The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for worm with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1973-1991 (15) 1992-1995 (15) 1996-1998 (22) 1999-2001 (28) 2002 (19) 2003 (147) 2004 (188) 2005 (124) 2006 (137) 2007 (115) 2008 (108) 2009 (83) 2010 (42) 2011 (28) 2012 (32) 2013 (34) 2014 (24) 2015 (23) 2016 (26) 2017 (21) 2018 (24) 2019 (30) 2020 (20) 2021 (37) 2022 (26) 2023 (31) 2024 (2)
Publication types (Num. hits)
article(378) incollection(2) inproceedings(1006) phdthesis(9) proceedings(6)
Venues (Conferences, Journals, ...)
OTM Workshops(203) WORM(46) CoRR(27) ICC(19) IEEE Secur. Priv.(16) RAID(15) INFOCOM(13) GLOBECOM(11) J. Comput. Virol.(11) CCS(10) ISI(10) ACSAC(9) Comput. Secur.(9) Computer(9) DSN(9) IEEE Trans. Parallel Distribut...(9) More (+10 of total 632)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 869 occurrences of 475 keywords

Results
Found 1425 publication records. Showing 1401 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Fangwei Wang, Yunkai Zhang, Jianfeng Ma 0001 Modeling and analysis of a self-learning worm based on good point set scanning. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Ossama Toutonji, Seong-Moo Yoo Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense. Search on Bibsonomy KSII Trans. Internet Inf. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16George Lawton On the Trail of the Conficker Worm. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conficker, Malware, Worms, Buffer overflow, Security and privacy
16Ossama Toutonji, Seong-Moo Yoo An Approach against a Computer Worm Attack. Search on Bibsonomy Int. J. Commun. Networks Inf. Secur. The full citation details ... 2009 DBLP  BibTeX  RDF
16Zesheng Chen, Chao Chen 0001, Yubin Li Deriving a closed-form expression for worm-scanning strategies. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Hao Tu, Zhitang Li, Bin Liu 0013, Yejiang Zhang An Efficient Worm Defense System Based Signature Extraction. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Ting Liu 0002, Xiaohong Guan, Qinghua Zheng, Yu Qu A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense. Search on Bibsonomy IEEE Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Hyundo Park, Hyogon Kim, Heejo Lee Is early warning of an imminent worm epidemic possible? Search on Bibsonomy IEEE Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Ibrahim Farag, Mohamed A. Shouman, Tarek S. Sobh, Heba El-Fiqi Intelligent System for Worm Detection. Search on Bibsonomy Int. Arab. J. e Technol. The full citation details ... 2009 DBLP  BibTeX  RDF
16T.-J. Yeh, Feng-Kung Wu Modeling and robust control of worm-gear driven systems. Search on Bibsonomy Simul. Model. Pract. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Byung-Gyu No, Doo-Soon Park, Min Hong, HwaMin Lee, Yoon Sok Park Dynamic Control of Random Constant Spreading Worm using Depth Distribution Characteristics. Search on Bibsonomy J. Inf. Process. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Shaojie Wang, Qiming Liu, Bo Dang 0003, Weining Ma Analysis of a Mathematical Model for Worm Virus Propagation with Time Delay. Search on Bibsonomy ICECS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Ossama Toutonji, Seong-Moo Yoo Realistic Approach against Worm Attack on Computer Networks by Emulating Human Immune System. Search on Bibsonomy Security and Management The full citation details ... 2009 DBLP  BibTeX  RDF
16Mohammad M. Rasheed, Norita Md Norwawi, Mohammed M. Kadhum, Osman Ghazali Intelligent Anti-Internet Worm Automatically Detect and Update Signatures Server. Search on Bibsonomy Security and Management The full citation details ... 2009 DBLP  BibTeX  RDF
16Erlo Meister, Elmarie Biermann Increasing Security Awareness: Designing a Socially Engineered E-mail Worm. Search on Bibsonomy Security and Management The full citation details ... 2009 DBLP  BibTeX  RDF
16Guanhua Yan, Leticia Cuellar, Stephan J. Eidenbenz, Nicolas W. Hengartner Blue-Watchdog: Detecting Bluetooth worm propagation in public areas. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Filipe Freitas, Edgar Marques, Rodrigo Rodrigues 0001, Carlos Ribeiro, Paulo Ferreira 0001, Luís E. T. Rodrigues Verme: Worm containment in overlay networks. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Igor V. Kotenko Framework for Integrated Proactive Network Worm Detection and Response. Search on Bibsonomy PDP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Sinan Hatahet, Yacine Challal, Abdelmadjid Bouabdallah BitTorrent Worm Sensor Network : P2P Worms Detection and Containment. Search on Bibsonomy PDP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Nikolaos Chatzis, Radu Popescu-Zeletin, Nevil Brownlee Email worm detection by wavelet analysis of DNS query streams. Search on Bibsonomy CICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Izzeldin Amin Polymorphic Worm Detection Using Double-Honeynet. Search on Bibsonomy ICSEA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jie Wang 0067, Jianxin Wang 0001, Jianer Chen, Xi Zhang 0005 An Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding. Search on Bibsonomy ICC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Nasir Jamil, Thomas M. Chen A Mathematical View of Network-Based Suppressions of Worm Epidemics. Search on Bibsonomy ICC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Bo Gu, Xiaoyan Hong, Pu Wang Modeling Worm Propagation through Hidden Wireless Connections. Search on Bibsonomy GLOBECOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Minhuan Huang, Xiaohui Kuang, Yan Wen, Hong Tang, Fei Xu Research on Technologies of Building Experimental Environment for Network Worm Simulation. Search on Bibsonomy ICPADS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Zhichao Zhu, Guohong Cao, Sencun Zhu, Supranamaya Ranjan, Antonio Nucci A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. Search on Bibsonomy INFOCOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Sirui Yang, Hai Jin 0001, Bo Li 0001, Xiaofei Liao, Hong Yao Worm Containment in Peer-to-Peer Networks. Search on Bibsonomy ScalCom-EmbeddedCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Muhammad Adeel, Laurissa N. Tokarchuk, Laurie G. Cuthbert, Chao-sheng Feng, Zhiguang Qin A Distributed Framework for Passive Worm Detection and Throttling in P2P Networks. Search on Bibsonomy CCNC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Claudiu Valentin Suciu, Hozumi Goto, Hisanori Abiru Modeling and Simulation of a Screw-Worm Gear Mechanical Transmission to Achieve its Optimal Design under Imposed Constraints. Search on Bibsonomy ICPP Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young Ik Eom Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Hui Zhao Multi-objective Fuzzy Reliability Optimization of Worm Gear Mechanism. Search on Bibsonomy FSKD (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Zahra Zohoor Saadat, Saleh Yousefi, Mahmood Fathy Active Worm Propagation in Hierarchical Peer-to-Peer Network Management Systems: Modeling and Analysis. Search on Bibsonomy FGIT-FGCN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Nikolaos Chatzis, Nevil Brownlee Similarity Search over DNS Query Streams for Email Worm Detection. Search on Bibsonomy AINA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Qiming Liu, Rui Xu 0003, Shaojie Wang Modelling and Analysis of an SIRS Model for Worm Propagation. Search on Bibsonomy CIS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Li Yao, Yu Liu, Yuqing Zhang An Integrated Approach to Worm Detection and Automatic Signature Generation. Search on Bibsonomy CIS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Yangui Xu, Xiangchun Li, Jiachun Zhou, Huanyan Qian Worm Detection in an IPv6 Internet. Search on Bibsonomy CIS (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Songjie Wei, Calvin Ko, Jelena Mirkovic, Alefiya Hussain Tools for worm experimentation on the DETER testbed. Search on Bibsonomy TRIDENTCOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Ritam Chakrovorty, Lucas Vespa, Ning Weng Testbed for evaluating worm containment systems. Search on Bibsonomy ANCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Francesco Palmieri 0002 Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2008 DBLP  BibTeX  RDF
16Wei Yu 0002, Sriram Chellappan, Xun Wang, Dong Xuan Peer-to-peer system-based active worm attacks: Modeling, analysis and defense. Search on Bibsonomy Comput. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillston Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Pele Li, Mehdi Salour, Xiao Su A survey of internet worm detection and containment. Search on Bibsonomy IEEE Commun. Surv. Tutorials The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Francesco Palmieri 0002, Ugo Fiore Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies. Search on Bibsonomy Comput. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni A data mining approach for analysis of worm activity through automatic signature generation. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automatic signature generation, malware identification, data mining, intrusion detection, honeypots
16Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Challal A new worm propagation threat in BitTorrent: Modeling and analysis. Search on Bibsonomy IMCSIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Joe Szabo, John Aycock, Randal Acton, Jörg Denzinger The tale of the weather worm. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, emergencies, worms, geolocation, disasters, information policy
