Cited By
View all- Abu‐Amara MAl‐Baiz AMahmoud ASqalli MAzzedin F(2012)A scalable NAT‐based solution to Internet access denial by higher‐tier ISPsSecurity and Communication Networks10.1002/sec.5576:2(194-209)Online publication date: 10-May-2012
This study examines the functionality and propagation patterns of computer viruses, worms, and Trojan horses detected during a 12-month period beginning on January 1, 2004. Using data obtained from threat reports prepared by a major vendor of computer ...
While much recent research concentrates on propagation models, the defence against worms is largely an open problem. Classical containment strategies, based on manual application of traffic filters, will be almost totally ineffective in the wide area ...
The fight against malicious software (or malware, which includes everything from worms to viruses to botnets) is often viewed as an "arms race." Conventional wisdom is that we must continually "raise the bar" for the malware creators. However, the ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in