|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 783 occurrences of 399 keywords
|
|
|
Results
Found 836 publication records. Showing 827 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Hyungjoon Lee, Wonil Kim, Manpyo Hong |
Artificial Immune System against Viral Attack. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Hyungjoon Lee, Wonil Kim, Manpyo Hong |
Biologically Inspired Computer Virus Detection System. |
BioADIT |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Vincent Berk, George Bakos, Robert Morris |
Designing a Framework for Active Worm Detection on Global Networks. |
IWIA |
2003 |
DBLP DOI BibTeX RDF |
|
27 | David Moore 0001, Colleen Shannon, Kimberly C. Claffy |
Code-Red: a case study on the spread and victims of an internet worm. |
Internet Measurement Workshop |
2002 |
DBLP DOI BibTeX RDF |
Code-Red, Code-RedI, CodeRedI, CodeRedII, backscatter, security, worm, virus, epidemiology |
27 | Duc T. Ha, Hung Q. Ngo 0001 |
On the trade-off between speed and resiliency of Flash worms and similar malcodes. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Junhua Chen, Shengjun Wei |
Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Randal Acton, Nathan Friess, John Aycock |
Inverse Geolocation: Worms with a Sense of Direction. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Joseph A. Tucek, James Newsome, Shan Lu 0001, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou 0001, Dawn Xiaodong Song |
Sweeper: a lightweight end-to-end system for defending against fast worms. |
EuroSys |
2007 |
DBLP DOI BibTeX RDF |
VSEF, flash worm, dynamic instrumentation, antibody |
27 | Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald |
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Chen Bo, Binxing Fang, Xiao-chun Yun |
Adaptive Method for Monitoring Network and Early Detection of Internet Worms. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Cliff Changchun Zou, Weibo Gong, Donald F. Towsley, Lixin Gao 0001 |
The monitoring and early detection of internet worms. |
IEEE/ACM Trans. Netw. |
2005 |
DBLP DOI BibTeX RDF |
network monitoring, internet worm, computer network security, early detection |
27 | Shigang Chen, Sanjay Ranka |
Detecting Internet worms at early stage. |
IEEE J. Sel. Areas Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Kai Hwang 0001, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen 0002, Ying Chen, Runfang Zhou, Xiaosong Lou |
GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks. |
International Conference on Computational Science (3) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Antti Tikkanen, Teemupekka Virtanen |
Early Warning for Network Worms. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Ping Wang, Binxing Fang, Xiao-chun Yun |
A New Approach to Automatically Detect Worms. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Cliff Changchun Zou, Lixin Gao 0001, Weibo Gong, Donald F. Towsley |
Monitoring and early warning for internet worms. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
monitoring, early detection, worm propagation |
27 | Tim Dwyer, Peter Eades |
Visualising a Fund Manager Flow Graph with Columns and Worms. |
IV |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Rajeev Sivaram, Dhabaleswar K. Panda 0001, Craig B. Stunkel |
Multicasting in Irregular Networks with Cut-Through Switches Using Tree-Based Multidestination Worms. |
PCRCW |
1997 |
DBLP DOI BibTeX RDF |
|
27 | Gavin S. P. Miller |
The motion dynamics of snakes and worms. |
SIGGRAPH |
1988 |
DBLP DOI BibTeX RDF |
simulation, modeling, animation, texture, dynamics, rendering, deformation, locomotion, elasticity |
25 | Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford |
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
(viruses, worms, Trojan horses), Servers, Security and Protection |
25 | Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang |
A Hybrid Model for Worm Simulations in a Large Network. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Internet incidents, simulation, Network modeling, Internet worms |
25 | Ahren Studer, Chenxi Wang |
Adaptive Detection of Local Scanners. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Scan Detection, Security, Internet Worms |
25 | David M. Nicol |
The impact of stochastic variance on worm propagation and detection. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
modeling, detection, worms, variance |
25 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
On the impact of dynamic addressing on malware propagation. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
private address space, network security, internet worms, network address translation |
25 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
Fast and Evasive Attacks: Highlighting the Challenges Ahead. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Network Worms, Network Security, Network Monitoring, Invasive Software |
