The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for worm with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1991 (15) 1992-1995 (15) 1996-1998 (22) 1999-2001 (28) 2002 (19) 2003 (147) 2004 (188) 2005 (124) 2006 (137) 2007 (115) 2008 (108) 2009 (83) 2010 (42) 2011 (28) 2012 (32) 2013 (34) 2014 (24) 2015 (23) 2016 (26) 2017 (21) 2018 (24) 2019 (30) 2020 (20) 2021 (37) 2022 (26) 2023 (31) 2024 (2)
Publication types (Num. hits)
article(378) incollection(2) inproceedings(1006) phdthesis(9) proceedings(6)
Venues (Conferences, Journals, ...)
OTM Workshops(203) WORM(46) CoRR(27) ICC(19) IEEE Secur. Priv.(16) RAID(15) INFOCOM(13) GLOBECOM(11) J. Comput. Virol.(11) CCS(10) ISI(10) ACSAC(9) Comput. Secur.(9) Computer(9) DSN(9) IEEE Trans. Parallel Distribut...(9) More (+10 of total 632)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 869 occurrences of 475 keywords

Results
Found 1425 publication records. Showing 1401 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Hongshan Kong, Mingqing Zhang, Jun Tang, Changyuan Luo The Research of Simulation for Network Security Based on System Dynamics. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Mohammad Reza Faghani, Hossein Saidi 0001 Social Networks' XSS Worms. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18David M. Nicol Efficient simulation of Internet worms. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF simulation, modeling, denial-of-service, Worms
18Jaeyeon Jung, Rodolfo A. Milito, Vern Paxson On the adaptive real-time detection of fast-propagating network worms. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Elizabeth Van Ruitenbeek, William H. Sanders Modeling Peer-to-Peer Botnets. Search on Bibsonomy QEST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Nikita Borisov, Soumyadeb Mitra Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Thomas Panas Signature visualization of software binaries. Search on Bibsonomy SOFTVIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malware visualization, binary analysis
18Parbati K. Manna, Sanjay Ranka, Shigang Chen DAWN: A Novel Strategy for Detecting ASCII Worms in Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Xinxiang Wang, Guoqing Hu, Haifeng Zhou A Feasibility Study of the Design and Calculation of Fully Hydraulic Paper Cutting Machine System. Search on Bibsonomy ICIRA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Paper cutting machine, fully hydraulic control, design and calculation, hydraulic circuit, Motor
18Christophe Restif, Dimitris N. Metaxas Tracking the Swimming Motions of C. elegansWorms with Applications in Aging Studies. Search on Bibsonomy MICCAI (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Hiroaki Kikuchi, Naoya Fukuno, Tomohiro Kobori, Masato Terada, Tangtisanon Pikulkaew Automated Classification of Port-Scans from Distributed Sensors. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF classification, sensor, port-scan
18Soumyadeb Mitra, Marianne Winslett, Nikita Borisov Deleting index entries from compliance storage. Search on Bibsonomy EDBT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Nick G. Duffield, Carsten Lund, Mikkel Thorup Priority sampling for estimation of arbitrary subset sums. Search on Bibsonomy J. ACM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Subset sum estimation, reservoir sampling, sampling without replacement, weighted sampling
18Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada Detection of Silent Worms using Anomaly Connection Tree. Search on Bibsonomy AINA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Maziar M. Nekovee Epidemic Spreading of Computer Worms in Fixed Wireless Networks. Search on Bibsonomy BIOWIRE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless Computer Worms, Epidemic Spreading, Complex Networks, Modelling and Simulations
18Siming Lin, Xueqi Cheng, Jianming Lv A Visualized Parallel Network Simulator for Modeling Large-Scale Distributed Applications. Search on Bibsonomy PDCAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IM.Myspace04.AIM, Broadband services, Instant messaging, Internet security, Internet security, Hackers, Domain names
