The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for worm with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1991 (15) 1992-1995 (15) 1996-1998 (22) 1999-2001 (28) 2002 (19) 2003 (147) 2004 (188) 2005 (124) 2006 (137) 2007 (115) 2008 (108) 2009 (83) 2010 (42) 2011 (28) 2012 (32) 2013 (34) 2014 (24) 2015 (23) 2016 (26) 2017 (21) 2018 (24) 2019 (30) 2020 (20) 2021 (37) 2022 (26) 2023 (31) 2024 (2)
Publication types (Num. hits)
article(378) incollection(2) inproceedings(1006) phdthesis(9) proceedings(6)
Venues (Conferences, Journals, ...)
OTM Workshops(203) WORM(46) CoRR(27) ICC(19) IEEE Secur. Priv.(16) RAID(15) INFOCOM(13) GLOBECOM(11) J. Comput. Virol.(11) CCS(10) ISI(10) ACSAC(9) Comput. Secur.(9) Computer(9) DSN(9) IEEE Trans. Parallel Distribut...(9) More (+10 of total 632)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 869 occurrences of 475 keywords

Results
Found 1425 publication records. Showing 1401 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
189Zesheng Chen, Chuanyi Ji A self-learning worm using importance scanning. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF importance scanning, self-learning worm, modeling, worm propagation
179David W. Richardson, Steven D. Gribble, Edward D. Lazowska The limits of global scanning worm detectors in the presence of background noise. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF scanning worms, worm models, computer security, worm detection, computer worms
148Xuxian Jiang, Dongyan Xu Profiling self-propagating worms via behavioral footprinting. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF behavioral footprinting, content signature, worm profiling, worms
147Frank Castaneda, Emre Can Sezer, Jun Xu 0003 WORM vs. WORM: preliminary study of an active counter-attack mechanism. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anti-worm, good worm, worm
146Dan Ellis Worm anatomy and model. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF network security, worm, network modeling, turing machine
140Yang Xiang, Qiang Li 0008 Online Tracing Scanning Worm with Sliding Window. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Propagation path, Online tracing, Detection window, Worm
139Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver The top speed of flash worms. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF flash worm, simulation, modeling, worms
136Jiaqing Luo, Bin Xiao 0001, Guobin Liu 0003, Qingjun Xiao, Shijie Zhou Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
134Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray Simulating realistic network worm traffic for worm warning system design and testing. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF code red, network modeling and simulation, slammer, worm detection systems, network security, worms
131David M. Nicol The impact of stochastic variance on worm propagation and detection. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF modeling, detection, worms, variance
125Wei Yu 0002, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao 0001 On Detecting Camouflaging Worm. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
122Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
122Minsoo Lee, Taeshik Shon, Kyuhyung Cho, Manhyun Chung, Jung-Taek Seo, Jongsub Moon An Approach for Classifying Internet Worms Based on Temporal Behaviors and Packet Flows. Search on Bibsonomy ICIC (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF taxonomy of worm, worm packet flows, ubiquitous security, temporal behavior
121Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia A behavioral approach to worm detection. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF behavioral signatures, descendant relation, network application architecture, network worms, intrusion detection
119Cliff Changchun Zou, Weibo Gong, Donald F. Towsley Code red worm propagation modeling and analysis. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF internet worm modeling, two-factor worm model, epidemic model
119Cliff Changchun Zou, Weibo Gong, Donald F. Towsley Worm propagation modeling and analysis under dynamic quarantine defense. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF dynamic quarantine, epidemic model, worm propagation
116Xiong Yang, Jing Lu, Yuguang Zhu, Ping Wang Simulation and Evaluation of a New Algorithm of Worm Detection and Containment. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Algorithm, Worm, Worm detection, Worm Containment
113Bin Wang 0017, Piao Ding, Jinfang Sheng P2P Anti-worm: Modeling and Analysis of a New Worm Counter-measurement Strategy. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
112Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson Preliminary results using scale-down to explore worm dynamics. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF scaledown, slammer, simulation, modeling, worms
112Milan Vojnovic, Ayalvadi J. Ganesh On the effectiveness of automatic patching. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF minimum broadcast curve, worm, patching, virus, epidemic, software updates, automatic updates
