The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for worm with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1991 (15) 1992-1995 (15) 1996-1998 (22) 1999-2001 (28) 2002 (19) 2003 (147) 2004 (188) 2005 (124) 2006 (137) 2007 (115) 2008 (108) 2009 (83) 2010 (42) 2011 (28) 2012 (32) 2013 (34) 2014 (24) 2015 (23) 2016 (26) 2017 (21) 2018 (24) 2019 (30) 2020 (20) 2021 (37) 2022 (26) 2023 (31) 2024 (2)
Publication types (Num. hits)
article(378) incollection(2) inproceedings(1006) phdthesis(9) proceedings(6)
Venues (Conferences, Journals, ...)
OTM Workshops(203) WORM(46) CoRR(27) ICC(19) IEEE Secur. Priv.(16) RAID(15) INFOCOM(13) GLOBECOM(11) J. Comput. Virol.(11) CCS(10) ISI(10) ACSAC(9) Comput. Secur.(9) Computer(9) DSN(9) IEEE Trans. Parallel Distribut...(9) More (+10 of total 632)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 869 occurrences of 475 keywords

Results
Found 1425 publication records. Showing 1401 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Naruemon Wattanapongsakorn, E. Wonghirunsombat, Chalermpol Charnsripinyo, T. Assawaniwed, V. Hanchana, S. Srakaew A Network-Based Internet Worm Intrusion Detection and Prevention System. Search on Bibsonomy ICITCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
16Ying Zhao 0011, Pingke Yi Modeling the propagation of XSS worm on social networks. Search on Bibsonomy GLOBECOM Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
16Elhadj Benkhelifa, Thomas Welsh Security testing in the cloud by means of ethical worm. Search on Bibsonomy GLOBECOM Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
16Yonghong Chen, Yan Chen, Jinge Wang 0001 A Novel Worm Drive for Rehabilitation Robot Joint. Search on Bibsonomy MSN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
16Martina Lindorfer, Bernhard Miller, Matthias Neugschwandtner, Christian Platzer Take a bite - Finding the worm in the Apple. Search on Bibsonomy ICICS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
16Dirk U. Wulff, Thomas T. Hills, Ralph Hertwig Worm holes in memory: Is memory one representation or many? Search on Bibsonomy CogSci The full citation details ... 2013 DBLP  BibTeX  RDF
16Sheng Wen, Yang Xiang 0001, Wanlei Zhou 0001 Modeling and Analysis for Thwarting Worm Propagation in Email Networks. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
16Ydalia Delgado Mercado, Hans Gerd Evertz, Christof Gattringer Worm algorithms for the 3-state Potts model with magnetic field and chemical potential. Search on Bibsonomy Comput. Phys. Commun. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Masato Uchida Discrete Modeling of the Worm Spread with Random Scanning. Search on Bibsonomy IEICE Trans. Commun. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Alireza Akbarzadeh Tootoonchi, Hadi Kalani Design and Modeling of a Snake Robot Based on Worm-Like Locomotion. Search on Bibsonomy Adv. Robotics The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Ameya Sanzgiri, Jacob Joyce, Shambhu J. Upadhyaya The Early (tweet-ing) Bird Spreads the Worm: An Assessment of Twitter for Malware Propagation. Search on Bibsonomy ANT/MobiWIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Yu Yao, Lei Guo, Hao Guo, Ge Yu 0001, Fuxiang Gao, Xiao-jun Tong Pulse quarantine strategy of internet worm propagation: Modeling and analysis. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Liyang Dong, Jinying Wang, Pingyi Liu, Wenjun Wei, Haitao Li An NC rough turning method of an enveloping toroidal worm. Search on Bibsonomy Prod. Eng. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Nir Nissim, Robert Moskovitch, Lior Rokach, Yuval Elovici Detecting unknown computer worm activity via support vector machines and active learning. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Lucas Vespa, Ritam Chakrovorty, Ning Weng Lightweight testbed for evaluating worm containment systems. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Axelle Apvrille Symbian worm Yxes: towards mobile botnets? Search on Bibsonomy J. Comput. Virol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Qian Wang, Zesheng Chen, Chao Chen 0001 On the Characteristics of the Worm Infection Family Tree. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16David Zarrouk, Inna Sharf, Moshe Shoham Conditions for Worm-Robot Locomotion in a Flexible Environment: Theory and Experiments. Search on Bibsonomy IEEE Trans. Biomed. Eng. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Yaping Zhao, Jianyi Kong, Gongfa Li, Tianchao Wu, Shaoyang Shi Computerized simulation of tooth contact and error sensitivity investigation for ease-off hourglass worm drives. Search on Bibsonomy Comput. Aided Des. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Daniel Lobo, Wendy S. Beane, Michael Levin Modeling Planarian Regeneration: A Primer for Reverse-Engineering the Worm. Search on Bibsonomy PLoS Comput. Biol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Ryuta Sato Mathematical Model of a CNC Rotary Table Driven by a Worm Gear. Search on Bibsonomy Int. J. Intell. Mechatronics Robotics The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Dewu Xu, Jianfeng Lu, Wei Chen Study on Anti-worm Diffusion Strategies Based on B+ Address Tree. Search on Bibsonomy J. Comput. The full citation details ... 2012 DBLP  BibTeX  RDF