18Christopher Griffin 0001, Richard R. Brooks A note on the spread of worms in scale-free networks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Cliff Changchun Zou, Nick G. Duffield, Donald F. Towsley, Weibo Gong Adaptive Defense Against Various Network Attacks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Brushing and Linking, Intrusion Detection, Interactive System, Dynamic Query, Security Visualization, Correlation Matrix
18Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Jingbo Hao, Jianping Yin, Boyun Zhang A Computational Model of Computer Worms Based on Persistent Turing Machines. Search on Bibsonomy IEEE ICCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Attila Ondi A drawback of current anti-virus simulations: the need for background traffic. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF background traffic, virus-spread simulation
18Songjie Wei, Jelena Mirkovic A realistic simulation of internet-scale events. Search on Bibsonomy VALUETOOLS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed simulation, worms, simulation and modeling, invasive software
18Jörg Schneider 0001, Barry Linnert, Lars-Olof Burchard Distributed Workflow Management for Large-Scale Grid Environments. Search on Bibsonomy SAINT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18James Newsome, Brad Karp, Dawn Xiaodong Song Paragraph: Thwarting Signature Learning by Training Maliciously. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Seung-Jae Yoo, Kuinam J. Kim Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada ACTM: Anomaly Connection Tree Method to detect Silent Worms. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Thomas Gamer, Marcus Schöller, Roland Bless An Extensible and Flexible System for Network Anomaly Detection. Search on Bibsonomy Autonomic Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Anomaly Detection, DDoS Attacks, Programmable Networks
18Daniela Brauckhoff, Bernhard Tellenbach, Arno Wagner, Martin May, Anukool Lakhina Impact of packet sampling on anomaly detection metrics. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly detection, sampling, network traffic analysis
18Yousof Al-Hammadi, Christopher Leckie Anomaly detection for Internet worms. Search on Bibsonomy Integrated Network Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Parminder Chhabra, Ajita John, Huzur Saran PISA: Automatic Extraction of Traffic Signatures. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Traffic Clusters, Security, Signatures, Worms, DDoS
18Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 IDGraphs: Intrusion Detection and Analysis Using Histographs. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Brushing and Linking, Visualization, Intrusion Detection, Interactive System, Dynamic Query, Correlation Matrix
18Everett Anderson, Kevin Eustice, Shane Markstrum, Mark H. Hansen, Peter L. Reiher Mobile Contagion: Simulation of Infection and Defense. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Yong Tang 0004, Shigang Chen Defending against Internet worms: a signature-based approach. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Johannes Kinder, Stefan Katzenbeisser 0001, Christian Schallhart, Helmut Veith Detecting Malicious Code by Model Checking. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Model Checking, Malware Detection
18Fidel Aznar Gregori, Mar Pujol López, Ramón Rizo Aldeguer Specifying Complex Systems with Bayesian Programming. An Alife Application. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Complex Systems Modeling, Artificial Life Formalization Model, Bayesian Programming
18Seung-Jae Yoo Core Technology Analysis and Development for the Virus and Hacking Prevention. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Ram Dantu, João W. Cangussu An Architecture for Network Security Using Feedback Control. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Ruo Ando, Yoshiyasu Takefuji Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-debugging mode, real-time nullification, debug register, improved debug exception handler, branchIP recorder
