Towards an architectural treatment of software security: a connector-centric approach
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Modeling and analysis of worm defense using stochastic activity networks
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
Accelerating the Propagation of Active Worms by Employing Multiple Target Discovery Techniques
NPC '08 Proceedings of the IFIP International Conference on Network and Parallel Computing
Defending against the propagation of active worms
The Journal of Supercomputing
Proceedings of the 1st Asian Conference on Pattern Languages of Programs
Hi-index | 48.22 |
Malicious software knows no bounds.