16Lina Zhu 0001, Li Feng, Zuochang Zhang Predicting the Propagation Path of Random Worm by Subnet Infection Situation Using Fuzzy Reasoning. Search on Bibsonomy Comput. J. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Ming Wan, Ying Liu 0018, Jianqiang Tang, Hongke Zhang, Si-yu Lin Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation. Search on Bibsonomy Int. J. Comput. Intell. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16David Zarrouk, Inna Sharf, Moshe Shoham Experimental validation of locomotion efficiency of worm-like robots and contact compliance. Search on Bibsonomy ICRA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16David Zarrouk, Inna Sharf, Moshe Shoham Energy analysis of worm locomotion on flexible surface. Search on Bibsonomy IROS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Zesheng Chen, Chao Chen 0001 Heterogeneity in vulnerable hosts slows down worm propagation. Search on Bibsonomy GLOBECOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Wei Chen, Qiaoyan Wen, Bohou Li A propagation model of passive social network worm. Search on Bibsonomy CCIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Haokun Tang, Yanbing Liu, Jun Huang 0002 A worm counter-measurement strategy in P2P networks: Modeling and analysis. Search on Bibsonomy CCIS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Kantip Kiratiratanapruk, Wasin Sinthupinyo Worm egg segmentation based centroid detection in low contrast image. Search on Bibsonomy ISCIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Jun Yuan 0006, Rob Johnson CAWDOR: Compiler Assisted Worm Defense. Search on Bibsonomy SCAM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Wei Guo, Lidong Zhai, Li Guo 0001, Jinqiao Shi Worm Propagation Control Based on Spatial Correlation in Wireless Sensor Network. Search on Bibsonomy APWeb Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Daichi Takata, Teijiro Isokawa, Jia Lee, Ferdinand Peper, Nobuyuki Matsui On Construction by Worm-Like Agents on a Self-timed Cellular Automaton. Search on Bibsonomy ACRI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Lidong Zhai, Wei Guo, Zhaopeng Jia, Li Guo 0001, Jinqiao Shi Worm Propagation Model for Heterogeneous Network. Search on Bibsonomy CyberC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Jared Oluoch, Huirong Fu, Astrid Younang, Ye Zhu 0001, Bao Tri-Tran A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs). Search on Bibsonomy InfoSecCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Tomasz Korzec, Ingmar Vierhaus, Ulli Wolff Performance of a worm algorithm in ϕ4 theory at finite quartic coupling. Search on Bibsonomy Comput. Phys. Commun. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu 0005, Hongsheng Xi SAS: semantics aware signature generation for polymorphic worm detection. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada Hit-list Worm Detection Using Distributed Sliding Window. Search on Bibsonomy J. Inf. Process. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Gary Schindelman, Jolene Fernandes, Carol Bastiani, Karen Yook, Paul W. Sternberg Worm Phenotype Ontology: integrating phenotype data within and beyond the C. elegans community. Search on Bibsonomy BMC Bioinform. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Manolis Maragkakis, Thanasis Vergoulis, Panagiotis Alexiou, Martin Reczko, Kyriaki Plomaritou, Mixail Gousis, Kornilios Kourtis, Nectarios Koziris, Theodore Dalamagas 0001, Artemis G. Hatzigeorgiou DIANA-microT Web server upgrade supports Fly and Worm miRNA target prediction and bibliographic miRNA to disease association. Search on Bibsonomy Nucleic Acids Res. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Wei Yang, Guiran Chang, Yu Yao, Xiao-meng Shen Stability Analysis of P2P Worm Propagation Model with Dynamic Quarantine Defense. Search on Bibsonomy J. Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Jaime Gallardo-Alvarado, Raúl Lesso-Arroyo, J. Santos García-Miranda A worm-inspired new spatial hyper-redundant manipulator. Search on Bibsonomy Robotica The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Qian Wang, Zesheng Chen, Chao Chen 0001 Darknet-Based Inference of Internet Worm Temporal Characteristics. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Chenglong Wang, Xiaoyu Li, Wei Wang 0098, Yaoze Feng, Zhu Zhou, Hui Zhan Recognition of worm-eaten chestnuts based on machine vision. Search on Bibsonomy Math. Comput. Model. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Yaping Zhao, Jianyi Kong, Gongfa Li, Tianchao Wu Tooth flank modification theory of dual-torus double-enveloping hourglass worm drives. Search on Bibsonomy Comput. Aided Des. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou 0001, Yang Xiang 0001 The Microcosmic Model of Worm Propagation. Search on Bibsonomy Comput. J. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Wei Yu 0002, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao 0001 Modeling and Detection of Camouflaging Worm. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou 0001, Yang Xiang 0001 Eliminating Errors in Worm Propagation Models. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Xuesong Wang, Jinglin Zhu, Huaizhong Lin, Xiaoming Su, Yuqian Jiang Modeling Propagation of Active P2P Worm in Chord Network. Search on Bibsonomy ICFCE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Yue Min Zhang, Xiaolin Wang, Qiang Gao The judge of modified oblique plane double enveloping worm gear tooth contact line style. Search on Bibsonomy EMEIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Qin-ying Lin, De-qin Shi, Lei Huang, Xiaolin Gui, Ya-nan Kou, Xiaoping Wang Worm defense system research based on intelligent maintenance trees. Search on Bibsonomy EMEIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Yang Liu, Weiyi Zhang 0001, Shi Bai, Chonggang Wang Defending Sensor Worm Attack Using Software Diversity Approach. Search on Bibsonomy ICC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Yongjian Wang, Bin Feng, Shupeng Wang The Rapid Worm Detecting Technology in Large-Scale Network. Search on Bibsonomy iThings/CPSCom The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Aliyu Mohammed, Sulaiman Mohd Nor, Muhammad Nadzir Marsono Network Worm Propagation Model Based on a Campus Network Topology. Search on Bibsonomy iThings/CPSCom The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Ziyad S. Al-Salloum, Stephen D. Wolthusen A propagation model of a vulnerability mitigation computer worm - seawave. Search on Bibsonomy NSS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Mitsunori Maru, Min Chen, Koichi Hashimoto Visual servo microscope for locking on single neuron of a worm. Search on Bibsonomy ROBIO The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Bahar Taneri, Ben Snyder, Alexey Novoradovsky, Terry Gaasterland Alternative Splicing in the Fly and the Worm: Splicing Databases for Drosophila melanogaster and Caenorhabditis elegans. Search on Bibsonomy DEXA Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Christian Mandel, Udo Frese Annelid - a Novel Design for Actuated Robots Inspired by Ringed Worm's Locomotion. Search on Bibsonomy ECMR The full citation details ... 2011 DBLP  BibTeX  RDF
16Junyi Li, Fei Su, Zhaowen Lin, Yan Ma The research and analysis of worm scanning strategies in IPv6 network. Search on Bibsonomy APNOMS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Sancheng Peng, Guojun Wang 0001 Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks. Search on Bibsonomy TrustCom The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Rahat Masood, Um-e-Ghazia, Zahid Anwar SWAM: Stuxnet Worm Analysis in Metasploit. Search on Bibsonomy FIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Qian Wang, Zesheng Chen, Chao Chen 0001 Characterizing Internet Worm Infection Structure. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
16Min Yu, Yuanzhuo Wang, Li Liu, Xueqi Cheng Modeling and Analysis of Email Worm Propagation Based on Stochastic Game Nets. Search on Bibsonomy PDCAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Qindong Sun, Qian Wang, Jie Ren Modeling and Analysis of the Proactive Worm in Unstructured Peer-to-Peer Network. Search on Bibsonomy J. Convergence Inf. Technol. The full citation details ... 2010 DBLP  BibTeX  RDF
16Rahul Potharaju, Cristina Nita-Rotaru Pandora: a platform for worm simulations in mobile ad-hoc networks. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Xiaosong Zhang 0001, Ting Chen 0002, Jiong Zheng, Hua Li Proactive worm propagation modeling and analysis in unstructured peer-to-peer networks. Search on Bibsonomy J. Zhejiang Univ. Sci. C The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Yoon-Ho Choi, Peng Liu 0005, Seung-Woo Seo Creation of the importance scanning worm using information collected by Botnets. Search on Bibsonomy Comput. Commun. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Mohammed Zaki 0001, A. A. Hamouda Design of a multi_agent system for worm spreading_reduction. Search on Bibsonomy J. Intell. Inf. Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Lin Cheng, Rahul Shakya Worm Spreading and Patching in Inter-vehicle Communications. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2010 DBLP  BibTeX  RDF
16Qian Wang, Zesheng Chen, Chao Chen 0001 Characterizing Internet Worm Infection Structure Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
16Qian Wang, Zesheng Chen, Chao Chen 0001 Darknet-Based Inference of Internet Worm Temporal Characteristics Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
16Jungwon Kim, William O. Wilson, Uwe Aickelin, Julie McLeod Cooperative Automated Worm Response and Detection Immune Algorithm Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
16Y. Robiah, S. Siti Rahayu, S. Shahrin, M. A. Faizal, M. Mohd Zaki, R. Marliza New Multi-step Worm Attack Model Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
