A behavioral approach to worm detection
Proceedings of the 2004 ACM workshop on Rapid malcode
Proceedings of the 36th SIGCSE technical symposium on Computer science education
Does Trusted Computing Remedy Computer Security Problems?
IEEE Security and Privacy
Efficient simulation of Internet worms
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Origins: an approach to trace fast spreading worms to their roots
International Journal of Security and Networks
ACM SIGCAS Computers and Society
LISABETH: automated content-based signature generator for zero-day polymorphic worms
Proceedings of the fourth international workshop on Software engineering for secure systems
Network Traffic Classification by Common Subsequence Finding
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part I
Botnets for scalable management
DSOM'07 Proceedings of the Distributed systems: operations and management 18th IFIP/IEEE international conference on Managing virtualization of networks and services
A spontaneous content based filtering approach for network security
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Modeling the spread of internet worms via persistently unpatched hosts
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Virtual playgrounds for worm behavior investigation
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Hi-index | 0.00 |