Sciweavers

482 search results - page 18 / 97
» A taxonomy of computer worms
Sort
View
113
Voted
ERCIM
2007
125views more  ERCIM 2007»
15 years 10 days ago
Workflow Management Systems for Grid Computing
With the advent of Grid and application technologies, scientists and engineers are building more and more complex applications to manage and process large data sets, and execute s...
Carmen Bratosin, Wil M. P. van der Aalst
95
Voted
IMC
2005
ACM
15 years 6 months ago
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event
Network “telescopes” that record packets sent to unused blocks of Internet address space have emerged as an important tool for observing Internet-scale events such as the spre...
Abhishek Kumar, Vern Paxson, Nicholas Weaver
99
Voted
WORM
2004
15 years 1 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
108
Voted
DSN
2004
IEEE
15 years 4 months ago
Dynamic Quarantine of Internet Worms
If we limit the contact rate of worm traffic, can we alleviate and ultimately contain Internet worms? This paper sets out to answer this question. Specifically, we are interested ...
Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Sta...
72
Voted
CORR
2010
Springer
112views Education» more  CORR 2010»
15 years 15 days ago
Cooperative Automated Worm Response and Detection Immune Algorithm
The role of T-cells within the immune system is to confirm and assess anomalous situations and then either respond to or tolerate the source of the effect. To illustrate how these ...
Jungwon Kim, William O. Wilson, Uwe Aickelin, Juli...