16Liang Xie 0002, Hui Song, Trent Jaeger, Sencun Zhu A systematic approach for cell-phone worm containment. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cell phone, patch, turing test
16Arnur G. Tokhtabayev, Victor A. Skormin, Andrey M. Dolgikh Detection of Worm Propagation Engines in the System Call Domain using Colored Petri Nets. Search on Bibsonomy IPCCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jinpyo Hong, J. Ramanujam Scheduling DAGs for Fixed-point DSP Processors by Using Worm Partitions. Search on Bibsonomy ICESS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Junmin Zhang, Yiwen Liang Integrating Innate and Adaptive Immunity for Worm Detection. Search on Bibsonomy CIMCA/IAWTIC/ISE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Lunquan Li, Peng Liu 0005, George Kesidis Threshold Smart Walk for the Containment of Local Worm Outbreak. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou, Chao Chen 0001 Inferring Internet Worm Temporal Characteristics. Search on Bibsonomy GLOBECOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Douglas G. McIlwraith, Micaël Paquier, Evangelos Kotsovinos di-jest: Autonomic neighbour management for worm resilience in p2p systems. Search on Bibsonomy WOWMOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Thorsten Holz, Moritz Steiner, Frederic Dahl, Ernst W. Biersack, Felix C. Freiling Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. Search on Bibsonomy LEET The full citation details ... 2008 DBLP  BibTeX  RDF
16Yong Yang, Yong Fang, Lan-ying Li The Analysis of Propagation Model for Internet Worm Based on Active Vaccination. Search on Bibsonomy ICNC (6) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Zhaoyang Qu, Qun Zheng The design and realization of Ajax worm detectable system. Search on Bibsonomy ISKE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Erlo Meister, Elmarie Biermann Implementation of a Socially Engineered Worm to Increase Information Security Awareness. Search on Bibsonomy BroadCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Yu Yao, Junwei Lv, Fuxiang Gao, Yanfang Zhang, Ge Yu 0001 Behavior-Based Worm Detection and Signature Generation. Search on Bibsonomy IMSCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Nikolaos Chatzis, Radu Popescu-Zeletin Flow Level Data Mining of DNS Query Streams for Email Worm Detection. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Arno Wagner Entropy-based worm detection for fast IP networks. Search on Bibsonomy 2008   RDF
16Oliver Sharma Detecting worm mutations using machine learning. Search on Bibsonomy 2008   RDF
16Shad Stafford, Jun Li 0001, Toby Ehrenkranz Enhancing SWORD to Detect Zero-Day-Worm-Infected Hosts. Search on Bibsonomy Simul. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Georgios Portokalidis, Herbert Bos SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. Search on Bibsonomy Comput. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham E-Mail Worm Detection Using Data Mining. Search on Bibsonomy Int. J. Inf. Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ray W. Ogden, Giuseppe Saccomandi, Ivonne Sgura Computational aspects of Worm-Like-Chain interpolation formulas. Search on Bibsonomy Comput. Math. Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Sapon Tanachaiwiwat, Ahmed Helmy On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics Search on Bibsonomy CoRR The full citation details ... 2007 DBLP  BibTeX  RDF
16Maziar M. Nekovee Worm Epidemics in Wireless Adhoc Networks Search on Bibsonomy CoRR The full citation details ... 2007 DBLP  BibTeX  RDF
16Zesheng Chen, Chuanyi Ji Optimal worm-scanning method using vulnerable-host distributions. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Surasak Sanguanpong, Urupoj Kanlayasiri Worm damage minimization in enterprise networks. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Michael J. Sheehan Secure parallel file distribution through a streaming worm network. Search on Bibsonomy Bell Labs Tech. J. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Miguel Correia 0001, Nuno Ferreira Neves, Lau Cheuk Lung, Paulo Veríssimo Worm-IT - A wormhole-based intrusion-tolerant group communication system. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Windsor W. Hsu, Shauchi Ong Technical Forum : WORM storage is not enough. Search on Bibsonomy IBM Syst. J. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Diego Zamboni, James Riordan, Milton Yates Boundary Detection and Containment of Local Worm Infections. Search on Bibsonomy SRUTI The full citation details ... 2007 DBLP  BibTeX  RDF