110Stuart E. Schechter, Michael D. Smith 0001 Access for sale: a new class of worm. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, cryptography, economics, incentives, worm, virus, threat modelling
106Songqing Chen, Xinyuan Wang 0005, Lei Liu 0021, Xinwen Zhang WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wormterminator, zero-day worms, virtual machine, worm containment, polymorphic worms
104Kumar Simkhada, Hiroshi Tsunoda, Yuji Waizumi, Yoshiaki Nemoto Differencing Worm Flows and Normal Flows for Automatic Generation of Worm Signatures. Search on Bibsonomy ISM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
104Xuxian Jiang, Xingquan Zhu 0001 vEye: behavioral footprinting for self-propagating worm detection and profiling. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Behavioral footprinting, Network security, Information systems, Sequence alignment, Worm detection
104Songjie Wei, Jelena Mirkovic Correcting congestion-based error in network telescope's observations of worm dynamics. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network telescope, observation error, worm spread
97Sapon Tanachaiwiwat, Ahmed Helmy Modeling and analysis of worm interactions (war of the worms). Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
95Sapon Tanachaiwiwat, Ahmed Helmy On the performance evaluation and prediction of encounter-based worm interactions based on node characteristics. Search on Bibsonomy Challenged Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encounter-based worms, delay-tolerant networks, worm
95A. M. El-Menshawy, Hossam El Deen Mostafa Faheem, T. Al-Arif, Z. Taha Agent Based Framework for Worm Detection. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi Agent-based systems, Worm detection
95David Moore 0001, Colleen Shannon, Kimberly C. Claffy Code-Red: a case study on the spread and victims of an internet worm. Search on Bibsonomy Internet Measurement Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Code-Red, Code-RedI, CodeRedI, CodeRedII, backscatter, security, worm, virus, epidemiology
94Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis Worm evolution tracking via timing analysis. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF methods of attribution, network security, internet worms
92Madihah Mohd Saudi, Emran Mohd Tamil, Andrea J. Cullen, Mike E. Woodward, Mohd Yamani Idna Bin Idris Reverse Engineering: EDOWA Worm Analysis and Classification. Search on Bibsonomy World Congress on Engineering (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF worm analysis, worm classification, Classification, payload
92Fengtao Xiao, Huaping Hu, Bo Liu 0014, Xin Chen A Novel Worm Detection Model Based on Host Packet Behavior Ranking. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF behavior based worm detection, user habit model, worm detection
92Chunhe Xia, Yunping Shi, Xiaojian Li, Wei Gao P2P worm detection based on application identification. Search on Bibsonomy Frontiers Comput. Sci. China The full citation details ... 2007 DBLP  DOI  BibTeX  RDF P2P worm, worm detection, application identification
91Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto Signature metrics for accurate and automated worm detection. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network worms, worm signatures, traffic analysis
88Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (viruses, worms, Trojan horses), Servers, Security and Protection
88Qi Liu, Jiwu Jing, Yuewu Wang An Improved Method of Hybrid Worm Simulation. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
88Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan, Honglan Lao Worm Traffic Modeling for Network Performance Analysis. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
88Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford Virtual Playgrounds for Worm Behavior Investigation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Observation and Analysis, Destructive Experiments, Internet Worms
88Cliff Changchun Zou, Weibo Gong, Donald F. Towsley, Lixin Gao 0001 The monitoring and early detection of internet worms. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network monitoring, internet worm, computer network security, early detection
88Darrell M. Kienzle, Matthew C. Elder Recent worms: a survey and trends. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF survey, malicious code
86Xinyu Yang, Yi Shi, Huijun Zhu Detection and location algorithm against local-worm. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF detection and location, worm detection, traffic characteristic
86Min Cai, Kai Hwang 0001, Jianping Pan 0001, Christos Papadopoulos WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed aggregation tree, cardinality counting, Network security, distributed hash table, traffic measurement, Internet worms, signature generation, worm containment
85Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi Modeling and Automated Containment of Worms. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment)
85Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel A preliminary investigation of worm infections in a bluetooth environment. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bluetooth, malware, worms
85Kurt Rohloff, Tamer Basar The detection of RCS worm epidemics. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
83Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Nigel H. Lin, Louis H. Lin A Behavior-Based Anti-Worm System. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Lambent Anti-Worm System (LAWS), Malicious worm, Mobile Agent, Intrusion Detection System (IDS)
82Parbati K. Manna, Shigang Chen, Sanjay Ranka Exact Modeling of Propagation for Permutation-Scanning Worms. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
79Fengtao Xiao, Huaping Hu, Xin Chen, Bo Liu 0014 ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
79Yu Yao, Liqiong Wu, Fuxiang Gao, Wei Yang, Ge Yu 0001 A WAW Model of P2P-based Anti-worm. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
79Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna Polymorphic Worm Detection Using Structural Information of Executables. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
79Abhinav Kamra, Hanhua Feng, Vishal Misra, Angelos D. Keromytis The effect of DNS delays on worm propagation in an IPv6 Internet. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
79David J. Malan, Michael D. Smith 0001 Host-based detection of worms through peer-to-peer cooperation. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Win32, native API, peer-to-peer, P2P, worms, windows, system calls, temporal consistency, system services
79Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham A taxonomy of computer worms. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mobile malicious code, taxonomy, motivation, attackers, computer worms
77Zhengtao Xiang, Yufeng Chen, Yabo Dong, Honglan Lao Analysis of Abnormalities of Worm Traffic for Obtaining Worm Detection Vectors. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
76Yang Xiang, Qiang Li 0008, Dong Guo 0002 Online Accumulation: Reconstruction of Worm Propagation Path. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Propagation path, Online tracing, Worm, Containment
76James Aspnes, Navin Rustagi, Jared Saia Worm Versus Alert: Who Wins in a Battle for Control of a Large-Scale Network?. Search on Bibsonomy OPODIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-certifying alert, epidemic processes, peer-to-peer, overlay network, worm, expander graphs
76Arno Wagner, Thomas Dübendorfer, Roman Hiestand, Christoph Göldi, Bernhard Plattner A Fast Worm Scan Detection Tool for VPN Congestion Avoidance. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bro, detection, worm, Scan, gateway, VPN
76Alan Roberts, Antonios Symvonis A General Method for Deflection Worm Routing on Meshes Based on Packet Routing Algorithms. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF on-line routing algorithm, worm routing, packet routing, permutation routing, Deflection routing, mesh connected computer
76Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting A hybrid quarantine defense. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network modeling and simulation, worm detection systems, network security, worms
74Miad Faezipour, Mehrdad Nourani, Rina Panigrahy A hardware platform for efficient worm outbreak detection. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF shared counters, worm outbreak, hashing, false positive, Network Intrusion Detection System, false negative, polymorphic worm
74David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song Design space and analysis of worm defense strategies. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF defense strategy analysis, local containment, proactive protection, worm taxonomy, worms, blacklisting, antibody, worm propagation
73Shigang Chen, Yong Tang 0004 Slowing Down Internet Worms. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
70Yuewu Wang, Peng Liu 0005, Jiwu Jing, Xiaoqi Jia A Multi-level Fidelity-Preserving Bandwidth-Limited Worm Simulation Model and Its Application. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino Extracting Worm-Infected Hosts Using White List. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70Narisa Zhao, Xianfeng Zhang The Worm Propagation Model and Control Strategy Based on Distributed Honeynet. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
70Maziar M. Nekovee Modeling the Spread of Worm Epidemics in Vehicular Ad Hoc Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
70Linda Briesemeister, Phillip A. Porras Automatically deducing propagation sequences that circumvent a collaborative worm defense. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
70Ping Wang, Binxing Fang, Xiao-chun Yun Model and Estimation of Worm Propagation Under Network Partition. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
70Guofei Gu, Monirul Islam Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley Worm Detection, Early Warning and Response Based on Local Victim Information. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
69Jose Nazario Where the worms aren't. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF securty, worms, vulnerabilities, botnets, exploits
