The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for worm with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1991 (15) 1992-1995 (15) 1996-1998 (22) 1999-2001 (28) 2002 (19) 2003 (147) 2004 (188) 2005 (124) 2006 (137) 2007 (115) 2008 (108) 2009 (83) 2010 (42) 2011 (28) 2012 (32) 2013 (34) 2014 (24) 2015 (23) 2016 (26) 2017 (21) 2018 (24) 2019 (30) 2020 (20) 2021 (37) 2022 (26) 2023 (31) 2024 (2)
Publication types (Num. hits)
article(378) incollection(2) inproceedings(1006) phdthesis(9) proceedings(6)
Venues (Conferences, Journals, ...)
OTM Workshops(203) WORM(46) CoRR(27) ICC(19) IEEE Secur. Priv.(16) RAID(15) INFOCOM(13) GLOBECOM(11) J. Comput. Virol.(11) CCS(10) ISI(10) ACSAC(9) Comput. Secur.(9) Computer(9) DSN(9) IEEE Trans. Parallel Distribut...(9) More (+10 of total 632)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 869 occurrences of 475 keywords

Results
Found 1425 publication records. Showing 1401 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
58Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 Vigilante: End-to-end containment of Internet worm epidemics. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF self-certifying alerts, vulnerability condition slicing, program analysis, dynamic data-flow analysis, Worm containment
58Michael D. Bailey, Evan Cooke, Farnam Jahanian, David Watson 0001, Jose Nazario The Blaster Worm: Then and Now. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Blaster, Welchia, MSBlast, worm, Windows
58David Moore 0001, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford-Chen, Nicholas Weaver Inside the Slammer Worm. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Slammer, Sapphire, attack, worm, infect
58Jintao Xiong ACT: attachment chain tracing scheme for email virus detection and control. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF contact tracing, transmission chain, worm defense
54Pantelis Kammas, Thodoros Komninos, Yannis C. Stamatiou Modeling the Co-evololution DNS Worms and Anti-worms in IPv6 Networks. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
54Kurt Rohloff, Tamer Basar Deterministic and stochastic models for the detection of random constant scanning worms. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Worms, hypothesis testing, stochastic analysis, epidemic modeling
54Shigang Chen, Yong Tang 0004 DAW: A Distributed Antiworm System. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rate-limit algorithms, network security, Internet worms
54Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Clint Feher, Chanan Glezer, Yuval Shahar, Yuval Elovici Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. Search on Bibsonomy CIDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Junmin Zhang, Yiwen Liang Integrating Innate and Adaptive Immunity for Worm Detection. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52Seiji Shibaguchi, Yuki Nakayama, Ken-ichi Okada Worm Path Identification Using Visualization System. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie Relieving hot spots in collaborative intrusion detection systems during worm outbreaks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Bo Sun 0001, Guanhua Yan, Yang Xiao 0001 Worm Propagation Dynamics in Wireless Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan J. Eidenbenz, Vincent Q. Vu Bluetooth worm propagation: mobility pattern matters! Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Jian Feng, Xueyan Wang, Shuqian Luo A Worm Model Based on Artificial Life for Automatic Segmentation of Medical Images. Search on Bibsonomy MIMI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Donghyun Lim, Jin-Wook Chung, Seong-Jin Ahn 0001 Using Genetic Algorithm for Network Status Learning and Worm Virus Detection Scheme. Search on Bibsonomy IDEAL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Takeshi Okamoto A Worm Filter Based on the Number of Unacknowledged Requests. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Thomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Bailing Wang, Binxing Fang, Xiao-chun Yun A Worm Behavioral Approach to Susceptible Host Detection. Search on Bibsonomy GCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Yufeng Chen, Yabo Dong, Dongming Lu, Yunhe Pan The Multi-fractal Nature of Worm and Normal Traffic at Individual Source Level. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning. Search on Bibsonomy IDEAL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
52David M. Nicol, Michael Liljenstam, Jason Liu 0001 Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure. Search on Bibsonomy Computer Performance Evaluation / TOOLS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
52Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 Vigilante: end-to-end containment of internet worms. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-certifying alerts, data flow analysis, control flow analysis, worm containment
51Justin Ma, Geoffrey M. Voelker, Stefan Savage Self-stopping worms. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-stop, malware, worms, distributed protocols
51Stefan Savage Scalable internet threat monitoring. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
51Evan Cooke, Michael D. Bailey, Zhuoqing Morley Mao, David Watson 0001, Farnam Jahanian, Danny McPherson Toward understanding distributed blackhole placement. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF blackhole monitoring, blackhole placement, globally scoped threats, internet motion sensor, network security, computer worms
51Cynthia Wong, Stan Bielski, Jonathan M. McCune, Chenxi Wang A study of mass-mailing worms. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network security, traffic analysis, internet worms
49Mustafa Jarrar, Aldo Gangemi Workshop on Regulatory Ontologies (WORM) PC Co-chairs' Message. Search on Bibsonomy OTM Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
49Guang Lu, Fei Yu 0001, Guangxue Yue, Miaoliang Zhu Worm Intrusion Alarm Modeling Based on Network Traffic Character. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion Alarm, Network Traffic Character, Self-Similarity, Worm
