default search action
WORM 2006: Alexandria, VA, USA
- Farnam Jahanian:
Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006. ACM Press 2006, ISBN 1-59593-551-7
Emerging threats
- Niels Provos, Joe McClain, Ke Wang:
Search worms. 1-8 - Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel:
A preliminary investigation of worm infections in a bluetooth environment. 9-16
Worm characterization
- Xuxian Jiang, Dongyan Xu:
Profiling self-propagating worms via behavioral footprinting. 17-24 - David J. Malan, Michael D. Smith:
Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms. 25-32 - Ying Zhang, Evan Cooke, Zhuoqing Morley Mao:
Internet-scale malware mitigation: combining intelligence of the control and data plane. 33-40 - Giovanni Di Crescenzo, Faramak Vakil:
Cryptographic hashing for virus localization. 41-48
Panel
- Jose Nazario:
Where the worms aren't. 49-50
Modeling
- Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis:
On the impact of dynamic addressing on malware propagation. 51-56 - David M. Nicol:
The impact of stochastic variance on worm propagation and detection. 57-64
Modeling
- Prem Gopalan, Kyle Jamieson, Panayiotis Mavrommatis, Massimiliano Poletto:
Signature metrics for accurate and automated worm detection. 65-72 - Mohamed R. Chouchane, Arun Lakhotia:
Using engine signature to detect metamorphic malware. 73-78
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.