25 | Abhijit Bose, Kang G. Shin |
Proactive security for mobile messaging networks. |
Workshop on Wireless Security |
2006 |
DBLP DOI BibTeX RDF |
SMS/MMS, mobile viruses, worms, containment, Instant Messaging (IM), proactive security |
25 | Jun Li 0001, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal |
An internet routing forensics framework for discovering rules of abnormal BGP events. |
Comput. Commun. Rev. |
2005 |
DBLP DOI BibTeX RDF |
abnormal BGP events, routing forensics, data mining, internet worms, blackout |
25 | Linda Dailey Paulson |
News Briefs. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
media distribution, swarmcasting technology, security, malware, worms, entertainment computing, wireless technology, power-aware computing, hackers, communications technology |
25 | Richard Ford |
Malcode Mysteries Revealed. |
IEEE Secur. Priv. |
2005 |
DBLP DOI BibTeX RDF |
self-replicating code, SQL.Slammer worm, worms, viruses |
25 | Parminder Chhabra, Ajita John, Huzur Saran |
PISA: Automatic Extraction of Traffic Signatures. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
Traffic Clusters, Security, Signatures, Worms, DDoS |
25 | Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis |
Worm evolution tracking via timing analysis. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
methods of attribution, network security, internet worms |
25 | Michael Vedders, Paul Boyum |
Helping students help themselves: malware removal. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
malware, worms, virus, spyware, kiosk, black hole, VLAN |
25 | Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen |
Assessment of Palm OS Susceptibility to Malicious Code Threats. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
mobile operating systems, Palm OS, worms, malicious code |
25 | Zhen Chen 0001, Chuang Lin 0002, Jia Ni, Dong-Hua Ruan, Bo Zheng, Yixin Jiang |
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
TCP/IP Protocol suite, Parallel Bloom Filter, Stateful TCP inspection, Network Security, Network Processors, Worms, Deep Packet Inspection |
25 | Carolyn P. Meinel |
Cybercrime Treaty Could Chill Research. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Cybercrime Treaty, Code Red, SQL Slammer worm, freedom of speech, worms, viruses |
25 | Adam J. O'Donnell, Harish Sethu |
On achieving software diversity for improved network security using distributed coloring algorithms. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
software monoculture, viruses and worms, network security, graph coloring, survivability, software diversity |
25 | Alfonso Valdes, Martin W. Fong |
Scalable visualization of propagating internet phenomena. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
scalable visualization, data mining, intrusion detection, internet worms |
25 | Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson |
Preliminary results using scale-down to explore worm dynamics. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
scaledown, slammer, simulation, modeling, worms |
25 | Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray |
Simulating realistic network worm traffic for worm warning system design and testing. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
code red, network modeling and simulation, slammer, worm detection systems, network security, worms |
18 | Lina Zhu 0001, Chao-yi Sun, Li Feng |
Research on Early Warning for Worm Propagation Based on Area-Alert-Level. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Khadija Houerbi Ramah, Kavé Salamatian, Farouk Kamoun |
Scan Surveillance in Internet Networks. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
scan monitoring, Networks, anomaly detection, Information Theory |
18 | Jiaqing Luo, Bin Xiao 0001, Guobin Liu 0003, Qingjun Xiao, Shijie Zhou |
Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Bo Sun 0001, Guanhua Yan, Yang Xiao 0001 |
Worm Propagation Dynamics in Wireless Sensor Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Syed A. Khayam, Hayder Radha, Dmitri Loguinov |
Worm Detection at Network Endpoints Using Information-Theoretic Traffic Perturbations. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Abhinav Srivastava, Jonathon T. Giffin |
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
virtual machine introspection, attack prevention, Firewall |
18 | Xiaofeng Nie, Yuewu Wang, Jiwu Jing, Qi Liu |
Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Christophe Restif, Dimitris N. Metaxas |
Tracking the Swimming Motions of C. elegansWorms with Applications in Aging Studies. |
MICCAI (1) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Yonesy F. Nunez |
Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew |
