|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 66 occurrences of 53 keywords
|
|
|
Results
Found 62 publication records. Showing 62 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
70 | Anubhab Baksi, Dhiman Saha, Sumanta Sarkar |
To infect or not to infect: a critical analysis of infective countermeasures in fault attacks. |
J. Cryptogr. Eng. |
2020 |
DBLP DOI BibTeX RDF |
|
70 | Anubhab Baksi, Dhiman Saha, Sumanta Sarkar |
To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
35 | Krzysztof Domino, Jaroslaw Adam Miszczak |
Will you infect me with your opinion? |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Kiruba Sankaran Subramani, Angelos Antonopoulos 0002, Ahmed Attia Abotabl, Aria Nosratinia, Yiorgos Makris |
INFECT: INconspicuous FEC-based Trojan: A hardware attack on an 802.11a/g wireless network. |
HOST |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Huy Hang, Adnan Bashir, Michalis Faloutsos, Christos Faloutsos, Tudor Dumitras |
"Infect-me-not": A user-centric and site-centric study of web-based malware. |
Networking |
2016 |
DBLP DOI BibTeX RDF |
|
35 | Martina Lindorfer, Matthias Neumayr, Juan Caballero, Christian Platzer |
Cross-platform malware: write once, infect everywhere. |
CCS |
2013 |
DBLP DOI BibTeX RDF |
|
35 | Mohammad Reza Faghani, Uyen Trang Nguyen |
Socellbot: A new botnet design to infect smartphones via online social networking. |
CCECE |
2012 |
DBLP DOI BibTeX RDF |
|
35 | Peter Teufl, Udo Payer, Michael Amling, Martin Godec, Stefan Ruff, Gerhard Scheikl, Gernot Walzl |
InFeCT - Network Traffic Classification. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
network traffic classification, payload histogram, machine learning, feature extraction, tool, open source, policy verification |
33 | David Moore 0001, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver |
Inside the Slammer Worm. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
Slammer, Sapphire, attack, worm, infect |
33 | Elias Levy |
The Making of a Spam Zombie Army: Dissecting the Sobig Worms. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
sobig, spam, attack, worm, infect |
33 | Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei |
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Songqing Chen, Xinyuan Wang 0005, Lei Liu 0021, Xinwen Zhang |
WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. |
ANCS |
2006 |
DBLP DOI BibTeX RDF |
wormterminator, zero-day worms, virtual machine, worm containment, polymorphic worms |
33 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
Pulse: A Class of Super-Worms against Network Infrastructure. |
ICDCS Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Soumya Banerjee 0003, Melanie E. Moses |
A Hybrid Agent Based and Differential Equation Model of Body Size Effects on Pathogen Replication and Immune System Response. |
ICARIS |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Travis Atkison |
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications. |
ACM Southeast Regional Conference |
2009 |
DBLP DOI BibTeX RDF |
n-gram analysis, rogue software detection, information retrieval, randomized projections, cosine similarity |
16 | Mohammad Reza Faghani, Hossein Saidi 0001 |
Social Networks' XSS Worms. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Susanna L. Lamers, Marco Salemi, Michael S. McGrath, Gary B. Fogel |
Prediction of R5, X4, and R5X4 HIV-1 Coreceptor Usage with Evolved Neural Networks. |
IEEE ACM Trans. Comput. Biol. Bioinform. |
2008 |
DBLP DOI BibTeX RDF |
phenotype prediction, tropism, dual-tropic viruses, evolutionary computation, artificial neural networks, Computational intelligence, HIV, AIDS |
16 | Yi Wang 0035, Shyam Kapadia, Bhaskar Krishnamachari |
Infection spread in wireless networks with random and adversarial node mobilities. |
MobilityModels |
2008 |
DBLP DOI BibTeX RDF |
infection spread, wireless network, random, adversarial, node mobility |
16 | Yu Zhang 0003, Tao Li, Jia Sun, Renchao Qin |
An FSM-Based Approach for Malicious Code Detection Using the Self-Relocation Gene. |
ICIC (1) |
2008 |
DBLP DOI BibTeX RDF |
self-relocation gene, finite-state machine, malicious code detection |
16 | Sirui Yang, Hai Jin 0001, Xiaofei Liao, Sanmin Liu |
Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
Rose Epidemic, Modeling, Social Network, Portable Device |
16 | Kouji Harada, Yoshiteru Ishida |
Fatal Mutations in HIV Population as an Influential Factor for an Onset of AIDS. |
KES (3) |
2008 |
DBLP DOI BibTeX RDF |
Fatal Muation, Anitignic Diversity Threshold, HIV |
16 | Andrew W. Hill, Robert P. Guralnick |
Distributed Systems and Automated Biodiversity Informatics: Genomic Analysis and Geographic Visualization of Disease Evolution. |
BNCOD |
2008 |
DBLP DOI BibTeX RDF |
Geophylogenies, H5N1 Avian Influenza, Human health, HyPhy, Viral evolution, Google Earth, Infectious Diseases, Biodiversity Informatics |
16 | Yonesy F. Nunez |
Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Shigang Chen, Yong Tang 0004 |
DAW: A Distributed Antiworm System. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
rate-limit algorithms, network security, Internet worms |
16 | Srinivas Shakkottai, R. Srikant 0001 |
Peer to Peer Networks for Defense Against Internet Worms. |
IEEE J. Sel. Areas Commun. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Elizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens |
Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Martin Rehák, Michal Pechoucek, Jan Tozicka, Magdalena Prokopová, David Medvigy, Jiri Novotný |
Agent-Based Network Protection Against Malicious Code. |
CEEMAS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Clint Feher, Chanan Glezer, Yuval Shahar, Yuval Elovici |
