Sciweavers

63 search results - page 7 / 13
» Modeling and analysis of worm interactions (war of the worms...
Sort
View
IPCCC
2007
IEEE
14 years 1 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji
BMCBI
2011
13 years 1 months ago
Worm Phenotype Ontology: integrating phenotype data within and beyond the C. elegans community
Background: Caenorhabditis elegans gene-based phenotype information dates back to the 1970’s, beginning with Sydney Brenner and the characterization of behavioral and morphologi...
Gary Schindelman, Jolene Fernandes, Carol Bastiani...
NAR
2010
143views more  NAR 2010»
13 years 1 months ago
WormBase: a comprehensive resource for nematode research
WormBase (http://www.wormbase.org) is a central data repository for nematode biology. Initially created as a service to the Caenorhabditis elegans research field, WormBase has evo...
Todd W. Harris, Igor Antoshechkin, Tamberlyn Bieri...
VALUETOOLS
2006
ACM
141views Hardware» more  VALUETOOLS 2006»
14 years 20 days ago
A realistic simulation of internet-scale events
Internet-scale security incidents are becoming increasingly common, and the researchers need tools to replicate and study them in a controlled setting. Current network simulators,...
Songjie Wei, Jelena Mirkovic
VIZSEC
2005
Springer
14 years 5 days ago
IDGraphs: Intrusion Detection and Analysis Using Histographs
Traffic anomalies and attacks are commonplace in today’s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusi...
Pin Ren, Yan Gao, Zhichun Li, Yan Chen, Benjamin W...