The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for infect with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-2005 (21) 2006-2007 (23) 2008-2017 (15) 2019-2022 (3)
Publication types (Num. hits)
article(9) inproceedings(53)
Venues (Conferences, Journals, ...)
DSN(3) WORM(3) FBIT(2) IEEE Secur. Priv.(2) ISCIS(2) AAMAS(1) ACIS-ICIS(1) ACM Southeast Regional Confere...(1) ADHOC-NOW(1) ANCS(1) ATC(1) BNCOD(1) CCECE(1) CCS(1) CEEMAS(1) CIDM(1) More (+10 of total 55)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 66 occurrences of 53 keywords

Results
Found 62 publication records. Showing 62 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
70Anubhab Baksi, Dhiman Saha, Sumanta Sarkar To infect or not to infect: a critical analysis of infective countermeasures in fault attacks. Search on Bibsonomy J. Cryptogr. Eng. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
70Anubhab Baksi, Dhiman Saha, Sumanta Sarkar To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
35Krzysztof Domino, Jaroslaw Adam Miszczak Will you infect me with your opinion? Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
35Kiruba Sankaran Subramani, Angelos Antonopoulos 0002, Ahmed Attia Abotabl, Aria Nosratinia, Yiorgos Makris INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network. Search on Bibsonomy HOST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Huy Hang, Adnan Bashir, Michalis Faloutsos, Christos Faloutsos, Tudor Dumitras "Infect-me-not": A user-centric and site-centric study of web-based malware. Search on Bibsonomy Networking The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
35Martina Lindorfer, Matthias Neumayr, Juan Caballero, Christian Platzer Cross-platform malware: write once, infect everywhere. Search on Bibsonomy CCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
35Mohammad Reza Faghani, Uyen Trang Nguyen Socellbot: A new botnet design to infect smartphones via online social networking. Search on Bibsonomy CCECE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
35Peter Teufl, Udo Payer, Michael Amling, Martin Godec, Stefan Ruff, Gerhard Scheikl, Gernot Walzl InFeCT - Network Traffic Classification. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network traffic classification, payload histogram, machine learning, feature extraction, tool, open source, policy verification
33David Moore 0001, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver Inside the Slammer Worm. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Slammer, Sapphire, attack, worm, infect
33Elias Levy The Making of a Spam Zombie Army: Dissecting the Sobig Worms. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sobig, spam, attack, worm, infect
33Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Songqing Chen, Xinyuan Wang 0005, Lei Liu 0021, Xinwen Zhang WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wormterminator, zero-day worms, virtual machine, worm containment, polymorphic worms
33Artemios G. Voyiatzis, Dimitrios N. Serpanos Pulse: A Class of Super-Worms against Network Infrastructure. Search on Bibsonomy ICDCS Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Soumya Banerjee 0003, Melanie E. Moses A Hybrid Agent Based and Differential Equation Model of Body Size Effects on Pathogen Replication and Immune System Response. Search on Bibsonomy ICARIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Travis Atkison Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF n-gram analysis, rogue software detection, information retrieval, randomized projections, cosine similarity
16Mohammad Reza Faghani, Hossein Saidi 0001 Social Networks' XSS Worms. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Susanna L. Lamers, Marco Salemi, Michael S. McGrath, Gary B. Fogel Prediction of R5, X4, and R5X4 HIV-1 Coreceptor Usage with Evolved Neural Networks. Search on Bibsonomy IEEE ACM Trans. Comput. Biol. Bioinform. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF phenotype prediction, tropism, dual-tropic viruses, evolutionary computation, artificial neural networks, Computational intelligence, HIV, AIDS
16Yi Wang 0035, Shyam Kapadia, Bhaskar Krishnamachari Infection spread in wireless networks with random and adversarial node mobilities. Search on Bibsonomy MobilityModels The full citation details ... 2008 DBLP  DOI  BibTeX  RDF infection spread, wireless network, random, adversarial, node mobility
16Yu Zhang 0003, Tao Li, Jia Sun, Renchao Qin An FSM-Based Approach for Malicious Code Detection Using the Self-Relocation Gene. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF self-relocation gene, finite-state machine, malicious code detection
16Sirui Yang, Hai Jin 0001, Xiaofei Liao, Sanmin Liu Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Rose Epidemic, Modeling, Social Network, Portable Device
16Kouji Harada, Yoshiteru Ishida Fatal Mutations in HIV Population as an Influential Factor for an Onset of AIDS. Search on Bibsonomy KES (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fatal Muation, Anitignic Diversity Threshold, HIV
16Andrew W. Hill, Robert P. Guralnick Distributed Systems and Automated Biodiversity Informatics: Genomic Analysis and Geographic Visualization of Disease Evolution. Search on Bibsonomy BNCOD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Geophylogenies, H5N1 Avian Influenza, Human health, HyPhy, Viral evolution, Google Earth, Infectious Diseases, Biodiversity Informatics
16Yonesy F. Nunez Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Shigang Chen, Yong Tang 0004 DAW: A Distributed Antiworm System. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rate-limit algorithms, network security, Internet worms
