The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for worms with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1997 (21) 1998-2002 (21) 2003 (32) 2004 (67) 2005 (129) 2006 (115) 2007 (124) 2008 (94) 2009 (60) 2010 (26) 2011 (22) 2012-2013 (27) 2014 (16) 2015-2016 (20) 2017-2019 (22) 2020-2022 (18) 2023-2024 (13)
Publication types (Num. hits)
article(216) incollection(8) inproceedings(603)
Venues (Conferences, Journals, ...)
WORM(35) IEEE Secur. Priv.(18) ACSAC(15) RAID(15) CoRR(14) Comput. Secur.(13) CCS(9) DIMVA(9) ICC(9) IEEE Trans. Parallel Distribut...(9) INFOCOM(9) IPCCC(9) ISI(9) J. Comput. Virol.(8) PADS(8) Computer(7) More (+10 of total 437)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 783 occurrences of 399 keywords

Results
Found 836 publication records. Showing 827 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
164Hanxun Zhou, Yingyou Wen, Hong Zhao Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF benign worm, two-factor worm model, network security
149Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi Modeling and Automated Containment of Worms. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (viruses, worms, Trojan horses), (Internet scanning worms), (stochastic worm modeling), (branching process model), (preference scanning worms), (automatic worm containment)
135David J. Malan, Michael D. Smith 0001 Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS
105Songqing Chen, Xinyuan Wang 0005, Lei Liu 0021, Xinwen Zhang WormTerminator: an effective containment of unknown and polymorphic fast spreading worms. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wormterminator, zero-day worms, virtual machine, worm containment, polymorphic worms
98Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis An integrated approach to detection of fast and slow scanning worms. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF detection interval, intrusion detection, anomaly detection, Bayesian inference, worms, probability model
91Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada Detection of Silent Worms using Anomaly Connection Tree. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
91Wei Yu 0002, Nan Zhang 0004, Wei Zhao 0001 Self-adaptive Worms and Countermeasures. Search on Bibsonomy SSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Game theory, Worm
91Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada ACTM: Anomaly Connection Tree Method to detect Silent Worms. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
89Xiang Fan, Yang Xiang 0001 Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Modeling, Network Security, Worms, Propagation, Invasive Software
89Niels Provos, Joe McClain, Ke Wang 0009 Search worms. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF index filtering, security, search, signature, internet worms
87Fernando C. Colón Osorio, Zachi Klopman An initial analysis and presentation of malware exhibiting swarm-like behavior. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF swarm worms, swarm intelligence, malware, emergent behavior, internet worms
82Luke Bellamy, Damien Hutchinson, Jason Wells User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
82Taro Inaba, Nobutaka Kawaguchi, Shinya Tahara, Hiroshi Shigeno, Ken-ichi Okada Early containment of worms using dummy addresses and connection trace back. Search on Bibsonomy ICPADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
82Guanling Chen, Robert S. Gray Simulating non-scanning worms on peer-to-peer networks. Search on Bibsonomy Infoscale The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
82Yousof Al-Hammadi, Christopher Leckie Anomaly detection for Internet worms. Search on Bibsonomy Integrated Network Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
82Artemios G. Voyiatzis, Dimitrios N. Serpanos Pulse: A Class of Super-Worms against Network Infrastructure. Search on Bibsonomy ICDCS Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
80Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collaboration, Dynamic Programming, Worms, Control Theory
80Lorenzo Cavallaro, Andrea Lanzi, Luca Mayer, Mattia Monga LISABETH: automated content-based signature generator for zero-day polymorphic worms. Search on Bibsonomy SESS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automatic content-based signature generation, intrusion detection, network security, polymorphic worms
80Maziar M. Nekovee Epidemic Spreading of Computer Worms in Fixed Wireless Networks. Search on Bibsonomy BIOWIRE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless Computer Worms, Epidemic Spreading, Complex Networks, Modelling and Simulations
80David J. Malan, Michael D. Smith 0001 Host-based detection of worms through peer-to-peer cooperation. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Win32, native API, peer-to-peer, P2P, worms, windows, system calls, temporal consistency, system services
80Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver The top speed of flash worms. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF flash worm, simulation, modeling, worms
