Sciweavers

63 search results - page 2 / 13
» Modeling and analysis of worm interactions (war of the worms...
Sort
View
INFOCOM
2003
IEEE
13 years 10 months ago
Modeling the Spread of Active Worms
— Active worms spread in an automated fashion and can flood the Internet in a very short time. Modeling the spread of active worms can help us understand how active worms spread...
Zesheng Chen, Lixin Gao, Kevin A. Kwiat
COMCOM
2008
135views more  COMCOM 2008»
13 years 5 months ago
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Active worms continue to pose major threats to the security of today's Internet. This is due to the ability of active worms to automatically propagate themselves and compromi...
Wei Yu, Sriram Chellappan, Xun Wang, Dong Xuan
PE
2006
Springer
114views Optimization» more  PE 2006»
13 years 5 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 5 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
TELSYS
2010
147views more  TELSYS 2010»
13 years 6 days ago
A new worm propagation threat in BitTorrent: modeling and analysis
Peer-to-peer (p2p) networking technology has gained popularity as an efficient mechanism for users to obtain free services without the need for centralized servers. Protecting thes...
Sinan Hatahet, Abdelmadjid Bouabdallah, Yacine Cha...