49Hanxun Zhou, Yingyou Wen, Hong Zhao Modeling and Analysis of Active Benign Worms and Hybrid Benign Worms Containing the Spread of Worms. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF benign worm, two-factor worm model, network security
49Hideki Koike, Kazuhiro Ohno, Kanba Koizumi Visualizing Cyber Attacks using IP Matrix. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF virus visualization, worm visualization, Internet forecasting, information visualization, intrusion detection, information security, Internet worm, computer virus
45Sapon Tanachaiwiwat, Ahmed Helmy Brief Announcement: Analyzing the Interactions of Self-propagating Codes in Multi-hop Networks. Search on Bibsonomy SSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Fernando C. Colón Osorio, Zachi Klopman An initial analysis and presentation of malware exhibiting swarm-like behavior. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF swarm worms, swarm intelligence, malware, emergent behavior, internet worms
45Linda Briesemeister, Phillip A. Porras Microscopic Simulation of a Group Defense Strategy. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Lina Zhu 0001, Chao-yi Sun, Li Feng Research on Early Warning for Worm Propagation Based on Area-Alert-Level. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Zhanyong Tang, Rui Qi, Dingyi Fang, Yangxia Luo W-Aegis: A Propagation Behavior Based Worm Detection Model for Local Networks. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Chun Wei, Alan P. Sprague, Gary Warner Detection of networks blocks used by the Storm Worm botnet. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data mining, spam, electronic mail, forensic analysis, cyber crime
43Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos A spatial stochastic model for worm propagation: scale effects. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Jintao Xiong PID: A Queue Management Scheme for Improving Network Resilience Under Worm Attacks. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43David M. Nicol, Steve Hanna, Frank Stratton, William H. Sanders Modeling and analysis of worm defense using stochastic activity networks. Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF
43Bing Wu, Xiao-chun Yun, Xiang Cui Study on Worm Poisoning Technology. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Hatem M. El-Boghdadi, Mohamed Bohalfaeh Code Generation: On the Scheduling of DAGs Using Worm-Partition. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Alberto Avritzer, Robert G. Cole, Elaine J. Weyuker Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs. Search on Bibsonomy WOSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile ad hoc networks (MANETS), software monitoring, computer worms, mitigation
43Thodoros Komninos, Yannis C. Stamatiou, G. Vavitsas A Worm Propagation Model Based on People's Email Acquaintance Profiles. Search on Bibsonomy WINE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43J. Gonzalez-Gomez, Iván González, Francisco J. Gomez-Arribas, Eduardo I. Boemo Evaluation of a Locomotion Algorithm for Worm-Like Robots on FPGA-Embedded Processors. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Ki Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim 0001 PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi Tackling Worm Detection Speed and False Alarm in Virus Throttling. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Tao Jiang, Wonil Kim, Kyung-suk Lhee, Manpyo Hong E-mail Worm Detection Using the Analysis of Behavior. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis Requirements on Worm Mitigation Technologies in MANETS. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Syed A. Khayam, Hayder Radha A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Yinglian Xie, Vyas Sekar, David A. Maltz, Michael K. Reiter, Hui Zhang 0001 Worm Origin Identification Using Random Moonwalks. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Jangbok Kim, Jaehong Shim, Gihyun Jung, Kyunghee Choi Reducing Worm Detection Time and False Alarm in Virus Throttling. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Yi-xuan Liu, Xiao-chun Yun, Bailing Wang, Hai-bin Sun An Anti-worm with Balanced Tree Based Spreading Strategy. Search on Bibsonomy ICMLC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Vincent Berk, George Bakos, Robert Morris Designing a Framework for Active Worm Detection on Global Networks. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Kihun Chong, Ha Yoon Song, Sam H. Noh Traffic Characterization of the Web Server Attacks of Worm Viruses. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Mohit Lad, Xiaoliang Zhao, Beichuan Zhang 0001, Daniel Massey, Lixia Zhang 0001 Analysis of BGP Update Surge during Slammer Worm Attack. Search on Bibsonomy IWDC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Dima Stopel, Robert Moskovitch, Zvi Boger, Yuval Shahar, Yuval Elovici Using artificial neural networks to detect unknown computer worms. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Feature selection, Artificial neural networks, Worm detection, HIDS
43Yong Tang 0004, Shigang Chen An Automated Signature-Based Approach against Polymorphic Internet Worms. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Internet security, worm detection, polymorphic worms
43Wei Yu 0002, Nan Zhang 0004, Wei Zhao 0001 Self-adaptive Worms and Countermeasures. Search on Bibsonomy SSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Game theory, Worm
43Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi Wang Empirical Analysis of Rate Limiting Mechanisms. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Internet Worms, Rate Limiting, Worm Containment
42Farnam Jahanian (eds.) Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006 Search on Bibsonomy WORM The full citation details ... 2006 DBLP  BibTeX  RDF
42Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao Internet-scale malware mitigation: combining intelligence of the control and data plane. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet motion sensor, routing anomaly, network security, BGP, computer worms
42Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis On the impact of dynamic addressing on malware propagation. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF private address space, network security, internet worms, network address translation