16S. Siti Rahayu, Y. Robiah, S. Shahrin, M. Mohd Zaki, R. Irda, M. A. Faizal Scenario Based Worm Trace Pattern Identification Technique Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
16Songjie Wei, Alefiya Hussain, Jelena Mirkovic, Calvin Ko Tools for worm experimentation on the DETER testbed. Search on Bibsonomy Int. J. Commun. Networks Distributed Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Ezzat Kirmani, Cynthia S. Hood Analysis of a scanning model of worm propagation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Yoon-chan Jhi, Peng Liu 0005, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis PWC: a proactive worm containment solution for enterprise networks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Elias P. Duarte Jr., Karine Pires, Rui A. E. Tavares An efficient strategy for storing and searching binary trees in WORM external memory. Search on Bibsonomy J. Inf. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Shaojie Wang, Qiming Liu, Xinfeng Yu, Yi Ma Bifurcation analysis of a model for network worm propagation with time delay. Search on Bibsonomy Math. Comput. Model. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Yaping Zhao, Zhao Zhang Computer aided analysis on the meshing behavior of a height-modified dual-torus double-enveloping toroidal worm drive. Search on Bibsonomy Comput. Aided Des. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal A new worm propagation threat in BitTorrent: modeling and analysis. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Xiaoming Wang 0001, Qiaoliang Li, Yingshu Li EiSIRS: a formal model to analyze the dynamics of worm propagation in wireless sensor networks. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Xiaojun Tong, Zhangquan Zhao, Huimin Shuai, Zhu Wang 0008 The research of worm distributed detection technology based on network security. Search on Bibsonomy WCNIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Jana Dittmann, Bernhard Karpuschewski, Jana Fruth, Mathias Petzel, Richard Münder An exemplary attack scenario: threats to production engineering inspired by the Conficker worm. Search on Bibsonomy IWDE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Lipeng Song, Zhen Jin 0001 An Automated Worm Containment Scheme. Search on Bibsonomy WISM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Georgia Sakellari, Erol Gelenbe Demonstrating cognitive packet network resilience to worm attacks. Search on Bibsonomy CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Lothar Braun, Gerhard Münz, Georg Carle Packet sampling for worm and botnet detection in TCP connections. Search on Bibsonomy NOMS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Nike Gui, Ennan Zhai, Jian-bin Hu, Zhong Chen 0001 SWORDS: Improving Sensor Networks Immunity under Worm Attacks. Search on Bibsonomy WAIM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Qian Wang, Zesheng Chen, Chao Chen 0001, Niki Pissinou On the Robustness of the Botnet Topology Formed by Worm Infection. Search on Bibsonomy GLOBECOM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Deguang Kong, Yoon-chan Jhi, Tao Gong, Sencun Zhu, Peng Liu 0005, Hongsheng Xi SAS: Semantics Aware Signature Generation for Polymorphic Worm Detection. Search on Bibsonomy SecureComm The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Juan Wang 0010, Chengyi Xia, Qifeng Liu A novel model for the internet worm propagation. Search on Bibsonomy ICNC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Shad Stafford, Jun Li 0001 Behavior-Based Worm Detectors Compared. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Sahar Fahimian, Amirvala Movahed, Mehdi Kharrazi Passive Worm and Malware Detection in Peer-to-Peer Networks. Search on Bibsonomy EUC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Ossama Toutonji, Seong-Moo Yoo, Moongyu Park Propagation modeling and analysis of network worm attack. Search on Bibsonomy CSIIRW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Wei Xu, Fangfang Zhang 0005, Sencun Zhu Toward worm detection in online social networks. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Fernando C. Colón Osorio, Frank S. Posluszny Overcoming the limitations in computer worm models. Search on Bibsonomy MALWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Burak Bayoglu Polimorfik solucan saldırılarının tespiti (Detection of polymorphic worm attacks) Search on Bibsonomy 2010   RDF
16Nikolaos Chatzis Securing the Internet by analysing and controlling DNS traffic: email worm detection and mitigation. Search on Bibsonomy 2010   RDF
16 WORM. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Muhammad Adeel, Laurissa N. Tokarchuk, Laurie G. Cuthbert, Chao-sheng Feng, Zhiguang Qin Improved Distributed Framework for Worm Detection & Throttling in Mobile Peer-to-Peer Networks. Search on Bibsonomy J. Digit. Content Technol. its Appl. The full citation details ... 2009 DBLP  BibTeX  RDF
Displaying result #701 - #800 of 1401 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license