Sciweavers

482 search results - page 41 / 97
» A taxonomy of computer worms
Sort
View
ESORICS
2009
Springer
14 years 9 months ago
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Abstract. As the number and scope of government regulations and rules mandating trustworthy retention of data keep growing, businesses today are facing a higher degree of regulatio...
Tiancheng Li, Xiaonan Ma, Ninghui Li
WEBI
2009
Springer
14 years 3 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
ACSAC
2006
IEEE
14 years 2 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
ANSS
2005
IEEE
14 years 2 months ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...
ICRA
2005
IEEE
136views Robotics» more  ICRA 2005»
14 years 2 months ago
Polychaete-like Undulatory Robotic Locomotion
- Polychaete annelid worms provide a biological paradigm of versatile locomotion and effective motion control, adaptable to a large variety of unstructured environmental conditions...
Dimitris P. Tsakiris, Michael Sfakiotakis, Arianna...