Works matching Computer worms


Results: 202
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12

    Modeling and Detection of Camouflaging Worm.

    Published in:
    IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 3, p. 377, doi. 10.1109/TDSC.2010.13
    By:
    • Wei Yu;
    • Xun Wang;
    • Calyam, Prasad;
    • Dong Xuan;
    • Wei Zhao
    Publication type:
    Article
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26

    NADTW: new approach for detecting TCP worm.

    Published in:
    Neural Computing & Applications, 2017, v. 28, p. 525, doi. 10.1007/s00521-016-2358-9
    By:
    • Anbar, Mohammed;
    • Abdullah, Rosni;
    • Munther, Alhamza;
    • Al-Betar, Mohammed;
    • Saad, Redhwan
    Publication type:
    Article
    27
    28
    29
    30

    Collective classification for spam filtering.

    Published in:
    Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 540, doi. 10.1093/jigpal/jzs030
    By:
    • Laorden, Carlos;
    • Sanz, Borja;
    • Santos, Igor;
    • Galán-García, Patxi;
    • Bringas, Pablo G.
    Publication type:
    Article
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40

    PAINTING THE INTERNET.

    Published in:
    Leonardo, 2008, v. 41, n. 2, p. 112, doi. 10.1162/leon.2008.41.2.112
    By:
    • Aycock, John
    Publication type:
    Article
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50