Sciweavers

44 search results - page 6 / 9
» High-Fidelity Modeling of Computer Network Worms
Sort
View
PAM
2010
Springer
13 years 9 months ago
A Probabilistic Population Study of the Conficker-C Botnet
We estimate the number of active machines per hour infected with the Conficker-C worm, using a probability model of Conficker-C's UDP P2P scanning behavior. For an observer wi...
Rhiannon Weaver
IMC
2004
ACM
14 years 1 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
ANSS
2005
IEEE
14 years 1 months ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...
RAID
2010
Springer
13 years 5 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
NAR
2007
150views more  NAR 2007»
13 years 7 months ago
CellCircuits: a database of protein network models
CellCircuits (http://www.cellcircuits.org) is an openaccess database of molecular network models, designed to bridge the gap between databases of individual pairwise molecular int...
H. Craig Mak, Mike Daly, Bianca Gruebel, Trey Idek...