The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for worms with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1997 (21) 1998-2002 (21) 2003 (32) 2004 (67) 2005 (129) 2006 (115) 2007 (124) 2008 (94) 2009 (60) 2010 (26) 2011 (22) 2012-2013 (27) 2014 (16) 2015-2016 (20) 2017-2019 (22) 2020-2022 (18) 2023-2024 (13)
Publication types (Num. hits)
article(216) incollection(8) inproceedings(603)
Venues (Conferences, Journals, ...)
WORM(35) IEEE Secur. Priv.(18) ACSAC(15) RAID(15) CoRR(14) Comput. Secur.(13) CCS(9) DIMVA(9) ICC(9) IEEE Trans. Parallel Distribut...(9) INFOCOM(9) IPCCC(9) ISI(9) J. Comput. Virol.(8) PADS(8) Computer(7) More (+10 of total 437)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 783 occurrences of 399 keywords

Results
Found 836 publication records. Showing 827 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Hyungjoon Lee, Wonil Kim, Manpyo Hong Artificial Immune System against Viral Attack. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Hyungjoon Lee, Wonil Kim, Manpyo Hong Biologically Inspired Computer Virus Detection System. Search on Bibsonomy BioADIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Vincent Berk, George Bakos, Robert Morris Designing a Framework for Active Worm Detection on Global Networks. Search on Bibsonomy IWIA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27David Moore 0001, Colleen Shannon, Kimberly C. Claffy Code-Red: a case study on the spread and victims of an internet worm. Search on Bibsonomy Internet Measurement Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Code-Red, Code-RedI, CodeRedI, CodeRedII, backscatter, security, worm, virus, epidemiology
27Duc T. Ha, Hung Q. Ngo 0001 On the trade-off between speed and resiliency of Flash worms and similar malcodes. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Junhua Chen, Shengjun Wei Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Randal Acton, Nathan Friess, John Aycock Inverse Geolocation: Worms with a Sense of Direction. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Joseph A. Tucek, James Newsome, Shan Lu 0001, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou 0001, Dawn Xiaodong Song Sweeper: a lightweight end-to-end system for defending against fast worms. Search on Bibsonomy EuroSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF VSEF, flash worm, dynamic instrumentation, antibody
27Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Chen Bo, Binxing Fang, Xiao-chun Yun Adaptive Method for Monitoring Network and Early Detection of Internet Worms. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Cliff Changchun Zou, Weibo Gong, Donald F. Towsley, Lixin Gao 0001 The monitoring and early detection of internet worms. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network monitoring, internet worm, computer network security, early detection
27Shigang Chen, Sanjay Ranka Detecting Internet worms at early stage. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Kai Hwang 0001, Yu-Kwong Kwok, Shanshan Song, Min Cai, Yu Chen 0002, Ying Chen, Runfang Zhou, Xiaosong Lou GridSec: Trusted Grid Computing with Security Binding and Self-defense Against Network Worms and DDoS Attacks. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Antti Tikkanen, Teemupekka Virtanen Early Warning for Network Worms. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Ping Wang, Binxing Fang, Xiao-chun Yun A New Approach to Automatically Detect Worms. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Cliff Changchun Zou, Lixin Gao 0001, Weibo Gong, Donald F. Towsley Monitoring and early warning for internet worms. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF monitoring, early detection, worm propagation
27Tim Dwyer, Peter Eades Visualising a Fund Manager Flow Graph with Columns and Worms. Search on Bibsonomy IV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Rajeev Sivaram, Dhabaleswar K. Panda 0001, Craig B. Stunkel Multicasting in Irregular Networks with Cut-Through Switches Using Tree-Based Multidestination Worms. Search on Bibsonomy PCRCW The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27Gavin S. P. Miller The motion dynamics of snakes and worms. Search on Bibsonomy SIGGRAPH The full citation details ... 1988 DBLP  DOI  BibTeX  RDF simulation, modeling, animation, texture, dynamics, rendering, deformation, locomotion, elasticity
25Xuxian Jiang, Florian P. Buchholz, Aaron Walters, Dongyan Xu, Yi-Min Wang, Eugene H. Spafford Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (viruses, worms, Trojan horses), Servers, Security and Protection
25Eul-Gyu Im, Jung Sik Kim, In Woo Noh, Hyun Jun Jang A Hybrid Model for Worm Simulations in a Large Network. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Internet incidents, simulation, Network modeling, Internet worms
25Ahren Studer, Chenxi Wang Adaptive Detection of Local Scanners. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Scan Detection, Security, Internet Worms
25David M. Nicol The impact of stochastic variance on worm propagation and detection. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF modeling, detection, worms, variance
25Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis On the impact of dynamic addressing on malware propagation. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF private address space, network security, internet worms, network address translation
25Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis Fast and Evasive Attacks: Highlighting the Challenges Ahead. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network Worms, Network Security, Network Monitoring, Invasive Software
25Abhijit Bose, Kang G. Shin Proactive security for mobile messaging networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SMS/MMS, mobile viruses, worms, containment, Instant Messaging (IM), proactive security
25Jun Li 0001, Dejing Dou, Zhen Wu, Shiwoong Kim, Vikash Agarwal An internet routing forensics framework for discovering rules of abnormal BGP events. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF abnormal BGP events, routing forensics, data mining, internet worms, blackout
25Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF media distribution, swarmcasting technology, security, malware, worms, entertainment computing, wireless technology, power-aware computing, hackers, communications technology
25Richard Ford Malcode Mysteries Revealed. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-replicating code, SQL.Slammer worm, worms, viruses
25Parminder Chhabra, Ajita John, Huzur Saran PISA: Automatic Extraction of Traffic Signatures. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Traffic Clusters, Security, Signatures, Worms, DDoS
25Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis Worm evolution tracking via timing analysis. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF methods of attribution, network security, internet worms
25Michael Vedders, Paul Boyum Helping students help themselves: malware removal. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF malware, worms, virus, spyware, kiosk, black hole, VLAN
25Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen Assessment of Palm OS Susceptibility to Malicious Code Threats. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF mobile operating systems, Palm OS, worms, malicious code
25Zhen Chen 0001, Chuang Lin 0002, Jia Ni, Dong-Hua Ruan, Bo Zheng, Yixin Jiang AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF TCP/IP Protocol suite, Parallel Bloom Filter, Stateful TCP inspection, Network Security, Network Processors, Worms, Deep Packet Inspection
25Carolyn P. Meinel Cybercrime Treaty Could Chill Research. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cybercrime Treaty, Code Red, SQL Slammer worm, freedom of speech, worms, viruses
25Adam J. O'Donnell, Harish Sethu On achieving software diversity for improved network security using distributed coloring algorithms. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF software monoculture, viruses and worms, network security, graph coloring, survivability, software diversity
25Alfonso Valdes, Martin W. Fong Scalable visualization of propagating internet phenomena. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF scalable visualization, data mining, intrusion detection, internet worms
25Nicholas Weaver, Ihab Hamadeh, George Kesidis, Vern Paxson Preliminary results using scale-down to explore worm dynamics. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF scaledown, slammer, simulation, modeling, worms
25Michael Liljenstam, David M. Nicol, Vincent H. Berk, Robert S. Gray Simulating realistic network worm traffic for worm warning system design and testing. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF code red, network modeling and simulation, slammer, worm detection systems, network security, worms
18Lina Zhu 0001, Chao-yi Sun, Li Feng Research on Early Warning for Worm Propagation Based on Area-Alert-Level. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Khadija Houerbi Ramah, Kavé Salamatian, Farouk Kamoun Scan Surveillance in Internet Networks. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF scan monitoring, Networks, anomaly detection, Information Theory
18Jiaqing Luo, Bin Xiao 0001, Guobin Liu 0003, Qingjun Xiao, Shijie Zhou Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Bo Sun 0001, Guanhua Yan, Yang Xiao 0001 Worm Propagation Dynamics in Wireless Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Syed A. Khayam, Hayder Radha, Dmitri Loguinov Worm Detection at Network Endpoints Using Information-Theoretic Traffic Perturbations. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Abhinav Srivastava, Jonathon T. Giffin Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtual machine introspection, attack prevention, Firewall
18Xiaofeng Nie, Yuewu Wang, Jiwu Jing, Qi Liu Understanding the Impact of Overlay Topologies on Peer-to-Peer Worm Propagation. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Christophe Restif, Dimitris N. Metaxas Tracking the Swimming Motions of C. elegansWorms with Applications in Aging Studies. Search on Bibsonomy MICCAI (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Yonesy F. Nunez Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew Automated Classification of Port-Scans from Distributed Sensors. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF classification, sensor, port-scan
18Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Luca Carettoni, Claudio Merloni, Stefano Zanero Studying Bluetooth Malware Propagation: The BlueBag Project. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Martin Rehák, Michal Pechoucek, Jan Tozicka, Magdalena Prokopová, David Medvigy, Jiri Novotný Agent-Based Network Protection Against Malicious Code. Search on Bibsonomy CEEMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Kuang-Man Huang, Pamela C. Cosman, William R. Schafer Automated Tracking of Multiple C. Elegans with Articulated Models. Search on Bibsonomy ISBI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Matthew Dunlop, Carrie Gates, Cynthia Wong, Chenxi Wang SWorD - A Simple Worm Detection Scheme. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Daniel A. Ray, Charles B. Ward, Bogdan Munteanu, Jonathan Blackwell, Xiaoyan Hong, Jun Li 0001 Investigating the Impact of Real-World Factors on Internet Worm Propagation. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Kai Hwang 0001 Recent Advances in Trusted Grids and Peer-to-Peer Computing Systems. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Michael D. Bailey, Jon Oberheide, Jon Andersen, Zhuoqing Morley Mao, Farnam Jahanian, Jose Nazario Automated Classification and Analysis of Internet Malware. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Meytal Tubi, Rami Puzis, Yuval Elovici Deployment of DNIDS in Social Networks. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici Host Based Intrusion Detection using Machine Learning. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Liang Xie 0002, Sencun Zhu A Feasibility Study on Defending Against Ultra-Fast TopologicalWorms. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Senthilkumar G. Cheetancheri, Denys L. Ma, Karl N. Levitt, Todd L. Heberlein Towards a framework for worm-defense evaluation. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Fernando C. Colón Osorio, Zachi Klopman And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18James Newsome, Brad Karp, Dawn Xiaodong Song Paragraph: Thwarting Signature Learning by Training Maliciously. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Ki Hun Lee, Yuna Kim, Sung Je Hong, Jong Kim 0001 PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Youngseok Lee 0002, Seongho Shin, Taeck-Geun Kwon Signature-Aware Traffic Monitoring with IPFIX. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF flow and security, signature, traffic measurement, IPFIX
18Xuxian Jiang, Aaron Walters, Dongyan Xu, Eugene H. Spafford, Florian P. Buchholz, Yi-Min Wang Provenance-Aware Tracing ofWorm Break-in and Contaminations: A Process Coloring Approach. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Akira Mori, Tomonori Izumida, Toshimi Sawada, Tadashi Inoue A tool for analyzing and detecting malicious mobile code. Search on Bibsonomy ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF OS execution emulation, code simulation, static code analysis, malicious code detection
18Wei Yu 0002, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao 0001 On Detecting Camouflaging Worm. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Zhenkai Liang, R. Sekar 0001 Fast and automated generation of attack signatures: a basis for building self-protecting servers. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF denial-of-service protection, worm defense, buffer overflow, signature generation, memory error
18Xin Xu, Weihua Song, Vir V. Phoha Early detection and propagation mitigation of worm programs. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Milan Vojnovic, Ayalvadi J. Ganesh On the effectiveness of automatic patching. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF minimum broadcast curve, worm, patching, virus, epidemic, software updates, automatic updates
18Hiroyuki Okamura, Hisashi Kobayashi, Tadashi Dohi Markovian Modeling and Analysis of Internet Worm Propagation. Search on Bibsonomy ISSRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Internet worm propagation, epidemic SIS model, kill signal, matrix geometric analysis, Markov model, dependability measures
18Monirul Islam Sharif, George F. Riley, Wenke Lee Comparative Study between Analytical Models and Packet-Level Worm Simulations. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Ke Wang 0009, Gabriela F. Cretu, Salvatore J. Stolfo Anomalous Payload-Based Worm Detection and Signature Generation. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Fidel Aznar Gregori, Mar Pujol López, Ramón Rizo Aldeguer Specifying Complex Systems with Bayesian Programming. An Alife Application. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Complex Systems Modeling, Artificial Life Formalization Model, Bayesian Programming
