Defensive computer worms: An overview

被引:5
|
作者
Al-Salloum, Ziyad S. [1 ]
机构
[1] Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, United Kingdom
关键词
D O I
10.1504/IJSN.2012.048479
中图分类号
学科分类号
摘要
62
引用
收藏
页码:59 / 70
相关论文
共 50 条
  • [42] Detection of unknown computer worms activity based on computer Behavior using data mining
    Moskovitch, Robert
    Gus, Ido
    Pluderman, Shay
    Stopel, Dima
    Glezer, Chanan
    Shahar, Yuval
    Elovici, Yuval
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN SECURITY AND DEFENSE APPLICATIONS, 2007, : 169 - +
  • [43] Detection of unknown computer worms activity based on computer Behavior using data mining
    Moskovitch, Robert
    Gus, Ido
    Pluderman, Shay
    Stopel, Dima
    Feher, Clint
    Glezer, Chanan
    Shahar, Yuval
    Elovici, Yuval
    2007 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DATA MINING, VOLS 1 AND 2, 2007, : 202 - 209
  • [44] Using artificial neural networks to detect unknown computer worms
    Stopel, Dima
    Moskovitch, Robert
    Boger, Zvi
    Shahar, Yuval
    Elovici, Yuval
    NEURAL COMPUTING & APPLICATIONS, 2009, 18 (07): : 663 - 674
  • [45] Experts fear network paralysis as computer worms blast Internet
    Butler, D
    NATURE, 2003, 425 (6953) : 3 - 3
  • [46] On Viruses, Worms, and other Strange Beasts in Computer Systems.
    Brunnstein, Klaus
    Angewandte Informatik, Applied Informatics, 1987, 29 (10): : 397 - 402
  • [47] Numerical Approaching of SIR Epidemic Model for Propagation of Computer Worms
    Valdez, J. S.
    Guevara, P.
    Audelo, J.
    Delgado, G.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (10) : 3452 - 3460
  • [48] Design and Implementation of Computer Worms Based on Monitoring Replication and Damage
    Al-Saawy, Yazed B.
    Al Amro, Sulaiman
    International Journal of Computer Science and Network Security, 2016, 16 (11): : 55 - 65
  • [49] ON VIRUSES, WORMS, AND OTHER STRANGE BIESTS IN COMPUTER-SYSTEMS
    BRUNNSTEIN, K
    ANGEWANDTE INFORMATIK, 1987, (10): : 397 - 402
  • [50] A computational model of computer worms based on persistent turing machines
    Hao, Jingbo
    Yin, Jianping
    Zhang, Boyun
    PROCEEDINGS OF THE FIFTH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, VOLS 1 AND 2, 2006, : 453 - 456