Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
RAID
2010
Springer
11 years 3 months ago
Behavior-Based Worm Detectors Compared
Abstract. Many worm detectors have been proposed and are being deployed, but the literature does not clearly indicate which one is the best. New worms such as IKEE.B (also known as...
Shad Stafford, Jun Li
MICCAI
2010
Springer
11 years 3 months ago
Morphology-Guided Graph Search for Untangling Objects: C. elegans Analysis
We present a novel approach for extracting cluttered objects based on their morphological properties1 . Specifically, we address the problem of untangling C. elegans clusters in h...
Tammy Riklin Raviv, Vebjorn Ljosa, Annie L. Conery...
TPDS
2008
78views more  TPDS 2008»
11 years 5 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
TON
2008
103views more  TON 2008»
11 years 5 months ago
On the race of worms, alerts, and patches
We study the effectiveness of automatic patching and quantify the speed of patch or alert dissemination required for worm containment. We focus on random scanning as this is repres...
Milan Vojnovic, Ayalvadi J. Ganesh
JCS
2006
81views more  JCS 2006»
11 years 5 months ago
Effective worm detection for various scan techniques
In recent years, the threats and damages caused by active worms have become more and more serious. In order to reduce the loss caused by fastspreading active worms, an effective de...
Jianhong Xia, Sarma Vangala, Jiang Wu, Lixin Gao, ...
IJNSEC
2008
127views more  IJNSEC 2008»
11 years 5 months ago
Inter-domain Routing Stability Dynamics During Infrastructure Stress Events: The Internet Worm Menace
The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system's c...
Francesco Palmieri
CIDM
2007
IEEE
11 years 5 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
WORM
2003
11 years 6 months ago
Worm anatomy and model
We present a general framework for reasoning about network worms and analyzing the potency of worms within a specific network. First, we present a discussion of the life cycle of ...
Dan Ellis
WORM
2004
11 years 6 months ago
Preliminary results using scale-down to explore worm dynamics
A major challenge when attempting to analyze and model large-scale Internet phenomena such as the dynamics of global worm propagation is finding ate abstractions that allow us to ...
Nicholas Weaver, Ihab Hamadeh, George Kesidis, Ver...
WORM
2004
11 years 6 months ago
The top speed of flash worms
Flash worms follow a precomputed spread tree using prior knowledge of all systems vulnerable to the worm's exploit. In previous work we suggested that a flash worm could satu...
Stuart Staniford, David Moore, Vern Paxson, Nichol...
books