73Zhenyun Zhuang, Ying Li, Zesheng Chen PAIDS: A Proximity-Assisted Intrusion Detection System for Unidentified Worms. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
73Cliff Changchun Zou, Donald F. Towsley, Weibo Gong Modeling and Simulation Study of the Propagation and Defense of Internet E-mail Worms. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-mail worm, worm modeling, simulation, Network security, epidemic model
73Yi Tang 0001, Xiangning Dong Anting: An Adaptive Scanning Method for Computer Worms. Search on Bibsonomy Web Intelligence The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
73Yong Tang 0004, Shigang Chen Defending against Internet worms: a signature-based approach. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
73Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
71Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H. Spafford Virtual Playgrounds for Worm Behavior Investigation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion Observation and Analysis, Destructive Experiments, Internet Worms
71Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis Defending against hitlist worms using network address space randomization. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, randomization, traffic analysis, internet worms
71Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang A study of mass-mailing worms. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network security, traffic analysis, internet worms
64Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos Treating scalability and modelling human countermeasures against local preference worms via gradient models. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
64Fangqi Sun, Liang Xu, Zhendong Su 0001 Client-Side Detection of XSS Worms by Monitoring Payload Propagation. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cross-site scripting worm, client-side detection, Web application security
64Liang Xie 0002, Hui Song, Sencun Zhu On the Effectiveness of Internal Patching Against File-Sharing Worms. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Chao-sheng Feng, Zhiguang Qin, Laurence Cuthbet, Laurissa N. Tokarchuk Propagation Model of Active Worms in P2P Networks. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Parbati K. Manna, Shigang Chen, Sanjay Ranka Exact Modeling of Propagation for Permutation-Scanning Worms. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Parbati K. Manna, Sanjay Ranka, Shigang Chen DAWN: A Novel Strategy for Detecting ASCII Worms in Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary The Quest for Multi-headed Worms. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
64Srinivas Shakkottai, R. Srikant 0001 Peer to Peer Networks for Defense Against Internet Worms. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
64Yong Tang, Xicheng Lu, Bin Xiao 0001 Generating Simplified Regular Expression Signatures for Polymorphic Worms. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
64Theodor Richardson, Chin-Tser Huang Containing Hitlist-Based Worms with Polymorphic Signatures. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
64Sapon Tanachaiwiwat, Ahmed Helmy Modeling and analysis of worm interactions (war of the worms). Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
64Jingbo Hao, Jianping Yin, Boyun Zhang A Computational Model of Computer Worms Based on Persistent Turing Machines. Search on Bibsonomy IEEE ICCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
64Guanhua Yan, Stephan J. Eidenbenz Bluetooth Worms: Models, Dynamics, and Defense Implications. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
64Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 Vigilante: end-to-end containment of internet worms. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-certifying alerts, data flow analysis, control flow analysis, worm containment
62Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto Signature metrics for accurate and automated worm detection. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network worms, worm signatures, traffic analysis
62Kurt Rohloff, Tamer Basar Deterministic and stochastic models for the detection of random constant scanning worms. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Worms, hypothesis testing, stochastic analysis, epidemic modeling
62Yong Tang 0004, Shigang Chen An Automated Signature-Based Approach against Polymorphic Internet Worms. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Internet security, worm detection, polymorphic worms
62Justin Ma, Geoffrey M. Voelker, Stefan Savage Self-stopping worms. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-stop, malware, worms, distributed protocols
62Mohammad Mannan, Paul C. van Oorschot On instant messaging worms, analysis and countermeasures. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF instant messaging worms, scale-free networks
60Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms
59Dhabaleswar K. Panda 0001 Global reduction in wormhole k-ary n-cube networks with multidestination exchange worms. Search on Bibsonomy IPPS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF global reduction, wormhole k-ary n-cube networks, multidestination exchange worms, multidestination message passing mechanism, pairwise exchange worms, complete global reduction, barrier synchronization operations, message passing interface standard, unicast-based message passing, communication startup time, data size, fast global reduction, message passing, synchronisation, hypercube networks, system size
55Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 Vigilante: End-to-end containment of Internet worm epidemics. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF self-certifying alerts, vulnerability condition slicing, program analysis, dynamic data-flow analysis, Worm containment
55A. M. El-Menshawy, Hossam El Deen Mostafa Faheem, T. Al-Arif, Z. Taha Agent Based Framework for Worm Detection. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi Agent-based systems, Worm detection
55Hatem M. El-Boghdadi, Mohamed Bohalfaeh Code Generation: On the Scheduling of DAGs Using Worm-Partition. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Oliver Sharma, Mark A. Girolami, Joseph S. Sventek Detecting worm variants using machine learning. Search on Bibsonomy CoNEXT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Yuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata A New Approach to Early Detection of an Unknown Worm. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Tao Gong, Zixing Cai Anti-worm Immunization of Web System Based on Normal Model and BP Neural Network. Search on Bibsonomy ISNN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong E-mail Worm Detection Using the Analysis of Behavior. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Christopher Krügel, Engin Kirda, Darren Mutz, William K. Robertson, Giovanni Vigna Polymorphic Worm Detection Using Structural Information of Executables. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Shou-Chuan Lai, Wen-Chu Kuo, Mu-Cheng Hsie Defending against Internet Worm-like Infestations. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
55Rajeev Sivaram, Ram Kesavan, Dhabaleswar K. Panda 0001, Craig B. Stunkel Architectural Support for Efficient Multicasting in Irregular Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cut-through routing, performance evaluation, multicast, broadcast, collective communication, Parallel computer architecture, irregular networks, switch-based networks
55Guanhua Yan, Stephan J. Eidenbenz Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
55Nikzad Babaii Rizvandi, Aleksandra Pizurica, Wilfried Philips Machine vision detection of isolated and overlapped nematode worms using skeleton analysis. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada A Distributed Detection of Hit-List Worms. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
55Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson On the Adaptive Real-Time Detection of Fast-Propagating Network Worms. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Matthew Van Gundy, Hao Chen 0003, Zhendong Su 0001, Giovanni Vigna Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Hyundo Park, Heejo Lee Detecting Unknown Worms Using Randomness Check. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi Modeling and Automated Containment of Worms. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55James Newsome, Brad Karp, Dawn Xiaodong Song Polygraph: Automatically Generating Signatures for Polymorphic Worms. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Ping Wang, Binxing Fang, Xiao-chun Yun A New User-Habit Based Approach for Early Warning of Worms. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55David Whyte, Paul C. van Oorschot, Evangelos Kranakis Detecting Intra-enterprise Scanning Worms based on Address Resolution. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Florian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith Digging For Worms, Fishing For Answers. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
53Joe Szabo, John Aycock, Randal Acton, Jörg Denzinger The tale of the weather worm. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, emergencies, worms, geolocation, disasters, information policy
53David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn Xiaodong Song Design space and analysis of worm defense strategies. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF defense strategy analysis, local containment, proactive protection, worm taxonomy, worms, blacklisting, antibody, worm propagation
53Arno Wagner, Thomas Dübendorfer, Bernhard Plattner, Roman Hiestand Experiences with worm propagation simulations. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF simulation, latency, bandwidth, internet worms
52David M. Nicol Efficient simulation of Internet worms. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF simulation, modeling, denial-of-service, Worms