16Joel O. Sandin, Bilal Khan Petrifying Worm Cultures: Scalable Detection and Immunization in Untrusted Environments. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yuji Waizumi, Masashi Tsuji, Hiroshi Tsunoda, Nirwan Ansari, Yoshiaki Nemoto Distributed Early Worm Detection Based on Payload Histograms. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Alberto Dainotti, Antonio Pescapè, Giorgio Ventre Worm Traffic Analysis and Characterization. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Nasir Jamil, Thomas M. Chen A Web-Based Network Worm Simulator. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yoon-Keun Oh, Woo Nyon Kim, Dong Su Kim, Soon Jwa Hong, Ki Wook Sohn Design of Actor based Worm Modeling System Using DML. Search on Bibsonomy IPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Lunquan Li, Peng Liu 0005, Yoon-chan Jhi, George Kesidis Evaluation of Collaborative Worm Containments on DETER Testbed. Search on Bibsonomy DETER The full citation details ... 2007 DBLP  BibTeX  RDF
16Filipe Freitas, Rodrigo Rodrigues 0001, Carlos Ribeiro, Paulo Ferreira 0001, Luís E. T. Rodrigues Verme: Worm Containment in Peer-to-Peer Overlays. Search on Bibsonomy IPTPS The full citation details ... 2007 DBLP  BibTeX  RDF
16Yoon-chan Jhi, Peng Liu 0005, Lunquan Li, Qijun Gu, Jiwu Jing, George Kesidis PWC: A proactive worm containment solution for enterprise networks. Search on Bibsonomy SecureComm The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Takashi Kubota, Kenji Nagaoka, Satoru Tanaka, Taro Nakamura 0001 Earth-worm typed Drilling robot for subsurface planetary exploration. Search on Bibsonomy ROBIO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Zesheng Chen, Chuanyi Ji Measuring Network-Aware Worm Spreading Ability. Search on Bibsonomy INFOCOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Supranamaya Ranjan, Shaleen Shah, Antonio Nucci, Maurizio M. Munafò, Rene L. Cruz, S. Muthukrishnan 0001 DoWitcher: Effective Worm Detection and Containment in the Internet Core. Search on Bibsonomy INFOCOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Youhei Suzuki, Yuji Waizumi, Hiroshi Tsunoda, Yoshiaki Nemoto A Low Cost Worm Detection Technique based on Flow Payload Similarity. Search on Bibsonomy WEBIST (1) The full citation details ... 2007 DBLP  BibTeX  RDF
16Mark Wallis, Frans A. Henskens WEWorm: An Ethical Worm Generation Toolkit. Search on Bibsonomy WEBIST (1) The full citation details ... 2007 DBLP  BibTeX  RDF
16Yan Deng, Guanzhong Dai, Shuxin Chen A Robust Estimator for Evaluating Internet Worm Infection Rate. Search on Bibsonomy CIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Miad Faezipour, Mehrdad Nourani, Rina Panigrahy A Real-Time Worm Outbreak Detection System Using Shared Counters. Search on Bibsonomy Hot Interconnects The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yick Kuen Lee, Ying Ying Lee Worm 5: Pseudo-organics Computer and Natural Live System. Search on Bibsonomy LSMS (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Nicolas Roussel 0002 A computational model for C. elegans locomotory behavior: application to multi-worm tracking. Search on Bibsonomy 2007   RDF
16Manuel Costa End-to-end containment of internet worm epidemics. Search on Bibsonomy 2007   RDF
16Cliff Changchun Zou, Donald F. Towsley, Weibo Gong, Songlin Cai Advanced Routing Worm and Its Security Challenges. Search on Bibsonomy Simul. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Steven M. Bellovin, Bill Cheswick, Angelos D. Keromytis Worm Propagation Strategies in an IPv6 Internet. Search on Bibsonomy login Usenix Mag. The full citation details ... 2006 DBLP  BibTeX  RDF
16Cliff Changchun Zou, Donald F. Towsley, Weibo Gong On the performance of Internet worm scanning strategies. Search on Bibsonomy Perform. Evaluation The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao 0001, Kevin A. Kwiat Effective worm detection for various scan techniques. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Vivek Kumar Sehgal Stochastic Modeling of Worm Propagation in Trusted Networks. Search on Bibsonomy Security and Management The full citation details ... 2006 DBLP  BibTeX  RDF
16Seok-Min Kang, Il-Seop Song, Youngseok Lee 0002, Taeck-Geun Kwon Design and Implementation of a Multi-gigabit Intrusion and Virus/Worm Detection System. Search on Bibsonomy ICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Thomas M. Chen, Nasir Jamil Effectiveness of Quarantine in Worm Epidemics. Search on Bibsonomy ICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Senthilkumar G. Cheetancheri, John Mark Agosta, Denver Dash, Karl N. Levitt, Jeff Rowe, Eve M. Schooler A distributed host-based worm detection system. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jisheng Wang, Ihab Hamadeh, George Kesidis, David J. Miller 0001 Polymorphic worm detection and defense: system design, experimental methodology, and data resources. Search on Bibsonomy LSAD@SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 1401 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license