The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for viruses with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-1989 (30) 1990-1992 (17) 1993-1994 (15) 1995-1997 (25) 1998-2001 (31) 2002 (22) 2003 (36) 2004 (69) 2005 (77) 2006 (94) 2007 (79) 2008 (64) 2009 (50) 2010 (23) 2011 (15) 2012 (21) 2013-2014 (32) 2015-2016 (24) 2017 (21) 2018 (27) 2019 (22) 2020 (35) 2021 (40) 2022 (33) 2023 (24) 2024 (2)
Publication types (Num. hits)
article(397) book(6) incollection(11) inproceedings(503) phdthesis(11)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 637 occurrences of 418 keywords

Results
Found 928 publication records. Showing 928 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Marc Lelarge, Jean Bolot Network externalities and the deployment of security features and protocols in the internet. Search on Bibsonomy SIGMETRICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, game theory, economics, price of anarchy, epidemics, cascading
10Masahiro Kimura, Kazumi Saito, Hiroshi Motoda Solving the Contamination Minimization Problem on Networks for the Linear Threshold Model. Search on Bibsonomy PRICAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Pinar Heggernes, Rodica Mihai Mixed Search Number of Permutation Graphs. Search on Bibsonomy FAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Masaki Nakanishi An FPGA Configuration Scheme for Bitstream Protection. Search on Bibsonomy ARC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA configuration, bitstream protection, bitstream encryption, bitstream authentication
10Tobias Eggendorfer Application Level Proxies on Bridges. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Network, Proxy, Bridge, Content Filter
10Yuji Sato, David E. Goldberg, Kumara Sastry Improving small population performance under noise with viral infection + tropism. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF deceptive problem, tropism, virus infection, genetic algorithms, multimodality, building block, noisy optimization
10Kelly Westbrooks, Irina Astrovskaya, David S. Campo, Yuri Khudyakov, Piotr Berman, Alexander Zelikovsky HCV Quasispecies Assembly Using Network Flows. Search on Bibsonomy ISBRA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Sirui Yang, Hai Jin 0001, Xiaofei Liao, Sanmin Liu Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Rose Epidemic, Modeling, Social Network, Portable Device
10Andrew W. Hill, Robert P. Guralnick Distributed Systems and Automated Biodiversity Informatics: Genomic Analysis and Geographic Visualization of Disease Evolution. Search on Bibsonomy BNCOD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Geophylogenies, H5N1 Avian Influenza, Human health, HyPhy, Viral evolution, Google Earth, Infectious Diseases, Biodiversity Informatics
10Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov Learning and Classification of Malware Behavior. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Najwa Aaraj, Anand Raghunathan, Niraj K. Jha Dynamic Binary Instrumentation-Based Framework for Malware Defense. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF control-data flow, execution context, dynamic binary instrumentation, virtualization, Malware
10M. Eric Johnson, Dan McGuire, Nicholas D. Willey The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera MAISim: mobile agent malware simulator. Search on Bibsonomy SimuTools The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer attacks, security, simulation, mobile agents, malware, critical infrastructures, ACM proceedings
10David Haussler Computing how we became human. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mammalian evolution, transposons, selection, genomes
10Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network intrusion detection, TCAM
10Robert Moskovitch, Clint Feher, Yuval Elovici Unknown malcode detection - A chronological evaluation. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici Unknown malcode detection via text categorization and the imbalance problem. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Xinli Huang, Futai Zou, Fan-Yuan Ma Targeted Local Immunization in Scale-Free Peer-to-Peer Networks. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF targeted local immunization, efficiency, peer-to-peer networks, cost, rate control, scale-free, overlay topology
10Stanley Phillips Gotshall, Kathy Browder, Jessica Sampson, Terence Soule, Richard Wells Stochastic optimization of a biologically plausible spino-neuromuscular system model. Search on Bibsonomy Genet. Program. Evolvable Mach. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Biological neural networks, Breeding swarm optimizers, Genetic algorithms, Particle swarm optimizers