52George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnovic A model of the spread of randomly scanning Internet worms that saturate access links. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF communications/computer networking, modeling, Internet worms, epidemiology
52Nikzad Babaii Rizvandi, Aleksandra Pizurica, Wilfried Philips Automatic Individual Detection and Separation of Multiple Overlapped Nematode Worms Using Skeleton Analysis. Search on Bibsonomy ICIAR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Overlap worms, Skeleton angle analysis, Computer vision, Image processing, Worm detection
52Paul C. van Oorschot, Jean-Marc Robert 0001, Miguel Vargas Martin A monitoring system for detecting repeated packets with applications to computer worms. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion detection, Network security, Anomaly detection, Traffic monitoring, Computer worms
52Xuxian Jiang, Dongyan Xu Profiling self-propagating worms via behavioral footprinting. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF behavioral footprinting, content signature, worm profiling, worms
52Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham A taxonomy of computer worms. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mobile malicious code, taxonomy, motivation, attackers, computer worms
46Xuxian Jiang, Xingquan Zhu 0001 vEye: behavioral footprinting for self-propagating worm detection and profiling. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Behavioral footprinting, Network security, Information systems, Sequence alignment, Worm detection
46Yi Yang 0002, Sencun Zhu, Guohong Cao Improving sensor network immunity under worm attacks: a software diversity approach. Search on Bibsonomy MobiHoc The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor worm, graph coloring, sensor network security, percolation theory, software diversity
46Madihah Mohd Saudi, Emran Mohd Tamil, Andrea J. Cullen, Mike E. Woodward, Mohd Yamani Idna Bin Idris Reverse Engineering: EDOWA Worm Analysis and Classification. Search on Bibsonomy World Congress on Engineering (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF worm analysis, worm classification, Classification, payload
46Dima Stopel, Zvi Boger, Robert Moskovitch, Yuval Shahar, Yuval Elovici Application of Artificial Neural Networks Techniques to Computer Worm Detection. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Frank Castaneda, Emre Can Sezer, Jun Xu 0003 WORM vs. WORM: preliminary study of an active counter-attack mechanism. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anti-worm, good worm, worm
46Rajeev Sivaram, Dhabaleswar K. Panda 0001, Craig B. Stunkel Efficient Broadcast and Multicast on Multistage Interconnection Networks Using Multiport Encoding. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF multicast, broadcast, wormhole routing, multistage interconnection networks, collective communication, interprocessor communication, Parallel computer architecture, virtual cut-through
45Dima Stopel, Robert Moskovitch, Zvi Boger, Yuval Shahar, Yuval Elovici Using artificial neural networks to detect unknown computer worms. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Feature selection, Artificial neural networks, Worm detection, HIDS
45Mohammad Reza Faghani, Hossein Saidi 0001 Social Networks' XSS Worms. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
45Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson On the adaptive real-time detection of fast-propagating network worms. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Zesheng Chen, Chao Chen 0001, Chuanyi Ji Understanding Localized-Scanning Worms. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Yuriy Bulygin Epidemics of Mobile Worms. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Mohamed Abdelhafez, George F. Riley, Robert G. Cole, Nam Phamdo Modeling and Simulations of TCP MANET Worms. Search on Bibsonomy PADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Zhichun Li, Lanjia Wang, Yan Chen 0004, Zhi Fu Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Scott E. Coull, Boleslaw K. Szymanski On the Development of an Internetwork-Centric Defense for Scanning Worms. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Byungseung Kim, Saewoong Bahk Relative Entropy-Based Filtering of Internet Worms by Inspecting TCP SYN Retry Packets. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham Feature Based Techniques for Auto-Detection of Novel Email Worms. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Email worm, classification technique, data mining, feature selection, Principal Component Analysis
45Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu On capturing and containing E-mail worms. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Ihab Hamadeh, George Kesidis Toward a Framework for Forensic Analysis of Scanning Worms. Search on Bibsonomy ETRICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 827 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license