18Syed A. Khayam, Hayder Radha A Topologically-Aware Worm Propagation Model for Wireless Sensor Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Ram Dantu, João W. Cangussu An Architecture for Network Security Using Feedback Control. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Arno Wagner, Bernhard Plattner Entropy Based Worm and Anomaly Detection in Fast IP Networks. Search on Bibsonomy WETICE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Guangzhi Qu, Salim Hariri, Mazin S. Yousif Multivariate statistical analysis for network attacks detection. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu, Erez Zadok An electric fence for kernel buffers. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, file systems, buffer overflow
18Yi Xin, Binxing Fang, Xiao-chun Yun, Hai-Yong Chen Worm Detection in Large Scale Network by Traffic. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network Security, Statistic, Network Traffic, Worm Detection
18Archana Pasupulati, Jason Coit, Karl N. Levitt, Shyhtsun Felix Wu, S. H. Li, J. C. Kuo, K. P. Fan Buttercup: on network-based detection of polymorphic buffer overflow vulnerabilities. Search on Bibsonomy NOMS (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Jintao Xiong ACT: attachment chain tracing scheme for email virus detection and control. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF contact tracing, transmission chain, worm defense
18Fidel Aznar Gregori, Maria Del Mar Pujol López, Ramón Rizo Aldeguer, Pablo Suau Pérez A New Artificial Life Formalization Model: A Worm with a Bayesian Brain. Search on Bibsonomy KELSI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Life Formalization Model, Artificial Life, Bayesian Programming
18Todd S. Sproull, John W. Lockwood Distributed Instrusion Prevention in Active and Extensible Networks. Search on Bibsonomy IWAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Charles Higby, Michael Bailey Wireless security patch management system. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, wireless, configuration, update, worm, patch, virus, administration
18Guofei Gu, Monirul Islam Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley Worm Detection, Early Warning and Response Based on Local Victim Information. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, Larry L. Peterson Characteristics of internet background radiation. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF internet background radiation, network telescope, honeypot
18Jangha Kim, Kanghee Lee, Sangwook Kim, Jungtaek Seo, Eunyoung Lee, Miri Joo A High-Level Policy Description Language for the Network ACL. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Linda Briesemeister, Patrick Lincoln, Phillip A. Porras Epidemic profiles and defense of scale-free networks. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF computer epidemics, self-propagating malicious code, scale-free networks
18John W. Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection. Search on Bibsonomy IWAN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Hendrik Rama Turtle graphics: hidden features in APL2. Search on Bibsonomy APL The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
18Rajeev Sivaram, Ram Kesavan, Dhabaleswar K. Panda 0001, Craig B. Stunkel Where to Provide Support for Efficient Multicasting in Irregular Networks: Network Interface or Switch? Search on Bibsonomy ICPP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cut-through routing, performance evaluation, multicast, broadcast, collective communication, Parallel computer architecture, irregular networks, switch-based networks
18Ronald I. Greenberg, Hyeong-Cheol Oh Universal Wormhole Routing. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF area-universal networks, fat-tree interconnection network, Wormhole routing, packet routing, greedy routing, randomized routing
18Stefan Bock, Friedhelm Meyer auf der Heide, Christian Scheideler Optimal Wormhole Routing in the (n, d)-Torus. Search on Bibsonomy IPPS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
18Stav Cohen, Ron Bitton, Ben Nassi Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Angelos-Michael Papadopoulos, Paschalis Melissas, Anestis Kastellos, Panagiotis Katranitsiotis, Panagiotis Zaparas, Konstantinos Stavridis, Petros Daras TenebrioVision: A Fully Annotated Dataset of Tenebrio Molitor Larvae Worms in a Controlled Environment for Accurate Small Object Detection and Segmentation. Search on Bibsonomy ICPRAM The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
18Stanislav Frolík, Jaroslav Hrdina Local control of 2-link robotic worms based on additional symmetries. Search on Bibsonomy J. Frankl. Inst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Fu-Hau Hsu, Min-Hao Wu, Yanling Hwang, Jian-Xin Chen, Jian-Hong Huang, Hao-Jyun Wang, Yi-Wen Lai Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
18Thomas P. Ilett, Omer Yuval, Thomas Ranner, Netta Cohen, David C. Hogg 3D shape reconstruction of semi-transparent worms. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 827 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license