Sciweavers

1447 search results - page 34 / 290
» Simulating Internet Worms
Sort
View
CIA
2008
Springer
15 years 1 months ago
Filter Allocation Using Iterative ECNP
Network devices can filter traffic in order to protect end-user computers against network worms and other threats. Since these devices have very limited memories and cannot deploy ...
Jan Tozicka, Stepán Urban, Magdalena Prokop...
JALC
2007
79views more  JALC 2007»
14 years 11 months ago
Two-Way Finite Automata with a Write-Once Track
The basic finite automata model has been extended over the years with different acceptance modes (nondeterminism, alternation), new or improved devices (two-way heads, pebbles, ...
Berke Durak
ICC
2007
IEEE
120views Communications» more  ICC 2007»
15 years 6 months ago
On the Stability of the Malware Free Equilibrium in Cell Phones Networks with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have bought to the forefront the seriousness of the security threat to this increasingly popular mean...
Krishna K. Ramachandran, Biplab Sikdar
PRDC
2005
IEEE
15 years 5 months ago
Server Protection through Dynamic Patching
Recently, hackers has been developing fast propagating worms exploiting vulnerabilities that had just been disclosed by security experts. Those attacks particularly expose servers...
Nicolas Loriant, Marc Ségura-Devillechaise,...
DIMVA
2007
15 years 1 months ago
Measurement and Analysis of Autonomous Spreading Malware in a University Environment
Abstract. Autonomous spreading malware in the form of bots or worms is a constant threat in today’s Internet. In the form of botnets, networks of compromised machines that can be...
Jan Goebel, Thorsten Holz, Carsten Willems