Defensive computer worms: An overview

被引:5
|
作者
Al-Salloum, Ziyad S. [1 ]
机构
[1] Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom
关键词
D O I
10.1504/IJSN.2012.048479
中图分类号
学科分类号
摘要
62
引用
收藏
页码:59 / 70
相关论文
共 50 条
  • [21] Parasitic worms affect virus coinfection: a mechanistic overview
    Petrellis, Georgios
    Piedfort, Ophelie
    Katsandegwaza, Brunette
    Dewals, Benjamin G.
    TRENDS IN PARASITOLOGY, 2023, 39 (05) : 358 - 372
  • [22] Integrating prey defensive traits: Contrasts of marine worms from temperate and tropical habitats
    Kicklighter, CE
    Hay, ME
    ECOLOGICAL MONOGRAPHS, 2006, 76 (02) : 195 - 215
  • [23] Epidemic Spreading of Computer Worms in Fixed Wireless Networks
    Nekovee, Maziar
    BIO-INSPIRED COMPUTING AND COMMUNICATION, 2008, 5151 : 105 - 115
  • [24] Dynamic model of worms with vertical transmission in computer network
    Mishra, Bimal Kumar
    Pandey, Samir Kumar
    APPLIED MATHEMATICS AND COMPUTATION, 2011, 217 (21) : 8438 - 8446
  • [25] Analysis and detection of computer viruses and worms: An annotated bibliography
    Singh, PK
    Lakhotia, A
    ACM SIGPLAN NOTICES, 2002, 37 (02) : 29 - 35
  • [26] Differential epidemic model of virus and worms in computer network
    Mishra, B.K. (drbimalmishra@gmail.com), 1600, Femto Technique Co., Ltd. (14):
  • [27] Fuzzy epidemic model for the transmission of worms in computer network
    Mishra, Bimal Kumar
    Pandey, Samir Kumar
    NONLINEAR ANALYSIS-REAL WORLD APPLICATIONS, 2010, 11 (05) : 4335 - 4341
  • [28] Probabilistic e-epidemic Model on Computer Worms
    Mishra, Bimal Kumar
    Goswami, R. T.
    2012 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2012, : 1091 - 1096
  • [29] Functional similarities between computer worms and biological pathogens
    Li, Jun
    Knickerbocker, Paul
    COMPUTERS & SECURITY, 2007, 26 (04) : 338 - 347
  • [30] Proactive Detection of Computer Worms Using Model Checking
    Kinder, Johannes
    Katzenbeisser, Stefan
    Schallhart, Christian
    Veith, Helmut
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (04) : 424 - 438