Pizurica, Wilfried Philips |
Machine vision detection of isolated and overlapped nematode worms using skeleton analysis.  |
ICIP  |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada |
A Distributed Detection of Hit-List Worms.  |
ICC  |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson |
On the Adaptive Real-Time Detection of Fast-Propagating Network Worms.  |
DIMVA  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Matthew Van Gundy, Hao Chen 0003, Zhendong Su 0001, Giovanni Vigna |
Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms.  |
ACSAC  |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Hyundo Park, Heejo Lee |
Detecting Unknown Worms Using Randomness Check.  |
ICOIN  |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
Modeling and Automated Containment of Worms.  |
DSN  |
2005 |
DBLP DOI BibTeX RDF |
|
55 | James Newsome, Brad Karp, Dawn Xiaodong Song |
Polygraph: Automatically Generating Signatures for Polymorphic Worms.  |
S&P  |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Ping Wang, Binxing Fang, Xiao-chun Yun |
A New User-Habit Based Approach for Early Warning of Worms.  |
CIS (2)  |
2005 |
DBLP DOI BibTeX RDF |
|
55 | David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
Detecting Intra-enterprise Scanning Worms based on Address Resolution.  |
ACSAC  |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Florian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith |
Digging For Worms, Fishing For Answers.  |
ACSAC  |
2002 |
DBLP DOI BibTeX RDF |
|
53 | Joe Szabo, John Aycock, Randal Acton, Jörg Denzinger |
The tale of the weather worm.  |
SAC  |
2008 |
DBLP DOI BibTeX RDF |
network security, emergencies, worms, geolocation, disasters, information policy |
53 | David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song |
Design space and analysis of worm defense strategies.  |
AsiaCCS  |
2006 |
DBLP DOI BibTeX RDF |
defense strategy analysis, local containment, proactive protection, worm taxonomy, worms, blacklisting, antibody, worm propagation |
53 | Arno Wagner, Thomas Dübendorfer, Bernhard Plattner, Roman Hiestand |
Experiences with worm propagation simulations.  |
WORM  |
2003 |
DBLP DOI BibTeX RDF |
simulation, latency, bandwidth, internet worms |
52 | David M. Nicol |
Efficient simulation of Internet worms.  |
ACM Trans. Model. Comput. Simul.  |
2008 |
DBLP DOI BibTeX RDF |
simulation, modeling, denial-of-service, Worms |
52 | George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnovic |
A model of the spread of randomly scanning Internet worms that saturate access links.  |
ACM Trans. Model. Comput. Simul.  |
2008 |
DBLP DOI BibTeX RDF |
communications/computer networking, modeling, Internet worms, epidemiology |
52 | Nikzad Babaii Rizvandi, Aleksandra Pizurica, Wilfried Philips |
Automatic Individual Detection and Separation of Multiple Overlapped Nematode Worms Using Skeleton Analysis.  |
ICIAR  |
2008 |
DBLP DOI BibTeX RDF |
Overlap worms, Skeleton angle analysis, Computer vision, Image processing, Worm detection |
52 | Paul C. van Oorschot, Jean-Marc Robert 0001, Miguel Vargas Martin |
A monitoring system for detecting repeated packets with applications to computer worms.  |
Int. J. Inf. Sec.  |
2006 |
DBLP DOI BibTeX RDF |
Intrusion detection, Network security, Anomaly detection, Traffic monitoring, Computer worms |
52 | Xuxian Jiang, Dongyan Xu |
Profiling self-propagating worms via behavioral footprinting.  |
WORM  |
2006 |
DBLP DOI BibTeX RDF |
behavioral footprinting, content signature, worm profiling, worms |
52 | Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham |
A taxonomy of computer worms.  |
WORM  |
2003 |
DBLP DOI BibTeX RDF |
mobile malicious code, taxonomy, motivation, attackers, computer worms |
46 | Xuxian Jiang, Xingquan Zhu 0001 |
vEye: behavioral footprinting for self-propagating worm detection and profiling.  |
Knowl. Inf. Syst.  |
2009 |
DBLP DOI BibTeX RDF |
Behavioral footprinting, Network security, Information systems, Sequence alignment, Worm detection |