68Dan Wu, Dongyang Long, Changji Wang, Zhanpeng Guan Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy. Search on Bibsonomy ICA3PP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Jingbo Hao, Jianping Yin A Preliminary Study of Coordinated Worm Networks. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF coordinated worm network, peer-to-peer, application, construction
67Yi Yang 0002, Sencun Zhu, Guohong Cao Improving sensor network immunity under worm attacks: a software diversity approach. Search on Bibsonomy MobiHoc The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor worm, graph coloring, sensor network security, percolation theory, software diversity
67Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada Optimum Identification of Worm-Infected Hosts. Search on Bibsonomy IPOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sampling, detection, Worm, optimum design
67Cliff Changchun Zou, Donald F. Towsley, Weibo Gong Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-mail worm, worm modeling, simulation, Network security, epidemic model
67Arno Wagner, Thomas Dübendorfer, Bernhard Plattner, Roman Hiestand Experiences with worm propagation simulations. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF simulation, latency, bandwidth, internet worms
65Hanxun Zhou, Yingyou Wen, Hong Zhao Detecting early worm propagation based on entropy. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chebyshev's inequality, network security, entropy, worm, worm detection
65Colleen Shannon, David Moore 0001 The Spread of the Witty Worm. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Witty worm, Internet worm
64Chen Bo, Binxing Fang, Xiao-chun Yun Adaptive Method for Monitoring Network and Early Detection of Internet Worms. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
61Wei Shi, Qiang Li 0008, Jian Kang, Dong Guo 0002 Reconstruction of Worm Propagation Path by Causality. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
61Yejiang Zhang, Zhitang Li, Zhengbing Hu, Hao Tu, Huaiqing Lin A P2P E-commerce Related Network Security Issue: P2P Worm. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Peer-to-Peer, Invasive software
61Zesheng Chen, Chao Chen 0001 A Closed-Form Expression for Static Worm-Scanning Strategies. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Xiaofeng Nie, Yuewu Wang, Jiwu Jing, Qi Liu Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Hanchuan Peng, Fuhui Long, Eugene W. Myers Straightening Worm Images. Search on Bibsonomy ISBI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li 0001 Investigating the Impact of Real-World Factors on Internet Worm Propagation. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Sapon Tanachaiwiwat, Ahmed Helmy Computer worm ecology in encounter-based networks. Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
61Monirul Islam Sharif, George F. Riley, Wenke Lee Comparative Study between Analytical Models and Packet-Level Worm Simulations. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Songjie Wei, Jelena Mirkovic, D. Martin Swany Distributed Worm Simulation with a Realistic Internet Model. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Urupoj Kanlayasiri, Surasak Sanguanpong Key Factors Influencing Worm Infection in Enterprise Networks. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma 0001 Worm Propagation Modeling and Analysis on Network. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61David M. Nicol, Michael Liljenstam Models and Analysis of Active Worm Defense. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Michael Liljenstam, David M. Nicol Comparing Passive and Active Worm Defenses. Search on Bibsonomy QEST The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
61Stavros Christodoulakis, Daniel Alexander Ford Retrieval Performance Versus Disc Space Utilization on WORM Optical Discs. Search on Bibsonomy SIGMOD Conference The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
61Cliff Changchun Zou, Lixin Gao 0001, Weibo Gong, Donald F. Towsley Monitoring and early warning for internet worms. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF monitoring, early detection, worm propagation
60Niels Provos, Joe McClain, Ke Wang 0009 Search worms. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF index filtering, security, search, signature, internet worms
60David J. Malan, Michael D. Smith 0001 Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS
60Vern Paxson An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Mohammad Mannan, Paul C. van Oorschot On instant messaging worms, analysis and countermeasures. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF instant messaging worms, scale-free networks
59Attila Ondi, Richard Ford How good is good enough? Metrics for worm/anti-worm evaluation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
59Mustafa Jarrar, Anne Salaün WORM CoRe 2003 PC Co-chairs' Message. Search on Bibsonomy OTM Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1401 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license