Sciweavers

92 search results - page 3 / 19
» Design space and analysis of worm defense strategies
Sort
View
ICC
2008
IEEE
143views Communications» more  ICC 2008»
13 years 11 months ago
A Closed-Form Expression for Static Worm-Scanning Strategies
—This work presents a closed-form expression for characterizing the spread of static worm-scanning strategies through a mean-field approximation. Our model can both accurately c...
Zesheng Chen, Chao Chen
ISMB
1993
13 years 6 months ago
Pattern Discovery in Gene Regulation: Designing an Analysis Environment
Interactions that determinecellular fate are exceedingly complex, can take place at different levels of gene regulation and involve a large numberof components(such as genes, prot...
Stella Veretnik, Bruce R. Schatz
IRI
2006
IEEE
13 years 11 months ago
Applying the layered decision model to the design of language-based security systems
Safeguarding practices for networked systems involves decisions in at least three areas: identification of welldefined security policies, selection of cost-effective defense strat...
Huaqiang Wei, Jim Alves-Foss
PADS
2005
ACM
13 years 11 months ago
Requirements on Worm Mitigation Technologies in MANETS
This study presents an analysis of the impact of mitigation on computer worm propagation in Mobile Ad-hoc Networks (MANETS). According to the recent DARPA BAA Defense Against Cybe...
Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andr...
CMS
2006
13 years 6 months ago
TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation
Abstract. Sophisticated worms that use precomputed hitlists of vulnerable targets are especially hard to contain, since they are harder to detect, and spread at rates where even au...
Spyros Antonatos, Kostas G. Anagnostakis