Sciweavers

74 search results - page 9 / 15
» Automated Worm Fingerprinting
Sort
View
83
Voted
ACSAC
2004
IEEE
15 years 2 months ago
Using Predators to Combat Worms and Viruses: A Simulation-Based Study
Large-scale attacks generated by fast-spreading or stealthy malicious mobile code, such as flash worms and e-mail viruses, demand new approaches to patch management and disinfecti...
Ajay K. Gupta 0002, Daniel C. DuVarney
ECIS
2001
15 years 13 days ago
The Articulation of Shared Meaning in Information Systems Development
This paper presents a case study showing how Repertory Grid Analysis (RGA) can be used to construct shared meaning during information systems development, implementation and use. ...
Christopher J. Davis
VIZSEC
2004
Springer
15 years 4 months ago
Passive visual fingerprinting of network attack tools
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attack...
Gregory J. Conti, Kulsoom Abdullah
COMPSEC
2008
113views more  COMPSEC 2008»
14 years 11 months ago
Automated containment of rootkits attacks
Abstract-- Rootkit attacks are a serious threat to computer systems. Packaged with other malware such as worms, viruses and spyware, rootkits pose a more potent threat than ever be...
Arati Baliga, Liviu Iftode, Xiaoxin Chen
ACSAC
2005
IEEE
15 years 4 months ago
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers
An increasing variety of malware, such as worms, spyware and adware, threatens both personal and business computing. Remotely controlled bot networks of compromised systems are gr...
Weidong Cui, Randy H. Katz, Wai-tian Tan