The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for worms with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1997 (21) 1998-2002 (21) 2003 (32) 2004 (67) 2005 (129) 2006 (115) 2007 (124) 2008 (94) 2009 (60) 2010 (26) 2011 (22) 2012-2013 (27) 2014 (16) 2015-2016 (20) 2017-2019 (22) 2020-2022 (18) 2023-2024 (13)
Publication types (Num. hits)
article(216) incollection(8) inproceedings(603)
Venues (Conferences, Journals, ...)
WORM(35) IEEE Secur. Priv.(18) ACSAC(15) RAID(15) CoRR(14) Comput. Secur.(13) CCS(9) DIMVA(9) ICC(9) IEEE Trans. Parallel Distribut...(9) INFOCOM(9) IPCCC(9) ISI(9) J. Comput. Virol.(8) PADS(8) Computer(7) More (+10 of total 437)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 783 occurrences of 399 keywords

Results
Found 836 publication records. Showing 827 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18Jayamsakthi Shanmugam, M. Ponnavaikko XSS application worms: New Internet infestation and optimized protective measures. Search on Bibsonomy SNPD (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Sijung Kim, Geuk Lee, Bonghan Kim The Design and Testing of Automated Signature Generation Engine for Worms Detection. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Chanan Glezer, Yuval Shahar, Yuval Elovici Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining. Search on Bibsonomy CISDA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Srinivas Shakkottai, R. Srikant 0001 Peer to Peer Networks for Defense Against Internet Worms Search on Bibsonomy CoRR The full citation details ... 2006 DBLP  BibTeX  RDF
18Gregory P. Schaffer Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Nicholas Weaver, Dan Ellis White Worms Don't Work. Search on Bibsonomy login Usenix Mag. The full citation details ... 2006 DBLP  BibTeX  RDF
18Byungseung Kim, Saewoong Bahk, Hyogon Kim FDF: Frequency Detection-Based Filtering of Scanning Worms. Search on Bibsonomy ICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Ping Wang, Binxing Fang, Xiao-chun Yun A User Habit Based Approach to Detect and Quarantine Worms. Search on Bibsonomy ICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Nei Kato, Yoshiaki Nemoto An Efficient Signature-Based Approach for Automatic Detection of Internet Worms over Large-Scale Networks. Search on Bibsonomy ICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Michael P. Collins, Carrie Gates, Gaurav Kataria A Model for Opportunistic Network Exploits: The Case of P2P Worms. Search on Bibsonomy WEIS The full citation details ... 2006 DBLP  BibTeX  RDF
18Zhijun Liu, Guoqiang Shu, Na Li, David Lee 0001 Defending against Instant Messaging Worms. Search on Bibsonomy GLOBECOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Kumar Simkhada, Tarik Taleb, Yuji Waizumi, Abbas Jamalipour, Kazuo Hashimoto, Nei Kato, Yoshiaki Nemoto A Multi-level Security Based Autonomic Parameter Selection Approach for an Effective and Early Detection of Internet Worms. Search on Bibsonomy GLOBECOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Wei Yu 0002, Xun Wang, Dong Xuan, David Lee Effective Detection of Active Worms with Varying Scan Rate. Search on Bibsonomy SecureComm The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Bradley Stephenson, Biplab Sikdar 0001 A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms. Search on Bibsonomy INFOCOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Ayalvadi J. Ganesh, Dinan Gunawardena, Peter B. Key, Laurent Massoulié, Jacob Scott Efficient Quarantining of Scanning Worms: Optimal Detection and Coordination. Search on Bibsonomy INFOCOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Yvo Desmedt Trojan Horses, Computer Viruses and Worms. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Lorenzo Carlucci Worms, gaps, and hydras. Search on Bibsonomy Math. Log. Q. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Feng Yang, Hai-Xin Duan, Xing Li 0001 Modeling and analyzing of the interaction between worms and antiworms during network worm propagation. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Stephanie Wehner Analyzing Worms and Network Traffic using Compression Search on Bibsonomy CoRR The full citation details ... 2005 DBLP  BibTeX  RDF
18Nathanael Paul A Closer Look at Viruses and Worms. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18George Ledin Jr. Not teaching viruses and worms is harmful. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Sihan Qing, Weiping Wen A survey and trends on Internet worms. Search on Bibsonomy Comput. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Peng Han, Yong Tan The Spread of Internet Worms and the Optimal Patch Release Strategies. Search on Bibsonomy AMCIS The full citation details ... 2005 DBLP  BibTeX  RDF
18Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Randy H. Katz Analyzing Cooperative Containment of Fast Scanning Worms. Search on Bibsonomy SRUTI The full citation details ... 2005 DBLP  BibTeX  RDF