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. |
CIDM |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Luke Bellamy, Damien Hutchinson, Jason Wells |
User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Kuo-Yuan Hwa, Wan-Man Lin, Yung-I Hou, Trai-Ming Yeh |
Molecular Mimicry between SARS Coronavirus Spike Protein and Human Protein. |
FBIT |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ambrose Jong, Chun-Hua Wu, Wensheng Zhou, Han-Min Chen, Sheng-He Huang |
Genomic Survey of Cryptococcus neoformans-Induced Gene Expression Profiling in Human Brain Micro-Vascular Endothelial Cells. |
FBIT |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Christos Anagnostopoulos, Evangelos Zervas, Stathes Hadjiefthymiades |
An epidemiological model for semantics dissemination. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
ad hoc network information dissemination, context awaremess, autonomous systems, epidemics |
16 | Taro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada |
Early containment of worms using dummy addresses and connection trace back. |
ICPADS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Barbara Strug, Andrzej Bielecki, Marzena Bielecka |
Evolutionary Viral-type Algorithm for the Inverse Problem for Iterated Function Systems. |
PPAM |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici |
Host Based Intrusion Detection using Machine Learning. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Wei Yu 0002, Nan Zhang 0004, Wei Zhao 0001 |
Self-adaptive Worms and Countermeasures. |
SSS |
2006 |
DBLP DOI BibTeX RDF |
Game theory, Worm |
16 | Fernando C. Colón Osorio, Zachi Klopman |
An initial analysis and presentation of malware exhibiting swarm-like behavior. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
swarm worms, swarm intelligence, malware, emergent behavior, internet worms |
16 | Linda Briesemeister, Phillip A. Porras |
Automatically deducing propagation sequences that circumvent a collaborative worm defense. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel |
A preliminary investigation of worm infections in a bluetooth environment. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
Bluetooth, malware, worms |
16 | Ihab Hamadeh, George Kesidis |
Toward a Framework for Forensic Analysis of Scanning Worms. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Amit Shabtay, Zinovi Rabinovich, Jeffrey S. Rosenschein |
Behaviosites: A Novel Paradigm for Affecting Distributed Behavior. |
ESOA |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Guanling Chen, Robert S. Gray |
Simulating non-scanning worms on peer-to-peer networks. |
Infoscale |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan |
Malware prevalence in the KaZaA file-sharing network. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
KaZaA, virus prevalence, peer-to-peer |
16 | Amit Shabtay, Zinovi Rabinovich, Jeffrey S. Rosenschein |
Behaviosites: a novel paradigm for affecting distributed behavior. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski |
Detecting Stealth Software with Strider GhostBuster. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
A Graph-Theoretic Network Security Game. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Kevin R. B. Butler, Patrick D. McDaniel |
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis |
Defending against hitlist worms using network address space randomization. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
network security, randomization, traffic analysis, internet worms |
16 | Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis |
Requirements on Worm Mitigation Technologies in MANETS. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Erol Gelenbe |
Keeping Viruses Under Control. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Erol Gelenbe |
Keeping Viruses Under Control. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
Conflicts between Agents, Network Security, Computer Viruses |
16 | Antti Tikkanen, Teemupekka Virtanen |
Early Warning for Network Worms. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Tassos Dimitriou, Sotiris E. Nikoletseas, Paul G. Spirakis |
Analysis of the Information Propagation Time Among Mobile Hosts. |
ADHOC-NOW |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Derek Dreyer |
A type system for well-founded recursion. |
POPL |
2004 |
DBLP DOI BibTeX RDF |
yype systems, recursion, effect systems, recursive modules |
16 | Stuart E. Schechter, Jaeyeon Jung, Arthur W. Berger |
Fast Detection of Scanning Worm Infections. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Shigang Chen, Yong Tang 0004 |
Slowing Down Internet Worms. |
ICDCS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Ram Dantu, João W. Cangussu, Arun Yelimeli |
Dynamic Control of Worm Propagation. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Stuart E. Schechter, Michael D. Smith 0001 |
Access for sale: a new class of worm. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
security, cryptography, economics, incentives, worm, virus, threat modelling |
16 | Jo Ellen Moore, Lisa A. Burke |
How to turn around 'turnover culture' in IT. |
Commun. ACM |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Martin Rumpf, Robert Strzodka |
Level set segmentation in graphics hardware. |
ICIP (3) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Shankara Narayanan Krishna, Raghavan Rama 0001 |
Insertion-Deletion P Systems. |
DNA |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Donald A. B. Lindberg |
In praise of computing. |
History of Medical Informatics |
1987 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #62 of 62 (100 per page; Change: )
|
|