18Francisco Prosdocimi, José Miguel Ortega Diet as a Pressure on the Amino Acid Content of Proteomes. Search on Bibsonomy BSB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger Dynamic Quarantine of Internet Worms. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Ka-Ping Yee Secure Interaction Design. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Todd S. Sproull, John W. Lockwood Distributed Instrusion Prevention in Active and Extensible Networks. Search on Bibsonomy IWAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18David Harel A Grand Challenge for Computing: Towards Full Reactive Modeling of a Multi-cellular Animal. Search on Bibsonomy VMCAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Riccardo Scandariato, John C. Knight The Design and Evaluation of a Defense System for Internet Worms. Search on Bibsonomy SRDS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Giuseppe Serazzi, Stefano Zanero Computer Virus Propagation Models. Search on Bibsonomy MASCOTS Tutorials The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Seung-Bum Hong, Won Nah, Joong-Hwan Baek Automatic Classification and Clustering of Caenorhabditis Elegans Using a Computer Vision System. Search on Bibsonomy IDEAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Clustering, Classification, Computer Vision, C. elegans
18Rajeev Sivaram, Ram Kesavan, Dhabaleswar K. Panda 0001, Craig B. Stunkel Architectural Support for Efficient Multicasting in Irregular Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cut-through routing, performance evaluation, multicast, broadcast, collective communication, Parallel computer architecture, irregular networks, switch-based networks
18Gerd Lanfermann, Gabrielle Allen, Thomas Radke, Edward Seidel Nomadic Migration: A New Tool for Dynamic Grid Computing. Search on Bibsonomy HPDC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Rajeev Sivaram, Ram Kesavan, Dhabaleswar K. Panda 0001, Craig B. Stunkel Where to Provide Support for Efficient Multicasting in Irregular Networks: Network Interface or Switch? Search on Bibsonomy ICPP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cut-through routing, performance evaluation, multicast, broadcast, collective communication, Parallel computer architecture, irregular networks, switch-based networks
18Paul G. Spirakis, Basil Tampakas, Hera Antonopoulou Distributed Protocols Against Mobile Eavesdroppers. Search on Bibsonomy WDAG The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Theory of Distributed Computation, Privacy and Security, Algorithms and Data Structures
18Luis Gravano, Gustavo D. Pifarré, Pablo E. Berman, Jorge L. C. Sanz Adaptive Deadlock- and Livelock-Free Routing with All Minimal Paths in Torus Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF adaptive deadlock-free routing, livelock-free routing, n-dimensional torus network, packet-switched fully-adaptive minimal routing, 4-Classes, dynamic message injectionmodel, performance evaluation, concurrency control, multiprocessor interconnection networks, virtual channels, Channels, torus networks, buffer requirement, minimal paths, traffic patterns, message lengths
18David B. Lomet, Betty Salzberg Access Methods for Multiversion Data. Search on Bibsonomy SIGMOD Conference The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
16Stav Cohen, Ron Bitton, Ben Nassi Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Yusei Sato, Yanhong Peng, Yuki Funabora, Shinji Doki Funabot-Finger Cot: Bio-Inspired Worm Robot for Peristaltic Wave Locomotion and Tubular Structure Climbing. Search on Bibsonomy SII The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16V. MadhuSudanan, R. Geetha, B. S. N. Murthy, Nhu-Ngoc Dao, Sungrae Cho Analysis of Delay-Aware Worm Propagation Model in Wireless IoT Systems With Ratio-Dependent Functional Response. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Muhammad Sulaiman 0001, Awais Khan 0009, Addisu Negash Ali, Ghaylen Laouini, Fahad Sameer Alshammari Quantitative Analysis of Worm Transmission and Insider Risks in Air-Gapped Networking Using a Novel Machine Learning Approach. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Bo Sun 0002, Zeyu Wu, Qiang Feng, Zili Wang, Yi Ren 0003, Dezhen Yang, Quan Xia Small Sample Reliability Assessment With Online Time-Series Data Based on a Worm Wasserstein Generative Adversarial Network Learning Method. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Hongwei Wang, Yaqi Liu, Zongyi Mu, Jiawei Xiang, Jian Li Real-time precision reliability prediction for the worm drive system supported by digital twins. Search on Bibsonomy Reliab. Eng. Syst. Saf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Zizhen Zhang, V. Madhusudanan, B. S. N. Murthy Effect of Delay in SMS Worm Propagation in Mobile Network with Saturated Incidence Rate. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16V. Bibin Christopher, R. Isaac Sajan, T. S. Akhila, M. Joselin Kavitha A QoS Aware Three Way Point Rule based Fusion of Earth Worm and Deer Hunt Optimization Routing in Wireless Sensor Network. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Sean Even, Yasemin Ozkan Aydin Locomotion and Obstacle Avoidance of a Worm-like Soft Robot. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Fatima Adilova, Uygun Jamilov, Andrejs Reinfelds On discrete-Time Models of Network Worm Propagation Generated by quadratic operators. Search on Bibsonomy Math. Model. Anal. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16M. Reji, Christeena Joseph, K. Thaiyalnayaki, R. Lathamanju Genetic-based Fuzzy IDS for Feature Set Reduction and Worm Hole Attack Detection. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Govind Vashishtha, Sumika Chauhan, Surinder Kumar, Rajesh Kumar 0011, Radoslaw Zimroz, Anil Kumar 0005 Intelligent fault diagnosis of worm gearbox based on adaptive CNN using amended gorilla troop optimization with quantum gate mutation strategy. Search on Bibsonomy Knowl. Based Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Tianbo Wang, Huacheng Li, Chunhe Xia, Han Zhang 0009, Pei Zhang 0003 From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Ruiling Wang, Yakui Xue Stability analysis and optimal control of worm propagation model with saturated incidence rate. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16P. S. Ramesh, P. Srivani, Miroslav Mahdal, Lingala Sivaranjani, Shafiqul Abidin, Shivakumar Kagi, Muniyandy Elangovan Contextual Cluster-Based Glow-Worm Swarm Optimization (GSO) Coupled Wireless Sensor Networks for Smart Cities. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Taishi Mikami, Daiki Wakita, Ryo Kobayashi, Akio Ishiguro, Takeshi Kano Elongating, entwining, and dragging: mechanism for adaptive locomotion of tubificine worm blobs in a confined environment. Search on Bibsonomy Frontiers Neurorobotics The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Pablo E. Layana Castro, Antonio García Garví, Francisco Navarro Moya, Antonio-José Sánchez-Salmerón Skeletonizing Caenorhabditis elegans Based on U-Net Architectures Trained with a Multi-worm Low-Resolution Synthetic Dataset. Search on Bibsonomy Int. J. Comput. Vis. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Sean Even, Yasemin Ozkan Aydin Locomotion and Obstacle Avoidance of a Worm-Like Soft Robot. Search on Bibsonomy IROS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Zhiyu Jin, Hanyang Yu, Chen Haul, Linxiang Wang, Zuobin Zhu, Qiu Shen, Xun Cao WormTrack: Dataset and Benchmark for Multi-Object Tracking in Worm Crowds. Search on Bibsonomy ACM Multimedia The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Eric Xu, Alex S. Xu, Danny Ferreira, Lin Deng 0001 A Hands-on Digital Forensic Lab to Investigate Morris Worm Attack. Search on Bibsonomy SIGCSE (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Sijie Zhou, Binbin Li, Bin Jiao, Haozhe Ling, Ruiyao Guo Fault Diagnosis of Tapered Bearing in Elevator Worm Gear Reducer Based on Vibration Signal. Search on Bibsonomy ICITEE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Wenqiang Huang, Wanfeng Shang, Yulu Li, Xiaofei Liu, Xinyu Wu 0001 Biomimetic multi-segment worm robot based on shape memory alloy wire. Search on Bibsonomy RCAR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Shane Riddle, Clayton Jackson, Kathryn A. Daltorio, Roger D. Quinn A Dynamic Simulation of a Compliant Worm Robot Amenable to Neural Control. Search on Bibsonomy Living Machines (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Tarun Sharma, Khushi Patni, Zhida Li, Ljiljana Trajkovic Deep Echo State Networks for Detecting Internet Worm and Ransomware Attacks. Search on Bibsonomy ISCAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Zizhen Zhang, Weishi Zhang, Anwar Zeb Hopf Bifurcation of a Delayed SVEIS Worm Propagation Model with Nonlinear Incidence Rate. Search on Bibsonomy ICCSA (Workshops 1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Yue Deng, Yongzhen Pei, Changguo Li Parameter estimation of a susceptible-infected-recovered-dead computer worm model. Search on Bibsonomy Simul. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Tianbo Wang, Chunhe Xia, Xiaojian Li, Yang Xiang 0001 Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Dániel Gerbner, Balázs Patkós, Zsolt Tuza, Máté Vizer Singular Turán numbers and WORM-colorings. Search on Bibsonomy Discuss. Math. Graph Theory The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Krishnan Gopinath, Gopalakrishnan Narayanamurthy Early bird catches the worm! Meta-analysis of autonomous vehicles adoption - Moderating role of automation level, ownership and culture. Search on Bibsonomy Int. J. Inf. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16S. Deepika, S. Senthil Credit card fraud detection using moth-flame earth worm optimisation algorithm-based deep belief neural network. Search on Bibsonomy Int. J. Electron. Secur. Digit. Forensics The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Beledha Santhosh Kumar, Polipalli Trinatha Rao Cell zooming-based fault identification and optimal routing using glow worm-satin bowerbird optimisation. Search on Bibsonomy Int. J. Ultra Wideband Commun. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16N. Godwin Raja Ebenezer, S. Ramabalan, S. Navaneethasanthakumar Advanced power optimization of worm gear drive with profile shift using nature inspired algorithms. Search on Bibsonomy Int. J. Syst. Assur. Eng. Manag. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Xiaomin Liu, Maozheng Song, Yuhui Fang, Yunwei Zhao, Changyong Cao Worm-Inspired Soft Robots Enable Adaptable Pipeline and Tunnel Inspection. Search on Bibsonomy Adv. Intell. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Mazoon Hashil Al Rubaiei, Hothefa Shaker Jassim, Baraa T. Sharef Performance analysis of black hole and worm hole attacks in MANETs. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16M. R. Suma, P. Madhumathy Brakerski-Gentry-Vaikuntanathan fully homomorphic encryption cryptography for privacy preserved data access in cloud assisted Internet of Things services using glow-worm swarm optimization. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Xiangnan Pan, Shingo Yamaguchi Machine Learning White-Hat Worm Launcher for Tactical Response by Zoning in Botnet Defense System. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16David Fernández-Duque, Joost J. Joosten, Fedor Pakhomov, Konstnatinos Papafilippou, Andreas Weiermann Arithmetical and Hyperarithmetical Worm Battles. Search on Bibsonomy J. Log. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Xiangnan Pan, Shingo Yamaguchi, Taku Kageyama, Mohd Hafizuddin Bin Kamilin Machine-Learning-Based White-Hat Worm Launcher in Botnet Defense System. Search on Bibsonomy Int. J. Softw. Sci. Comput. Intell. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Xiangnan Pan, Shingo Yamaguchi A DBSCAN-based White-Hat Worm Launcher for Botnet Defense System. Search on Bibsonomy LifeTech The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Dylan Drotman, Shivam Chopra, Nick Gravish, Michael Thomas Tolley Anisotropic Forces for a Worm-Inspired Digging Robot. Search on Bibsonomy RoboSoft The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Shilan S. Hameed, Ali Selamat, Liza Abdul Latiff, Shukor Abd Razak, Ondrej Krejcar Multi-Classification of Imbalance Worm Ransomware in the IoMT System. Search on Bibsonomy SoMeT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Zhihai Bi, Jian Xu 0005, Hongbin Fang Design and path planning for a Worm-Snake-Inspired Metameric(WSIM) Robot. Search on Bibsonomy ROBIO The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Pengmin Li, Shi Yu, Liang Xiao 0003 Smart Grid Worm Detection Based on Deep Reinforcement Learning. Search on Bibsonomy ICCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Wei Ge A Dynamic Monitoring Method of Social Network Worm Attack Based on Improved Decision Tree. Search on Bibsonomy ADHIP (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16David Fernández-Duque, Konstnatinos Papafilippou, Joost J. Joosten Hyperarithmetical Worm Battles. Search on Bibsonomy LFCS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi Evaluation on White-Hat Worm Diffusion Method Based on The Evolution of Its Lifespan in Wireless Networks. Search on Bibsonomy ICCE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 1401 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license