The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for worms with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1997 (21) 1998-2002 (21) 2003 (32) 2004 (67) 2005 (129) 2006 (115) 2007 (124) 2008 (94) 2009 (60) 2010 (26) 2011 (22) 2012-2013 (27) 2014 (16) 2015-2016 (20) 2017-2019 (22) 2020-2022 (18) 2023-2024 (13)
Publication types (Num. hits)
article(216) incollection(8) inproceedings(603)
Venues (Conferences, Journals, ...)
WORM(35) IEEE Secur. Priv.(18) ACSAC(15) RAID(15) CoRR(14) Comput. Secur.(13) CCS(9) DIMVA(9) ICC(9) IEEE Trans. Parallel Distribut...(9) INFOCOM(9) IPCCC(9) ISI(9) J. Comput. Virol.(8) PADS(8) Computer(7) More (+10 of total 437)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 783 occurrences of 399 keywords

Results
Found 836 publication records. Showing 827 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
9Jeffery P. Hansen, Kymie M. C. Tan, Roy A. Maxion Anomaly Detector Performance Evaluation Using a Parameterized Environment. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Takeshi Okamoto, Yoshiteru Ishida Towards an Immunity-Based Anomaly Detection System for Network Traffic. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Krzysztof Juszczyszyn, Ngoc Thanh Nguyen 0001, Grzegorz Kolaczek, Adam Grzech, Agnieszka Pieczynska, Radoslaw P. Katarzyniak Agent-Based Approach for Distributed Intrusion Detection System Design. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Hieu Tat Nguyen, Qiang Ji Improved watershed segmentation using water diffusion and local shape priors. Search on Bibsonomy CVPR (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Yvo Desmedt, Yongge Wang, Mike Burmester Revisiting Colored Networks and Privacy Preserving Censorship. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Yan Gao 0003, Zhichun Li, Yan Chen 0004 A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Ping Wang, Binxing Fang, Xiao-chun Yun Model and Estimation of Worm Propagation Under Network Partition. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Jung-Taek Seo, Yun-ju Kim, Eung Ki Park, Sang-Won Lee, Taeshik Shon, Jongsub Moon Design and Implementation of a Patch Management System to Remove Security Vulnerability in Multi-platforms. Search on Bibsonomy FSKD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Wenqing Zhao, Yongli Zhu Classifying Email Using Variable Precision Rough Set Approach. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF junk mail, classification, rough set, Spam, information filtering
9Qianli Zhang, Xing Li A Hypothesis Testing Based Scalable TCP Scan Detection. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Dong Hwi Lee, Jeom Goo Kim, Kuinam J. Kim HOIDS-Based Detection Method of Vicious Event in Large Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Ye Guo, Miaoliang Zhu An Agent-Oriented Network Worm Defense System based on Optimized Path. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Roger Karrer EC: an edge-based architecture against DDoS attacks and malware spread. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im A New Methodology of Analyzing Security Vulnerability for Network Services. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Ana L. Milanova, Sonia Fahmy, David R. Musser, Bülent Yener A Secure Programming Paradigm for Network Virtualization. Search on Bibsonomy BROADNETS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Zhaoyu Liu, Roopesh Uppala A Dynamic Countermeasure Method for Large-Scale Network Attacks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Georgios Portokalidis, Asia Slowinska, Herbert Bos Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. Search on Bibsonomy EuroSys The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia Normalizing Metamorphic Malware Using Term Rewriting. Search on Bibsonomy SCAM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Shiping Chen 0003, Dongyu Liu, Songqing Chen, Sushil Jajodia V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9David Whyte, Paul C. van Oorschot, Evangelos Kranakis Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Francis Hsu, Hao Chen 0003, Thomas Ristenpart, Jason Li 0003, Zhendong Su 0001 Back to the Future: A Framework for Automatic Malware Removal and System Repair. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Saeed Rajput, Xiaoguang Sun, Sam Hsu Mitigating Worm Propagation on Virtual LANs. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Rainer Böhme, Gaurav Kataria On the Limits of Cyber-Insurance. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh Scalable network-based buffer overflow attack detection. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks
9Marc L. Corliss, E. Christopher Lewis, Amir Roth Using DISE to protect return addresses from attack. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Bharath Madhusudan, John W. Lockwood A Hardware-Accelerated System for Real-Time Worm Detection. Search on Bibsonomy IEEE Micro The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Neal Leavitt Mobile Phones: The Next Frontier for Hackers? Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF malware, cell phones, wireless security, viruses
