Sciweavers

247 search results - page 10 / 50
» Worm anatomy and model
Sort
View
CA
1995
IEEE
13 years 12 months ago
Topological modeling of human anatomy using medical data
Prem Kalra, Pierre Beylot, P. Gingins, Nadia Magne...
USENIX
2008
13 years 10 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
MMMACNS
2005
Springer
14 years 1 months ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
INFOCOM
2003
IEEE
14 years 1 months ago
Internet Quarantine: Requirements for Containing Self-Propagating Code
— It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have...
David Moore, Colleen Shannon, Geoffrey M. Voelker,...
GLOBECOM
2006
IEEE
14 years 2 months ago
Defending against Instant Messaging Worms
— Due to the real time nature and buddy list presence information of Instant Messaging (IM) systems worms can spread over IM networks rapidly, causing severe damages, however, it...
Zhijun Liu, Guoqiang Shu, Na Li, David Lee