18Periklis Akritidis, Kostas G. Anagnostakis, Evangelos P. Markatos Efficient content-based detection of zero-day worms. Search on Bibsonomy ICC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18David Whyte, Evangelos Kranakis, Paul C. van Oorschot DNS-based Detection of Scanning Worms in an Enterprise Network. Search on Bibsonomy NDSS The full citation details ... 2005 DBLP  BibTeX  RDF
18Simon Stegmaier, Ulrich Rist, Thomas Ertl Opening the Can of Worms: An Exploration Tool for Vortical Flows. Search on Bibsonomy IEEE Visualization The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Flow Features, Vortex Detection, 3D Vector Field Visualization, Interactive Manipulation
18Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Kurt Rohloff, Tamer Basar Stochastic behavior of random constant scanning worms. Search on Bibsonomy ICCCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18E. Eugene Schultz Worms and viruses: are we losing control? Search on Bibsonomy Comput. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Alvaro A. Cárdenas, John S. Baras, Vahid Ramezani Distributed change detection for worms, DDoS and other network attacks. Search on Bibsonomy ACC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Nicholas Weaver, Stuart Staniford, Vern Paxson Very Fast Containment of Scanning Worms. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2004 DBLP  BibTeX  RDF
18Jiang Wu, Sarma Vangala, Lixin Gao 0001, Kevin A. Kwiat An Effective Architecture and Algorithm for Detecting Worms with Various Scan. Search on Bibsonomy NDSS The full citation details ... 2004 DBLP  BibTeX  RDF
18Cliff Changchun Zou, Donald F. Towsley, Weibo Gong Email Worms Modeling and Defense. Search on Bibsonomy ICCCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Nicholas Weaver, Dan Ellis, Stuart Staniford, Vern Paxson Worms vs. perimeters: the case for hard-LANs. Search on Bibsonomy Hot Interconnects The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Elias Levy The Making of a Spam Zombie Army: Dissecting the Sobig Worms. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF sobig, spam, attack, worm, infect
18Martin Karresand Separating Trojan Horses from Viruses and Worms - A Proposed Taxonomy of Software Weapons. Search on Bibsonomy IAW The full citation details ... 2003 DBLP  BibTeX  RDF
18Zesheng Chen, Lixin Gao 0001, Kevin A. Kwiat Modeling the Spread of Active Worms. Search on Bibsonomy INFOCOM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18David Moore 0001 Network Telescopes: Tracking Denial-of-Service Attacks and Internet Worms Around the Globe. Search on Bibsonomy LISA The full citation details ... 2003 DBLP  BibTeX  RDF
18Prabhat K. Singh, Arun Lakhotia Analysis and Detection of Computer Viruses and Worms: An Annotated Bibliography. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
18M. E. Kabay Viruses and worms: more than a technical problem. Search on Bibsonomy Ubiquity The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Xiaodong Wang 0002, Ming Xu, Xingming Zhou Fast multicast on multistage interconnection networks using multi-head worms. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
18Markus Eiden, Christoph Holtwiesche Schulalltag im Intranet - Aufbau und Anwendung eines Intranet am Bildungszentrum Worms. Search on Bibsonomy LOG IN The full citation details ... 1999 DBLP  BibTeX  RDF
18Dhabaleswar K. Panda 0001 Fast barrier synchronization in wormhole k-ary n-cube networks with multidestination worms. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
18Dhabaleswar K. Panda 0001 Fast Barrier Synchronization in Wormhole k-ary n-cube Networks with Multidestination Worms. Search on Bibsonomy HPCA The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
18Thomas A. Longstaff, E. Eugene Schultz Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious code. Search on Bibsonomy Comput. Secur. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
18Amotz Bar-Noy, Prabhakar Raghavan, Baruch Schieber, Hisao Tamaki Fast Deflection Routing for Packets and Worms (Extended Summary). Search on Bibsonomy PODC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
18Frederick B. Cohen A formal definition of computer worms and some related results. Search on Bibsonomy Comput. Secur. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
18Gert Bär CAD of worms and their machining tools. Search on Bibsonomy Comput. Graph. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
18Caterina De Simone, Mario Lucertini, Stefano Pallottino, Bruno Simeone Fair dissections of spiders, worms, and caterpillars. Search on Bibsonomy Networks The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
18Clinton E. White Jr. Viruses and worms: A campus under attack. Search on Bibsonomy Comput. Secur. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
16Quyen L. Nguyen, Arun Sood A Comparison of Intrusion-Tolerant System Architectures. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF D.0 General, D.2.4.d Formal methods, D.4.6.a Access controls, D.4.6.b Authentication, K.4.4.f Security, K.4.4.g Internet security policies, K.6.5.a Authentication, K.6.5.c Invasive software (viruses, worms, Trojan horses), K.6.5.e Unauthorized access (hacking, phreaking), K.6.m.b Security, C.4.f Reliability, D.2.9.m Risk management, D.4.5.e High availability, D.4.6.d Information flow controls, Data exfiltration, Intrusion Tolerance, availability and serviceability