10Benjamin Morin, Ludovic Mé Intrusion detection and virology: an analysis of differences, similarities and complementariness. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Chonho Lee, Hiroshi Wada, Junichi Suzuki Towards a Biologically-inspired Architecture for Self-Regulatory and Evolvable Network Applications. Search on Bibsonomy Advances in Biologically Inspired Information Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Tyrone Tai-On Kwok, Yu-Kwong Kwok Design and Evaluation of Parallel String Matching Algorithms for Network Intrusion Detection Systems. Search on Bibsonomy NPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein Highly efficient techniques for network forensics. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF payload attribution, bloom filter, network forensics
10Jean-Jacques Quisquater The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? Search on Bibsonomy SSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Luke Bellamy, Damien Hutchinson, Jason Wells User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Misha L. Rajaram, Vladimir N. Minin, Marc A. Suchard, Karin S. Dorman Hot and Cold: Spatial Fluctuation in HIV-1 Recombination Rates. Search on Bibsonomy BIBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Patricia Buendia Reconstructing Mutational Pathways from Serial Evolutionary Trees. Search on Bibsonomy BIBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Wojciech Zamojski, Dariusz Caban Maintenance Policy of a Network with Traffic Reconfiguration. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Stefan Dziembowski, Krzysztof Pietrzak Intrusion-Resilient Secret Sharing. Search on Bibsonomy FOCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Mansoor Ahmed, Amin Andjomshoaa, Tho Manh Nguyen, A Min Tjoa Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Leon Moonen, Spiros Mancoridis International Workshop on Code Based Software Security Assessments - CoBaSSA 2007. Search on Bibsonomy WCRE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Sangjin Kim, Changyong Lee, Daeyoung Kim 0004, Heekuck Oh A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols. Search on Bibsonomy ICDCIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Guoning Hu, Deepak Venugopal A Malware Signature Extraction and Detection Method Applied to Mobile Networks. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Lansheng Han, Shuxia Han, Bing Peng, Varney Washington Fuzzy Tracing the Source of Net-Virus. Search on Bibsonomy ICFIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Net-virus, fuzzy trace, network security
10Ying-Dar Lin, Po-Ching Lin, Meng-Fu Tsai, Tsao-Jiang Chang, Yuan-Cheng Lai kP2PADM: An In-kernel Gateway Architecture for Managing P2P Traffic. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Forensics and Evidence, internet attacks, website systems
10Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier Establishing Chain of Trust in Reconfigurable Hardware. Search on Bibsonomy FCCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Tutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira Performance Evaluation of a Multi-Stage Network Event Detection Scheme for Decreasing the False-Positive Rate for a Large Number of Simultaneous, Unknown Events. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi-Stage Network Anomaly Detection, Change-Point Detection, Large-Scale Simultaneous Event, Worm, Virus
10José Carlos Brustoloni, Ricardo Villamarín-Salomón Improving security decisions with polymorphic and audited dialogs. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF audited dialogs, context-sensitive guidance, e-mail client, polymorphic dialogs, virus propagation, attachment
10Nabil Abdennadher, Régis Boesch Deploying PHYLIP phylogenetic package on a Large Scale Distributed System. Search on Bibsonomy CCGRID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Helena Handschuh, Elena Trichina Securing Flash Technology. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). Search on Bibsonomy PM2HW2N The full citation details ... 2007 DBLP  DOI  BibTeX  RDF handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes
10Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda Design Issues of an Isolated Sandbox Used to Analyze Malwares. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Yudong Sun, Steve McKeever, Kia Balali-Mood, Mark S. P. Sansom A Multiscale Model for Efficient Simulation of a Membrane Bound Viral Fusion Peptide. Search on Bibsonomy BIBM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti E-Risk Management through Self Insurance: An Option Model. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-risk, option model, self-insurance, e-commerce, security breach
10Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, Edwin Hsing-Mean Sha Parallel Network Intrusion Detection on Reconfigurable Platforms. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Andreas Holzer, Johannes Kinder, Helmut Veith Using Verification Technology to Specify and Detect Malware. Search on Bibsonomy EUROCAST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Insu Kim, Keecheon Kim Secure Session Management Mechanism in VoIP Service. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Lifu Wang, Partha Dasgupta Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Nazli Goharian, Alana Platt DOTS: Detection of Off-Topic Search via Result Clustering. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Hadas Birin, Zohar Gal-Or, Isaac Elias, Tamir Tuller Inferring Models of Rearrangements, Recombinations, and Horizontal Transfers by the Minimum Evolution Criterion. Search on Bibsonomy WABI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF minimum evolution, genome rearrangements, recombinations, Phylogenetic network, horizontal gene transfer
10Geon Woo Kim 0001, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim Security Framework for Home Network: Authentication, Authorization, and Security Policy. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Authentication, Access Control, Authorization, Security Policy, Home Network
10Maziar M. Nekovee Epidemic Spreading of Computer Worms in Fixed Wireless Networks. Search on Bibsonomy BIOWIRE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless Computer Worms, Epidemic Spreading, Complex Networks, Modelling and Simulations
10Srivaths Ravi 0001, Stefan Mangard Tutorial T1: Designing Secure SoCs. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Lien Deboosere, J. De Wachter, Pieter Simoens, Filip De Turck, Bart Dhoedt, Piet Demeester Thin Client Computing Solutions in Low- and High-Motion Scenarios. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Qinghua Zhang, Douglas S. Reeves MetaAware: Identifying Metamorphic Malware. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Hailin Feng, Chenxi Shao Using Qualitative Technology for Modeling the Process of Virus Infection. Search on Bibsonomy LSMS (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Mark Thurmond, Andrés Perez, Chunju Tseng, Hsinchun Chen, Daniel Dajun Zeng Global Foot-and-Mouth Disease Surveillance Using BioPortal. Search on Bibsonomy BioSurveillance The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Foot-and-mouth disease, BioPortal, surveillance
10Sailesh Kumar, Balakrishnan Chandrasekaran 0002, Jonathan S. Turner, George Varghese Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia. Search on Bibsonomy ANCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF regular expressions, DFA, deep packet inspection
10Christopher L. Hayes, Yan Luo DPICO: a high speed deep packet inspection engine using compact finite automata. Search on Bibsonomy ANCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FPGA, intrusion detection, finite automata, content addressable memory
10Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang 0002, Chi-Sung Laih Generating Attack Scenarios with Causal Relationship. Search on Bibsonomy GrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Ying-Dar Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Cheng Lai Designing an Integrated Architecture for Network Content Security Gateways. Search on Bibsonomy Computer The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Network security, Spam
10Bradley K. Jensen, Melinda Cline, Carl Stephen Guynes Teaching the undergraduate CS Information Security Course. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF teaching information security, intrusion detection, malware, information assurance
10Christopher Griffin 0001, Richard R. Brooks A note on the spread of worms in scale-free networks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jill Slay, Benjamin P. Turnbull Computer Security Education and Research in Australia. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Phillip A. Porras Privacy-Enabled Global Threat Monitoring. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Hong Yan 0002, Hui Zhang 0001, Kunwadee Sripanidkulchai, Zon-Yin Shae, Debanjan Saha Information leak vulnerabilities in SIP implementations. Search on Bibsonomy IEEE Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Krishna Sandeep Reddy Dubba, Arun K. Pujari N-gram analysis for computer virus detection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10John Aycock, Rennie deGraaf, Michael J. Jacobson Jr. Anti-disassembly using Cryptographic Hash Functions. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Code armoring, Reverse-engineering, Hash function, Virus, Disassembly
10Wing Wong, Mark Stamp 0001 Hunting for metamorphic engines. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang 0009 Behavior-based modeling and its application to Email analysis. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Email virus propagations, anomaly detection, behavior profiling