16Srinivas Shakkottai, R. Srikant 0001 Peer to Peer Networks for Defense Against Internet Worms. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Elizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Martin Rehák, Michal Pechoucek, Jan Tozicka, Magdalena Prokopová, David Medvigy, Jiri Novotný Agent-Based Network Protection Against Malicious Code. Search on Bibsonomy CEEMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Clint Feher, Chanan Glezer, Yuval Shahar, Yuval Elovici Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. Search on Bibsonomy CIDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Luke Bellamy, Damien Hutchinson, Jason Wells User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Kuo-Yuan Hwa, Wan-Man Lin, Yung-I Hou, Trai-Ming Yeh Molecular Mimicry between SARS Coronavirus Spike Protein and Human Protein. Search on Bibsonomy FBIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ambrose Jong, Chun-Hua Wu, Wensheng Zhou, Han-Min Chen, Sheng-He Huang Genomic Survey of Cryptococcus neoformans-Induced Gene Expression Profiling in Human Brain Micro-Vascular Endothelial Cells. Search on Bibsonomy FBIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Christos Anagnostopoulos, Evangelos Zervas, Stathes Hadjiefthymiades An epidemiological model for semantics dissemination. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ad hoc network information dissemination, context awaremess, autonomous systems, epidemics
16Taro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada Early containment of worms using dummy addresses and connection trace back. Search on Bibsonomy ICPADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Barbara Strug, Andrzej Bielecki, Marzena Bielecka Evolutionary Viral-type Algorithm for the Inverse Problem for Iterated Function Systems. Search on Bibsonomy PPAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici Host Based Intrusion Detection using Machine Learning. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Wei Yu 0002, Nan Zhang 0004, Wei Zhao 0001 Self-adaptive Worms and Countermeasures. Search on Bibsonomy SSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Game theory, Worm
16Fernando C. Colón Osorio, Zachi Klopman An initial analysis and presentation of malware exhibiting swarm-like behavior. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF swarm worms, swarm intelligence, malware, emergent behavior, internet worms
16Linda Briesemeister, Phillip A. Porras Automatically deducing propagation sequences that circumvent a collaborative worm defense. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel A preliminary investigation of worm infections in a bluetooth environment. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bluetooth, malware, worms
16Ihab Hamadeh, George Kesidis Toward a Framework for Forensic Analysis of Scanning Worms. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Amit Shabtay, Zinovi Rabinovich, Jeffrey S. Rosenschein Behaviosites: A Novel Paradigm for Affecting Distributed Behavior. Search on Bibsonomy ESOA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Guanling Chen, Robert S. Gray Simulating non-scanning worms on peer-to-peer networks. Search on Bibsonomy Infoscale The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan Malware prevalence in the KaZaA file-sharing network. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF KaZaA, virus prevalence, peer-to-peer
16Amit Shabtay, Zinovi Rabinovich, Jeffrey S. Rosenschein Behaviosites: a novel paradigm for affecting distributed behavior. Search on Bibsonomy AAMAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski Detecting Stealth Software with Strider GhostBuster. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis A Graph-Theoretic Network Security Game. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Kevin R. B. Butler, Patrick D. McDaniel Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis Defending against hitlist worms using network address space randomization. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, randomization, traffic analysis, internet worms
16Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis Requirements on Worm Mitigation Technologies in MANETS. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Erol Gelenbe Keeping Viruses Under Control. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Erol Gelenbe Keeping Viruses Under Control. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Conflicts between Agents, Network Security, Computer Viruses
16Antti Tikkanen, Teemupekka Virtanen Early Warning for Network Worms. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Tassos Dimitriou, Sotiris E. Nikoletseas, Paul G. Spirakis Analysis of the Information Propagation Time Among Mobile Hosts. Search on Bibsonomy ADHOC-NOW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Derek Dreyer A type system for well-founded recursion. Search on Bibsonomy POPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF yype systems, recursion, effect systems, recursive modules
16Stuart E. Schechter, Jaeyeon Jung, Arthur W. Berger Fast Detection of Scanning Worm Infections. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Shigang Chen, Yong Tang 0004 Slowing Down Internet Worms. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Ram Dantu, João W. Cangussu, Arun Yelimeli Dynamic Control of Worm Propagation. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Stuart E. Schechter, Michael D. Smith 0001 Access for sale: a new class of worm. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, cryptography, economics, incentives, worm, virus, threat modelling
16Jo Ellen Moore, Lisa A. Burke How to turn around 'turnover culture' in IT. Search on Bibsonomy Commun. ACM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Martin Rumpf, Robert Strzodka Level set segmentation in graphics hardware. Search on Bibsonomy ICIP (3) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Shankara Narayanan Krishna, Raghavan Rama 0001 Insertion-Deletion P Systems. Search on Bibsonomy DNA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Donald A. B. Lindberg In praise of computing. Search on Bibsonomy History of Medical Informatics The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #62 of 62 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license