Automated Classification of Port-Scans from Distributed Sensors. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
classification, sensor, port-scan |
18 | Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis |
COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Luca Carettoni, Claudio Merloni, Stefano Zanero |
Studying Bluetooth Malware Propagation: The BlueBag Project. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Martin Rehák, Michal Pechoucek, Jan Tozicka, Magdalena Prokopová, David Medvigy, Jiri Novotný |
Agent-Based Network Protection Against Malicious Code. |
CEEMAS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Kuang-Man Huang, Pamela C. Cosman, William R. Schafer |
Automated Tracking of Multiple C. Elegans with Articulated Models. |
ISBI |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Matthew Dunlop, Carrie Gates, Cynthia Wong, Chenxi Wang |
SWorD - A Simple Worm Detection Scheme. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li 0001 |
Investigating the Impact of Real-World Factors on Internet Worm Propagation. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Kai Hwang 0001 |
Recent Advances in Trusted Grids and Peer-to-Peer Computing Systems. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario |
Automated Classification and Analysis of Internet Malware. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Meytal Tubi, Rami Puzis, Yuval Elovici |
Deployment of DNIDS in Social Networks. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici |
Host Based Intrusion Detection using Machine Learning. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Liang Xie 0002, Sencun Zhu |
A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms. |
Peer-to-Peer Computing |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Senthilkumar G. Cheetancheri, Denys L. Ma, Karl N. Levitt, Todd L. Heberlein |
Towards a framework for worm-defense evaluation. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Fernando C. Colón Osorio, Zachi Klopman |
And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
18 | James Newsome, Brad Karp, Dawn Xiaodong Song |
Paragraph: Thwarting Signature Learning by Training Maliciously. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Ki Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim 0001 |
PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Youngseok Lee 0002, Seongho Shin, Taeck-Geun Kwon |
Signature-Aware Traffic Monitoring with IPFIX. |
APNOMS |
2006 |
DBLP DOI BibTeX RDF |
flow and security, signature, traffic measurement, IPFIX |
18 | Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang |
Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. |
ICDCS |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Akira Mori, Tomonori Izumida, Toshimi Sawada, Tadashi Inoue |
A tool for analyzing and detecting malicious mobile code. |
ICSE |
2006 |
DBLP DOI BibTeX RDF |
OS execution emulation, code simulation, static code analysis, malicious code detection |
18 | Wei Yu 0002, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao 0001 |
On Detecting Camouflaging Worm. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Zhenkai Liang, R. Sekar 0001 |
Fast and automated generation of attack signatures: a basis for building self-protecting servers. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
denial-of-service protection, worm defense, buffer overflow, signature generation, memory error |
18 | Xin Xu, Weihua Song, Vir V. Phoha |
Early detection and propagation mitigation of worm programs. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Milan Vojnovic, Ayalvadi J. Ganesh |
On the effectiveness of automatic patching. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
minimum broadcast curve, worm, patching, virus, epidemic, software updates, automatic updates |
18 | Hiroyuki Okamura, Hisashi Kobayashi, Tadashi Dohi |
Markovian Modeling and Analysis of Internet Worm Propagation. |
ISSRE |
2005 |
DBLP DOI BibTeX RDF |
Internet worm propagation, epidemic SIS model, kill signal, matrix geometric analysis, Markov model, dependability measures |
18 | Monirul Islam Sharif, George F. Riley, Wenke Lee |
Comparative Study between Analytical Models and Packet-Level Worm Simulations. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Ke Wang 0009, Gabriela F. Cretu, Salvatore J. Stolfo |
Anomalous Payload-Based Worm Detection and Signature Generation. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Fidel Aznar Gregori, Mar Pujol López, Ramón Rizo Aldeguer |
Specifying Complex Systems with Bayesian Programming. An Alife Application. |
International Conference on Computational Science (1) |
2005 |
DBLP DOI BibTeX RDF |
Complex Systems Modeling, Artificial Life Formalization Model, Bayesian Programming |
18 | Syed A. Khayam, Hayder Radha |
A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Ram Dantu, João W. Cangussu |