46 | Yi Yang 0002, Sencun Zhu, Guohong Cao |
Improving sensor network immunity under worm attacks: a software diversity approach.  |
MobiHoc  |
2008 |
DBLP DOI BibTeX RDF |
sensor worm, graph coloring, sensor network security, percolation theory, software diversity |
46 | Madihah Mohd Saudi, Emran Mohd Tamil, Andrea J. Cullen, Mike E. Woodward, Mohd Yamani Idna Bin Idris |
Reverse Engineering: EDOWA Worm Analysis and Classification.  |
World Congress on Engineering (Selected Papers) ![In: Advances in Electrical Engineering and Computational Science, [revised and extended papers from the World Congress on Engineering, WCE 2008, London, UK, July 2-4, 2008], pp. 277-288, 2008, Springer, 978-90-481-2310-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
worm analysis, worm classification, Classification, payload |
46 | Dima Stopel, Zvi Boger, Robert Moskovitch, Yuval Shahar, Yuval Elovici |
Application of Artificial Neural Networks Techniques to Computer Worm Detection.  |
IJCNN  |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai |
Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information.  |
PADS  |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Frank Castaneda, Emre Can Sezer, Jun Xu 0003 |
WORM vs. WORM: preliminary study of an active counter-attack mechanism.  |
WORM  |
2004 |
DBLP DOI BibTeX RDF |
anti-worm, good worm, worm |
46 | Rajeev Sivaram, Dhabaleswar K. Panda 0001, Craig B. Stunkel |
Efficient Broadcast and Multicast on Multistage Interconnection Networks Using Multiport Encoding.  |
IEEE Trans. Parallel Distributed Syst.  |
1998 |
DBLP DOI BibTeX RDF |
multicast, broadcast, wormhole routing, multistage interconnection networks, collective communication, interprocessor communication, Parallel computer architecture, virtual cut-through |
45 | Dima Stopel, Robert Moskovitch, Zvi Boger, Yuval Shahar, Yuval Elovici |
Using artificial neural networks to detect unknown computer worms.  |
Neural Comput. Appl.  |
2009 |
DBLP DOI BibTeX RDF |
Feature selection, Artificial neural networks, Worm detection, HIDS |
45 | Mohammad Reza Faghani, Hossein Saidi 0001 |
Social Networks' XSS Worms.  |
CSE (4)  |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson |
On the adaptive real-time detection of fast-propagating network worms.  |
J. Comput. Virol.  |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim |
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks.  |
ISPEC  |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Zesheng Chen, Chao Chen 0001, Chuanyi Ji |
Understanding Localized-Scanning Worms.  |
IPCCC  |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Yuriy Bulygin |
Epidemics of Mobile Worms.  |
IPCCC  |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Mohamed Abdelhafez, George F. Riley, Robert G. Cole, Nam Phamdo |
Modeling and Simulations of TCP MANET Worms.  |
PADS  |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Zhichun Li, Lanjia Wang, Yan Chen 0004, Zhi Fu |
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms.  |
ICNP  |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Scott E. Coull, Boleslaw K. Szymanski |
On the Development of an Internetwork-Centric Defense for Scanning Worms.  |
HICSS  |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Byungseung Kim, Saewoong Bahk |
Relative Entropy-Based Filtering of Internet Worms by Inspecting TCP SYN Retry Packets.  |
AINA Workshops (1)  |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham |
Feature Based Techniques for Auto-Detection of Novel Email Worms.  |
PAKDD  |
2007 |
DBLP DOI BibTeX RDF |
Email worm, classification technique, data mining, feature selection, Principal Component Analysis |
45 | Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu |
On capturing and containing E-mail worms.  |
IPCCC  |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Ihab Hamadeh, George Kesidis |
Toward a Framework for Forensic Analysis of Scanning Worms.  |
ETRICS  |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 827 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|