9Michael Attig, John W. Lockwood A framework for rule processing in reconfigurable network systems (abstract only). Search on Bibsonomy FPGA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Indrajit Ray System Security Track Chair's Message. Search on Bibsonomy ICDCIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Gogul Balakrishnan, Radu Gruian, Thomas W. Reps, Tim Teitelbaum CodeSurfer/x86-A Platform for Analyzing x86 Executables. Search on Bibsonomy CC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Yvo Desmedt Understanding Why Some Network Protocols Are User-Unfriendly. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Thomas W. Reps, Gogul Balakrishnan, Junghee Lim, Tim Teitelbaum A Next-Generation Platform for Analyzing Executables. Search on Bibsonomy APLAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Seny Kamara, Darren Davis, Lucas Ballard, Ryan Caudy, Fabian Monrose An Extensible Platform for Evaluating Security Protocols. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Kevin R. B. Butler, Patrick D. McDaniel Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Ken Keys, David Moore 0001, Cristian Estan A robust system for accurate real-time summaries of internet traffic. Search on Bibsonomy SIGMETRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF adaptive response, measurement, sampling, passive monitoring, traffic estimation
9Zesheng Chen, Chuanyi Ji A self-learning worm using importance scanning. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF importance scanning, self-learning worm, modeling, worm propagation
9Stefan Savage Scalable internet threat monitoring. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9David P. Lytle, Veronica Resendez, Robert August Security in the residential network. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF residence hall, security, network, policy, vulnerability, virus, enforcement, resNet
9Brien G. Muller, Mark A. Bauer Is your resNet support boat sinking?: try outsourcing! Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF outsource, support, students, resNet
9Randy H. Katz, George Porter, Scott Shenker, Ion Stoica, Mel Tsai COPS: Quality of Service vs. Any Service at All. Search on Bibsonomy IWQoS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Hiroyasu Nishiyama SecureC: Control-Flow Protection Against General Buffer Overflow Attack. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Linda Briesemeister, Phillip A. Porras Microscopic Simulation of a Group Defense Strategy. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis Requirements on Worm Mitigation Technologies in MANETS. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Songjie Wei, Jelena Mirkovic, D. Martin Swany Distributed Worm Simulation with a Realistic Internet Model. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Erol Gelenbe, Michael Gellman, George Loukas An Autonomic Approach to Denial of Service Defence. Search on Bibsonomy WOWMOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Teck Sung Yap, Hong Tat Ewe A Mobile Phone Malicious Software Detection Model with Behavior Checker. Search on Bibsonomy Human.Society@Internet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Young H. Cho, William H. Mangione-Smith Fast Reconfiguring Deep Packet Filter for 1+ Gigabit Network. Search on Bibsonomy FCCM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Michael Attig, John W. Lockwood A Framework for Rule Processing in Reconfigurable Network Systems. Search on Bibsonomy FCCM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage Scalability, fidelity, and containment in the potemkin virtual honeyfarm. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write
9RongJie Gu, Puliu Yan, Tao Zou, Chengcheng Guo An Automatic and Generic Early-Bird System for Internet Backbone Based on Traffic Anomaly Detection. Search on Bibsonomy ICN (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Sanjeev Kumar Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. Search on Bibsonomy ICN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ARP attack, Distributed Denial of Service Attacks, Computer Network Security
9Theodore Johnson, S. Muthukrishnan 0001, Oliver Spatscheck, Divesh Srivastava Streams, Security and Scalability. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Ramkumar Chinchani, Eric van den Berg A Fast Static Analysis Approach to Detect Exploit Code Inside Network Flows. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Ayalvadi J. Ganesh, Laurent Massoulié, Donald F. Towsley The effect of network topology on the spread of epidemics. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Thomas Dübendorfer, Arno Wagner, Theus Hossmann, Bernhard Plattner Flow-Level Traffic Analysis of the Blaster and Sobig Worm Outbreaks in an Internet Backbone. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Urupoj Kanlayasiri, Surasak Sanguanpong Key Factors Influencing Worm Infection in Enterprise Networks. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo An Email Worm Vaccine Architecture. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Bailing Wang, Binxing Fang, Xiao-chun Yun A Worm Behavioral Approach to Susceptible Host Detection. Search on Bibsonomy GCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Qiang Ding, Ke Xu 0002, Hui-shan Liu Construct Optimal Diameter Network and d-partition Routing Algorithm. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Akira Yamada 0001, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Nicolas Loriant, Marc Ségura-Devillechaise, Jean-Marc Menaud Server Protection through Dynamic Patching. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo A Multi-Faceted Approach towards Spam-Resistible Mail. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anti-spam, unsolicited bulk e-mail (UBE), e-mail dependability, Spam, denial of service attacks
9Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma 0001 Worm Propagation Modeling and Analysis on Network. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Jeanna Neefe Matthews Hands-on approach to teaching computer networking using packet traces. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network protocol analysis