An Architecture for Network Security Using Feedback Control. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Arno Wagner, Bernhard Plattner |
Entropy Based Worm and Anomaly Detection in Fast IP Networks. |
WETICE |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Guangzhi Qu, Salim Hariri, Mazin S. Yousif |
Multivariate statistical analysis for network attacks detection. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu, Erez Zadok |
An electric fence for kernel buffers. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
security, file systems, buffer overflow |
18 | Yi Xin, Binxing Fang, Xiao-chun Yun, Hai-Yong Chen |
Worm Detection in Large Scale Network by Traffic. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
Network Security, Statistic, Network Traffic, Worm Detection |
18 | Archana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan |
Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. |
NOMS (1) |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Jintao Xiong |
ACT: attachment chain tracing scheme for email virus detection and control. |
WORM |
2004 |
DBLP DOI BibTeX RDF |
contact tracing, transmission chain, worm defense |
18 | Fidel Aznar Gregori, Maria Del Mar Pujol López, Ramón Rizo Aldeguer, Pablo Suau Pérez |
A New Artificial Life Formalization Model: A Worm with a Bayesian Brain. |
KELSI |
2004 |
DBLP DOI BibTeX RDF |
Life Formalization Model, Artificial Life, Bayesian Programming |
18 | Todd S. Sproull, John W. Lockwood |
Distributed Instrusion Prevention in Active and Extensible Networks. |
IWAN |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Charles Higby, Michael Bailey |
Wireless security patch management system. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
security, wireless, configuration, update, worm, patch, virus, administration |
18 | Guofei Gu, Monirul Islam Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley |
Worm Detection, Early Warning and Response Based on Local Victim Information. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson |
Characteristics of internet background radiation. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
internet background radiation, network telescope, honeypot |
18 | Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Seo, Eunyoung Lee, Miri Joo |
A High-Level Policy Description Language for the Network ACL. |
PDCAT |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Linda Briesemeister, Patrick Lincoln, Phillip A. Porras |
Epidemic profiles and defense of scale-free networks. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
computer epidemics, self-propagating malicious code, scale-free networks |
18 | John W. Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks |
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection. |
IWAN |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Hendrik Rama |
Turtle graphics: hidden features in APL2. |
APL |
1998 |
DBLP DOI BibTeX RDF |
|
18 | Rajeev Sivaram, Ram Kesavan, Dhabaleswar K. Panda 0001, Craig B. Stunkel |
Where to Provide Support for Efficient Multicasting in Irregular Networks: Network Interface or Switch? |
ICPP |
1998 |
DBLP DOI BibTeX RDF |
cut-through routing, performance evaluation, multicast, broadcast, collective communication, Parallel computer architecture, irregular networks, switch-based networks |
18 | Ronald I. Greenberg, Hyeong-Cheol Oh |
Universal Wormhole Routing. |
IEEE Trans. Parallel Distributed Syst. |
1997 |
DBLP DOI BibTeX RDF |
area-universal networks, fat-tree interconnection network, Wormhole routing, packet routing, greedy routing, randomized routing |
18 | Stefan Bock, Friedhelm Meyer auf der Heide, Christian Scheideler |
Optimal Wormhole Routing in the (n, d)-Torus. |
IPPS |
1997 |
DBLP DOI BibTeX RDF |
|
18 | Stav Cohen, Ron Bitton, Ben Nassi |
Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Angelos-Michael Papadopoulos, Paschalis Melissas, Anestis Kastellos, Panagiotis Katranitsiotis, Panagiotis Zaparas, Konstantinos Stavridis, Petros Daras |
TenebrioVision: A Fully Annotated Dataset of Tenebrio Molitor Larvae Worms in a Controlled Environment for Accurate Small Object Detection and Segmentation. |
ICPRAM |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Stanislav Frolík, Jaroslav Hrdina |
Local control of 2-link robotic worms based on additional symmetries. |
J. Frankl. Inst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Fu-Hau Hsu, Min-Hao Wu, Yanling Hwang, Jian-Xin Chen, Jian-Hong Huang, Hao-Jyun Wang, Yi-Wen Lai |
Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy. |
Inf. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Thomas P. Ilett, Omer Yuval, Thomas Ranner, Netta Cohen, David C. Hogg |
3D shape reconstruction of semi-transparent worms. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 827 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ >>] |
|