Sciweavers

482 search results - page 42 / 97
» A taxonomy of computer worms
Sort
View
IMC
2004
ACM
14 years 2 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
CIA
2008
Springer
13 years 10 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
JALC
2007
79views more  JALC 2007»
13 years 8 months ago
Two-Way Finite Automata with a Write-Once Track
The basic finite automata model has been extended over the years with different acceptance modes (nondeterminism, alternation), new or improved devices (two-way heads, pebbles, ...
Berke Durak
VMV
2001
116views Visualization» more  VMV 2001»
13 years 10 months ago
Computational Steering by Direct Image Manipulation
Computational steering requires the coupling of simulation and visualization elements, but if the latter is targetted at general requirements, little or no information about the c...
Fotios Chatzinikos, Helen Wright
NDSS
2006
IEEE
14 years 2 months ago
Enterprise Security: A Community of Interest Based Approach
Enterprise networks today carry a range of mission critical communications. A successful worm attack within an enterprise network can be substantially more devastating to most com...
Patrick Drew McDaniel, Subhabrata Sen, Oliver Spat...