9Hyunsang Choi, Heejo Lee PCAV: Internet Attack Visualization on Parallel Coordinates. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Zhenkai Liang, R. Sekar 0001 Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Dingbang Xu, Peng Ning Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Young H. Cho, William H. Mangione-Smith A pattern matching coprocessor for network security. Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network security, pattern matching, intrusion, snort, pattern search
9Yi-xuan Liu, Xiao-chun Yun, Bailing Wang, Hai-bin Sun An Anti-worm with Balanced Tree Based Spreading Strategy. Search on Bibsonomy ICMLC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
9Avishai Wool A Quantitative Study of Firewall Configuration Errors. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Jeffery E. Payne Regulation and Information Security: Can Y2K Lessons Help Us? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Sarbannes Oxley, software regulation, Y2K lessons, software security
9Ashton Applewhite, Alan Davis In the News. Search on Bibsonomy IEEE Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Stephen Lau The Spinning Cube of Potential Doom. Search on Bibsonomy Commun. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Pingshan Li, Jan P. Allebach Tone-dependent error diffusion. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Ka-Ping Yee Secure Interaction Design. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Sanguk Noh, Cheolho Lee, Keywon Ryu, Kyunghee Choi, Gihyun Jung Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning. Search on Bibsonomy IDEAL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Gogul Balakrishnan, Thomas W. Reps Analyzing Memory Accesses in x86 Executables. Search on Bibsonomy CC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Alan R. Peslak Improving software quality: an ethics based approach. Search on Bibsonomy CPR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF business ethics, code of conduct, software ethics, software quality, code of ethics
9David V. Schuehler, John W. Lockwood A Modular System for FPGA-Based TCP Flow Processing in High-Speed Networks. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9James E. Just, Mark R. Cornwell Review and analysis of synthetic diversity for breaking monocultures. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF diversity, vulnerability, n-version programming
9Kim Todd, Jon Rickman, Tabatha Verbick Implementing a network improvement action plan. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF communication, network management, customer service, network stability
9Volker Roth 0002 Obstacles to the Adoption of Mobile Agents. Search on Bibsonomy Mobile Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Mobile agents
9Robert S. Gray Mobile Agents: Overcoming Early Hype and a Bad Name. Search on Bibsonomy Mobile Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Andrew H. Sung, Srinivas Mukkamala The Feature Selection and Intrusion Detection Problems. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum Symmetric Key Authentication Services Revisited. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Mihai Christodorescu, Somesh Jha Testing malware detectors. Search on Bibsonomy ISSTA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF malware, obfuscation, adaptive testing, anti-virus
9A. Murat Fiskiran, Ruby B. Lee Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. Search on Bibsonomy ICCD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Yu Fang, Randy H. Katz, T. V. Lakshman Gigabit Rate Packet Pattern-Matching Using TCAM. Search on Bibsonomy ICNP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Craig Saunders, David R. Hardoon, John Shawe-Taylor, Gerhard Widmer Using String Kernels to Identify Famous Performers from Their Playing Style. Search on Bibsonomy ECML The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Gordon W. Romney, Brady R. Stevenson An isolated, multi-platform network sandbox for teaching IT security system engineers. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF collaborative student teaching, security best practices, security laboratory, security system engineer, information technology, information assurance, data privacy, curricula
9Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala Static Analyzer of Vicious Executables (SAVE). Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
9Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, scalability, denial of service
9Joel Sommers, Vinod Yegneswaran, Paul Barford A framework for malicious workload generation. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF traffic generation, network intrusions
9Wu-chang Feng The case for TCP/IP puzzles. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Elias Levy Crossover: Online Pests Plaguing the Offline World. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Alan H. Karp Enforce POLA on processes to control viruses. Search on Bibsonomy Commun. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Rick Norwood, George Poole An Improved Upper Bound for Leo Moser's Worm Problem. Search on Bibsonomy Discret. Comput. Geom. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
9Seung-Bum Hong, Won Nah, Joong-Hwan Baek Automatic Classification and Clustering of Caenorhabditis Elegans Using a Computer Vision System. Search on Bibsonomy IDEAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Clustering, Classification, Computer Vision, C. elegans
Displaying result #701 - #800 of 827 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license