42Mohamed R. Chouchane, Arun Lakhotia Using engine signature to detect metamorphic malware. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF metamorphic engine, virus scanner
42Giovanni Di Crescenzo, Faramak Vakil Cryptographic hashing for virus localization. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptographic hashing, virus tolerance, integrity verification, virus detection
42Vijay Atluri, Angelos D. Keromytis (eds.) Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 Search on Bibsonomy WORM The full citation details ... 2005 DBLP  BibTeX  RDF
42Brian Hernacki Emerging threats. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Spyros Antonatos, Periklis Akritidis, Evangelos P. Markatos, Kostas G. Anagnostakis Defending against hitlist worms using network address space randomization. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, randomization, traffic analysis, internet worms
42Vern Paxson (eds.) Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004 Search on Bibsonomy WORM The full citation details ... 2004 DBLP  BibTeX  RDF
42James E. Just, Mark R. Cornwell Review and analysis of synthetic diversity for breaking monocultures. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF diversity, vulnerability, n-version programming
42Stuart Staniford, Stefan Savage (eds.) Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003 Search on Bibsonomy WORM The full citation details ... 2003 DBLP  BibTeX  RDF
42Linda Briesemeister, Patrick Lincoln, Phillip A. Porras Epidemic profiles and defense of scale-free networks. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF computer epidemics, self-propagating malicious code, scale-free networks
42Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham Detection of injected, dynamically generated, and obfuscated malicious code. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection
42Yang Wang 0008, Chenxi Wang Modeling the effects of timing parameters on virus propagation. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, epidemiology, computer virus, anti-virus
40Brad Smith A Storm (Worm) Is Brewing. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Storm worm, security, malware
40Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Polymorphic Worm Detection, Abstract Payload Execution
40Hiroyuki Okamura, Hisashi Kobayashi, Tadashi Dohi Markovian Modeling and Analysis of Internet Worm Propagation. Search on Bibsonomy ISSRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Internet worm propagation, epidemic SIS model, kill signal, matrix geometric analysis, Markov model, dependability measures
40Keisuke Ishibashi, Tsuyoshi Toyono, Katsuyasu Toyama, Masahiro Ishino, Haruhiko Ohshima, Ichiro Mizukoshi Detecting mass-mailing worm infected hosts by mining DNS traffic data. Search on Bibsonomy MineNet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF mass-mailing worm, data mining, domain name system
40Yi Xin, Binxing Fang, Xiao-chun Yun, Hai-Yong Chen Worm Detection in Large Scale Network by Traffic. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network Security, Statistic, Network Traffic, Worm Detection
36Guanhua Yan, Stephan J. Eidenbenz Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos Treating scalability and modelling human countermeasures against local preference worms via gradient models. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Frank Akujobi, Ioannis Lambadaris, Evangelos Kranakis An integrated approach to detection of fast and slow scanning worms. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF detection interval, intrusion detection, anomaly detection, Bayesian inference, worms, probability model
36Junhua Chen, Shengjun Wei Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Karthik Channakeshava, Deepti Chafekar, Keith R. Bisset, V. S. Anil Kumar 0001, Madhav V. Marathe EpiNet: a simulation framework to study the spread of malware in wireless networks. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF activity-based, wireless epidemics, Bluetooth, malware
36George Kesidis, Ihab Hamadeh, Youngmi Jin, Soranun Jiwasurat, Milan Vojnovic A model of the spread of randomly scanning Internet worms that saturate access links. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF communications/computer networking, modeling, Internet worms, epidemiology
36Senthilkumar G. Cheetancheri, John Mark Agosta, Karl N. Levitt, Shyhtsun Felix Wu, Jeff Rowe Optimal Cost, Collaborative, and Distributed Response to Zero-Day Worms - A Control Theoretic Approach. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collaboration, Dynamic Programming, Worms, Control Theory
36Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Robert Moskovitch, Nir Nissim, Dima Stopel, Clint Feher, Roman Englert, Yuval Elovici Improving the Detection of Unknown Computer Worms Activity Using Active Learning. Search on Bibsonomy KI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malcode Detection, Classification, Support Vector Machines, Active Learning
36Attila Ondi, Richard Ford Modeling malcode with Hephaestus: beyond simple spread. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hephaestus, code-red, virus-spread simulation
36Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Tsern-Huei Lee Generalized Aho-Corasick Algorithm for Signature Based Anti-Virus Applications. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Nagender Bandi, Divyakant Agrawal, Amr El Abbadi Fast Algorithms for Heavy Distinct Hitters using Associative Memories. Search on Bibsonomy ICDCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Fernando C. Colón Osorio, Zachi Klopman And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu On capturing and containing E-mail worms. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Sanjeev Dwivedi Feedback-basedWorm Containment. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Guanhua Yan, Stephan J. Eidenbenz Bluetooth Worms: Models, Dynamics, and Defense Implications. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Shigang Chen, Sanjay Ranka Detecting Internet worms at early stage. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 1401 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license