16Ziyad S. Al-Salloum, Stephen D. Wolthusen Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Beneficial Computer Worms, Vulnerability Discovery, Self-replicating code
16George Lawton On the Trail of the Conficker Worm. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conficker, Malware, Worms, Buffer overflow, Security and privacy
16Yu Yao, Yong Li, Fuxiang Gao, Ge Yu 0001 A Signature-Behavior-Based P2P Worm Detection Approach. Search on Bibsonomy HIS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF P2P worms, characteristic string matching, suffix array algorithm, reorganization of characteristic string, worm detection
16Beatrice Cynthia Dhinakaran, Jae-Kwang Lee, Dhinaharan Nagamalai "Reminder: please update your details": Phishing Trends. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF worms and trojon, spam, Phishing, virus, social engineering
16Aurélien Francillon, Claude Castelluccia Code injection attacks on harvard-architecture devices. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF harvard architecture, return oriented programming, wireless sensor networks, buffer overflow, embedded devices, computer worms, code injection attacks, gadgets
16Olalekan Adeyinka Internet Attack Methods and Internet Security Technology. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, Cryptography, Integrity, Intrusion Detection Systems (IDS), Confidentiality, Firewall, Worms, Virus
16Sapon Tanachaiwiwat, Ahmed Helmy On the performance evaluation and prediction of encounter-based worm interactions based on node characteristics. Search on Bibsonomy Challenged Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encounter-based worms, delay-tolerant networks, worm
16Alberto Avritzer, Robert G. Cole, Elaine J. Weyuker Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs. Search on Bibsonomy WOSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile ad hoc networks (MANETS), software monitoring, computer worms, mitigation
16David Alan Grier The Benefits of Being Different. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computers and society, Computing technology, Internet worms
16Jedidiah R. Crandall, Shyhtsun Felix Wu, Frederic T. Chong Minos: Architectural support for protecting control data. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Control data, worms, buffer overflow
16Brett J. L. Landry, M. Scott Koger Dispelling 10 common disaster recovery myths: Lessons learned from Hurricane Katrina and other disasters. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF worms, viruses, software failures, backups, disaster recovery, network attacks, IT curricula, Hardware failures, business continuity
16Songjie Wei, Jelena Mirkovic A realistic simulation of internet-scale events. Search on Bibsonomy VALUETOOLS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed simulation, worms, simulation and modeling, invasive software
16Daniela Alvim Seabra de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shyhtsun Felix Wu, Zhendong Su 0001, Frederic T. Chong ExecRecorder: VM-based full-system replay for attack analysis and system recovery. Search on Bibsonomy ASID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtual machines, recovery, malware, worms, replay, invasive software
16Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker Finding diversity in remote code injection exploits. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF binary emulation, malware classification, worms, phylogeny, bots
16Arun Lakhotia, Eric Uday Kumar, Michael Venable A Method for Detecting Obfuscated Calls in Malicious Binaries. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Invasive software (viruses, worms), abstract stack, validation, program analysis, obfuscation
16Bruce Schneier The Zotob Storm. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Zotob, network security, worms, patches, defense
16Min Cai, Kai Hwang 0001, Yu-Kwong Kwok, Shanshan Song, Yu Chen 0002 Collaborative Internet Worm Containment. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, anomaly detection, distributed hash tables, DHT, overlay networks, distributed denial-of-service, DDoS attacks, Internet worms, signature generation
16Philip L. Campbell The Denial-of-Service Dance. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network denial of service, Trinoo, TFN, Smurf, UDP flood, Land, Targa, denial of service, worms, distributed denial of service, SYN flood, spoofing
16Vijay Karamcheti, Davi Geiger, Zvi M. Kedem, S. Muthukrishnan 0001 Detecting malicious network traffic using inverse distributions of packet contents. Search on Bibsonomy MineNet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF inverse distribution, worms, content analysis
16Iván Arce, Gary McGraw Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF attacking systems, patterns, toolkits, malware, worms, viruses
