Sciweavers

33 search results - page 4 / 7
» Understanding Localized-Scanning Worms
Sort
View
VISUALIZATION
2005
IEEE
15 years 3 months ago
Opening the Can of Worms: An Exploration Tool for Vortical Flows
Gaining a comprehensive understanding of turbulent flows still poses one of the great challenges in fluid dynamics. A wellestablished approach to advance this research is the an...
Simon Stegmaier, Ulrich Rist, Thomas Ertl
NAR
2010
143views more  NAR 2010»
14 years 4 months ago
WormBase: a comprehensive resource for nematode research
WormBase (http://www.wormbase.org) is a central data repository for nematode biology. Initially created as a service to the Caenorhabditis elegans research field, WormBase has evo...
Todd W. Harris, Igor Antoshechkin, Tamberlyn Bieri...
76
Voted
LISA
2007
14 years 12 months ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
60
Voted
RAID
2005
Springer
15 years 3 months ago
Empirical Analysis of Rate Limiting Mechanisms
One class of worm defense techniques that received attention of late is to “rate limit” outbound traffic to contain fast spreading worms. Several proposals of rate limiting t...
Cynthia Wong, Stan Bielski, Ahren Studer, Chenxi W...
SDM
2007
SIAM
96views Data Mining» more  SDM 2007»
14 years 11 months ago
Understanding and Utilizing the Hierarchy of Abnormal BGP Events
Abnormal events, such as security attacks, misconfigurations, or electricity failures, could have severe consequences toward the normal operation of the Border Gateway Protocol (...
Dejing Dou, Jun Li, Han Qin, Shiwoong Kim, Sheng Z...