Sciweavers

216 search results - page 6 / 44
» Modeling and Automated Containment of Worms
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 2 months ago
Exploiting Temporal Complex Network Metrics in Mobile Malware Containment
Malicious mobile phone worms spread between devices via short-range Bluetooth contacts, similar to the propagation of human and other biological viruses. Recent work has employed m...
John Tang, Cecilia Mascolo, Mirco Musolesi, Vito L...
NAR
2007
121views more  NAR 2007»
13 years 7 months ago
WormBase: new content and better access
WormBase (http://wormbase.org), a model organism database for Caenorhabditis elegans and other related nematodes, continues to evolve and expand. Over the past year WormBase has a...
Tamberlyn Bieri, Darin Blasiar, Philip Ozersky, Ig...
DSN
2004
IEEE
13 years 11 months ago
Dynamic Quarantine of Internet Worms
If we limit the contact rate of worm traffic, can we alleviate and ultimately contain Internet worms? This paper sets out to answer this question. Specifically, we are interested ...
Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Sta...
ACSAC
2004
IEEE
13 years 11 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
MASCOTS
2003
13 years 9 months ago
Computer Virus Propagation Models
Abstract. The availability of reliable models of computer virus propagation would prove useful in a number of ways, in order both to predict future threats, and to develop new cont...
Giuseppe Serazzi, Stefano Zanero