16Laurianne McLaughlin Bot Software Spreads, Causes New Worries. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, worms, spyware, viruses, bots
16Phillip A. Porras, Linda Briesemeister, Keith Skinner, Karl N. Levitt, Jeff Rowe, Yu-Cheng Allen Ting A hybrid quarantine defense. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network modeling and simulation, worm detection systems, network security, worms
9D. J. Capelis, Darrell D. E. Long Fived: a service-based architecture implementation to innovate at the endpoints. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF fived, session layer, network design, network architecture, sessions
9Yoav Freund Data winnowing. Search on Bibsonomy KDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data mining
9N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar Can we certify systems for freedom from malware. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
9Victor P. Roche, Unai Arronategui Behavioural Characterization for Network Anomaly Detection. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Pavel V. Zbitskiy Code mutation techniques by means of formal grammars and automatons. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Vinod P. Nair, Vijay Laxmi, Manoj Singh Gaur, G. V. S. S. Phani Kumar, Yadvendra S. Chundawat Static CFG analyzer for metamorphic Malware code. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF metamorphic malware, normalization, obfuscation, control flow graph, longest common subsequence
9Stephen Smaldone, Vinod Ganapathy, Liviu Iftode Working set-based access control for network file systems. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, network file system
9James Newsome, Stephen McCamant, Dawn Song Measuring channel capacity to distinguish undue influence. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF model counting, quantitative information flow, channel capacity
9Beatrice Cynthia Dhinakaran, Dhinaharan Nagamalai, Jae-Kwang Lee Bayesian Approach Based Comment Spam Defending Tool. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF comment spam, blog spam, spam, Bayesian Algorithm
9Boris Rozenberg, Ehud Gudes, Yuval Elovici SISR - A New Model for Epidemic Spreading of Electronic Threats. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Seiji Shibaguchi, Yuki Nakayama, Ken-ichi Okada Worm Path Identification Using Visualization System. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Karthik Channakeshava, Deepti Chafekar, Keith R. Bisset, V. S. Anil Kumar 0001, Madhav V. Marathe EpiNet: a simulation framework to study the spread of malware in wireless networks. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF activity-based, wireless epidemics, Bluetooth, malware
9Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer Jr., Jungha Woo, Elisa Bertino Privacy-preserving management of transactions' receipts for mobile environments. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF registrar, transaction record, privacy
9Yang Xiang, Qiang Li 0008, Dong Guo 0002 Online Accumulation: Reconstruction of Worm Propagation Path. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Propagation path, Online tracing, Worm, Containment
9Zhuowei Li 0001, XiaoFeng Wang 0001, Zhenkai Liang, Michael K. Reiter AGIS: Towards automatic generation of infection signatures. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Wei Yu 0002, Nan Zhang 0004, Xinwen Fu, Riccardo Bettati, Wei Zhao 0001 On localization attacks to Internet Threat Monitors: An information-theoretic framework. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni A data mining approach for analysis of worm activity through automatic signature generation. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automatic signature generation, malware identification, data mining, intrusion detection, honeypots
9Himanshu Agrawal, Andrew Jennings, Mark A. Gregory, Daud Channa Robust Routing. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Robust Routing, Oblivious Routing, Traffic Matrix
9C. V. Ramamoorthy Issues and Models of Security Oriented Systems. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Daniela Alvim Seabra de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shaozhi Ye, Shyhtsun Felix Wu, Zhendong Su 0001, Frederic T. Chong Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Tomohiro Kobori, Hiroaki Kikuchi, Masato Terada Internet Observation with ISDAS: How Long Does a Worm Perform Scanning? Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF port-scan Poisson distribution
9Irfan Ahmed 0001, Kyung-suk Lhee Detection of Malcodes by Packet Classification. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Elie Bursztein NetQi: A Model Checker for Anticipation Game. Search on Bibsonomy ATVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Jiao Wang, Yajian Zhou, Yixian Yang, Xinxin Niu Classify the Majority of the Total Bytes on the Internet. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Fengtao Xiao, Huaping Hu, Xin Chen, Bo Liu 0014 ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 827 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license