10Jan Camenisch Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon, Jin Gi Choe, Yu Kang An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Christian Jacob 0001, Scott Steil, Karel P. Bergmann The Swarming Body: Simulating the Decentralized Defenses of Immunity. Search on Bibsonomy ICARIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10David Déharbe, Pascal Fontaine, Silvio Ranise, Christophe Ringeissen Decision Procedures for the Formal Analysis of Software. Search on Bibsonomy ICTAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Akira Uchiyama, Takaaki Umedu, Keiichi Yasumoto, Teruo Higashino Efficient and Robust Distributed Network Monitoring using Dynamic Group Formation. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Md. Enamul Karim, Laxmi Parida, Arun Lakhotia Using Permutation Patterns for Content-Based Phylogeny. Search on Bibsonomy PRIB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Alessandro Sette, Huynh-Hoa Bui, John Sidney, Philip E. Bourne, Søren Buus, Ward Fleri, R. Kubo, Ole Lund, D. Nemazee, Julia V. Ponomarenko, Muthu Sathiamurthy, Scott Stewart, Scott Way, Stephen S. Wilson, Björn Peters The Immune Epitope Database and Analysis Resource. Search on Bibsonomy PRIB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Wojciech Zamojski, Dariusz Caban Introduction to the Dependability Modeling of Computer Systems. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Donghyun Lim, Jin-Wook Chung, Seong-Jin Ahn 0001 Using Genetic Algorithm for Network Status Learning and Worm Virus Detection Scheme. Search on Bibsonomy IDEAL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Leon Moonen, Spiros Mancoridis Code Based Software Security Assessments. Search on Bibsonomy WCRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Kenichi Yoshida Sampling-Based Stream Mining for Network Risk Management. Search on Bibsonomy JSAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Paola Flocchini, Nicola Santoro Distributed Security Algorithms by Mobile Agents. Search on Bibsonomy ICDCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Krishna Sandeep Reddy Dubba, Subrat Kumar Dash, Arun K. Pujari New Malicious Code Detection Using Variable Length n-grams. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Episodes, Data Mining, n-grams, Malicious code detection
10Johnathon A. Mohr The [216: 1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF adaptive support, network access standardization, personal computer security, preventative computing, network security, updates, malware, virus, spyware, remediation, antivirus, adaptive networking
10Karen McDowell Now that we are all so well-educated about spyware, can we put the bad guys out of business? Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF antispyware, greyware, malware, spyware, bots, adware
10Michael Blanco, Kay White Reactive to proactive support: a corn dance. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cross-training, support desk, work-study, security, performance, project management, malware, virus, staffing
10Kenneth Janz, Emily Gruenert Creating a positive first impression of information technology support at the start of school. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF communications assessment, start of school, technology planning, collaboration, communications, documentation, marketing, technology training, communication strategies, support services, technology needs assessment
10Sean P. Phalen Residential installations for network access on Rollins College campus. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Rollins College, networking, installations, ResNet
10Amit Vasudevan, Ramesh Yerraballi SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation. Search on Bibsonomy ACSC The full citation details ... 2006 DBLP  BibTeX  RDF security, instrumentation, malware
10Tarek El Kiki, Elaine Lawrence Government as a Mobile Enterprise: Real-time, Ubiquitous Government. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Moez Draief, Ayalvadi J. Ganesh, Laurent Massoulié Thresholds for virus spread on networks. Search on Bibsonomy VALUETOOLS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SIR epidemic, largest connected component, random graphs, spectral radius
10Bernhard Fechner, Jörg Keller 0001, Andreas Wohlfeld Web server protection by customized instruction set encoding. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Pradip De, Yonghe Liu, Sajal K. Das 0001 Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Random Key Predistribution, Sensor Networks, Random Graph, Epidemiology
10Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Yoshiteru Ishida Asymmetric Wars Between Immune Agents and Virus Agents: Approaches of Generalists Versus Specialists. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jingbo Hao, Jianping Yin, Boyun Zhang Modeling Viral Agents and Their Dynamics with Persistent Turing Machines and Cellular Automata. Search on Bibsonomy PRIMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Viral Agent, Persistent Turing Machine, Dynamics, Cellular Automaton
10Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 928 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license