The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WORM"( http://dblp.L3S.de/Venues/WORM )

URL (DBLP): http://dblp.uni-trier.de/db/conf/worm

Publication years (Num. hits)
2003 (11) 2004 (10) 2005 (13) 2006 (12)
Publication types (Num. hits)
inproceedings(42) proceedings(4)
Venues (Conferences, Journals, ...)
WORM(46)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 118 occurrences of 68 keywords

Results
Found 46 publication records. Showing 46 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1David M. Nicol The impact of stochastic variance on worm propagation and detection. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF modeling, detection, worms, variance
1Niels Provos, Joe McClain, Ke Wang 0009 Search worms. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF index filtering, security, search, signature, internet worms
1Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao Internet-scale malware mitigation: combining intelligence of the control and data plane. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet motion sensor, routing anomaly, network security, BGP, computer worms
1Jose Nazario Where the worms aren't. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF securty, worms, vulnerabilities, botnets, exploits
1Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto Signature metrics for accurate and automated worm detection. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network worms, worm signatures, traffic analysis
1Xuxian Jiang, Dongyan Xu Profiling self-propagating worms via behavioral footprinting. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF behavioral footprinting, content signature, worm profiling, worms
1Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis On the impact of dynamic addressing on malware propagation. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF private address space, network security, internet worms, network address translation
1Mohamed R. Chouchane, Arun Lakhotia Using engine signature to detect metamorphic malware. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metamorphic engine, virus scanner
1Farnam Jahanian (eds.) Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006 Search on Bibsonomy WORM The full citation details ... 2006 DBLP  BibTeX  RDF
1Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel A preliminary investigation of worm infections in a bluetooth environment. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bluetooth, malware, worms
1Giovanni Di Crescenzo, Faramak Vakil Cryptographic hashing for virus localization. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic hashing, virus tolerance, integrity verification, virus detection
1David J. Malan, Michael D. Smith 0001 Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collaborative detection, native API, win32, IDS, worms, windows, system calls, temporal consistency, peers, system services, host-based intrusion detection, HIDS
1Kurt Rohloff, Tamer Basar The detection of RCS worm epidemics. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Justin Ma, Geoffrey M. Voelker, Stefan Savage Self-stopping worms. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-stop, malware, worms, distributed protocols
1Vijay Atluri, Angelos D. Keromytis (eds.) Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 Search on Bibsonomy WORM The full citation details ... 2005 DBLP  BibTeX  RDF
1Milan Vojnovic, Ayalvadi J. Ganesh On the effectiveness of automatic patching. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF minimum broadcast curve, worm, patching, virus, epidemic, software updates, automatic updates
1Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis Worm evolution tracking via timing analysis. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF methods of attribution, network security, internet worms
1David J. Malan, Michael D. Smith 0001 Host-based detection of worms through peer-to-peer cooperation. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Win32, native API, peer-to-peer, P2P, worms, windows, system calls, temporal consistency, system services
1Zesheng Chen, Chuanyi Ji A self-learning worm using importance scanning. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF importance scanning, self-learning worm, modeling, worm propagation
1David W. Richardson, Steven D. Gribble, Edward D. Lazowska The limits of global scanning worm detectors in the presence of background noise. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF scanning worms, worm models, computer security, worm detection, computer worms
1Brian Hernacki Emerging threats. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis Defending against hitlist worms using network address space randomization. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, randomization, traffic analysis, internet worms
1Stefan Savage Scalable internet threat monitoring. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vern Paxson An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mohammad Mannan, Paul C. van Oorschot On instant messaging worms, analysis and countermeasures. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF instant messaging worms, scale-free networks
1Vern Paxson (eds.) Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004 Search on Bibsonomy WORM The full citation details ... 2004 DBLP  BibTeX  RDF
1James E. Just, Mark R. Cornwell Review and analysis of synthetic diversity for breaking monocultures. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF diversity, vulnerability, n-version programming
1Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting A hybrid quarantine defense. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network modeling and simulation, worm detection systems, network security, worms
1Stuart Staniford, David Moore 0001, Vern Paxson, Nicholas Weaver The top speed of flash worms. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF flash worm, simulation, modeling, worms
1Daniel R. Ellis, John G. Aiken, Kira S. Attwood, Scott D. Tenaglia A behavioral approach to worm detection. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF behavioral signatures, descendant relation, network application architecture, network worms, intrusion detection
1Frank Castaneda, Emre Can Sezer, Jun Xu 0003 WORM vs. WORM: preliminary study of an active counter-attack mechanism. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anti-worm, good worm, worm
1Jintao Xiong ACT: attachment chain tracing scheme for email virus detection and control. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF contact tracing, transmission chain, worm defense
1Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson 0001, Farnam Jahanian, Danny McPherson Toward understanding distributed blackhole placement. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhole monitoring, blackhole placement, globally scoped threats, internet motion sensor, network security, computer worms
1Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang A study of mass-mailing worms. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network security, traffic analysis, internet worms
1Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson Preliminary results using scale-down to explore worm dynamics. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF scaledown, slammer, simulation, modeling, worms
1Stuart E. Schechter, Michael D. Smith 0001 Access for sale: a new class of worm. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, cryptography, economics, incentives, worm, virus, threat modelling
1Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray Simulating realistic network worm traffic for worm warning system design and testing. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF code red, network modeling and simulation, slammer, worm detection systems, network security, worms
1Cliff Changchun Zou, Weibo Gong, Donald F. Towsley Worm propagation modeling and analysis under dynamic quarantine defense. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF dynamic quarantine, epidemic model, worm propagation
1Linda Briesemeister, Patrick Lincoln, Phillip A. Porras Epidemic profiles and defense of scale-free networks. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF computer epidemics, self-propagating malicious code, scale-free networks
1Dan Ellis Worm anatomy and model. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF network security, worm, network modeling, turing machine
1Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham Detection of injected, dynamically generated, and obfuscated malicious code. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection
1Yang Wang 0008, Chenxi Wang Modeling the effects of timing parameters on virus propagation. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, epidemiology, computer virus, anti-virus
1Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham A taxonomy of computer worms. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF mobile malicious code, taxonomy, motivation, attackers, computer worms
1Stuart Staniford, Stefan Savage (eds.) Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003 Search on Bibsonomy WORM The full citation details ... 2003 DBLP  BibTeX  RDF
1Darrell M. Kienzle, Matthew C. Elder Recent worms: a survey and trends. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF survey, malicious code
1Arno Wagner, Thomas Dübendorfer, Bernhard Plattner, Roman Hiestand Experiences with worm propagation simulations. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF simulation, latency, bandwidth, internet worms
Displaying result #1 - #46 of 46 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license