Computer worms

Results: 254



#Item
1Peer to Peer Networks for Defense Against Internet Worms∗ Srinivas Shakkottai R. Srikant  Dept. of Electrical and Computer Engineering

Peer to Peer Networks for Defense Against Internet Worms∗ Srinivas Shakkottai R. Srikant Dept. of Electrical and Computer Engineering

Add to Reading List

Source URL: www.ece.tamu.edu

Language: English - Date: 2006-07-10 14:47:38
    2INSERT YOUR ORGANIZATION NAME  PROTECT YOUR STUFF: GET COMPUTER UPDATES. SECURITY UPDATES DO MORE THAN JUST PROTECT YOUR COMPUTER AGAINST THE LATEST WORMS, VIRUSES, HACKS, AND OTHER INTERNET VILLAINS. THEY PROTECT YOUR P

    INSERT YOUR ORGANIZATION NAME PROTECT YOUR STUFF: GET COMPUTER UPDATES. SECURITY UPDATES DO MORE THAN JUST PROTECT YOUR COMPUTER AGAINST THE LATEST WORMS, VIRUSES, HACKS, AND OTHER INTERNET VILLAINS. THEY PROTECT YOUR P

    Add to Reading List

    Source URL: infosec.ohio.gov

    - Date: 2015-10-01 13:47:36
      3Report on the WoRMS virtual Steering Committee meeting 16 December 2015 Venue: Virtual meeting, through Skype, start at 12h (noon) UTC time Present:

      Report on the WoRMS virtual Steering Committee meeting 16 December 2015 Venue: Virtual meeting, through Skype, start at 12h (noon) UTC time Present:

      Add to Reading List

      Source URL: www.marinespecies.org

      Language: English - Date: 2016-01-13 05:59:54
      4VAGABOND WORMS this is the story of two worms vagabond worms looking for a home happily married and settled in they were just about to begin their lives together in an apple tree

      VAGABOND WORMS this is the story of two worms vagabond worms looking for a home happily married and settled in they were just about to begin their lives together in an apple tree

      Add to Reading List

      Source URL: www.kindiependent.com

      Language: English - Date: 2015-04-07 23:52:27
      5EN1.17 Visualization Support for Intrusion Detection and Forensics Joseph Chang It is of great interest to law enforcement and security personnel to discover the source of a worm attack in order to combat the threat and

      EN1.17 Visualization Support for Intrusion Detection and Forensics Joseph Chang It is of great interest to law enforcement and security personnel to discover the source of a worm attack in order to combat the threat and

      Add to Reading List

      Source URL: aao.sinica.edu.tw

      Language: English - Date: 2014-10-02 04:23:39
      62014 EDITION  Be Safer on the Internet Protect your Mac against malware, as well as Windows- and Linux-targeted threats. Stay clear of all types of malicious code, including viruses, worms, and spyware. Antivirus and An

      2014 EDITION Be Safer on the Internet Protect your Mac against malware, as well as Windows- and Linux-targeted threats. Stay clear of all types of malicious code, including viruses, worms, and spyware. Antivirus and An

      Add to Reading List

      Source URL: cdn3-prodint.esetstatic.com

      Language: English - Date: 2016-07-26 04:26:21
      7LifeWatch Data Grant 2015 Filling the gaps in the World Register of Marine species (WoRMS) Cucullanidae  Final Report

      LifeWatch Data Grant 2015 Filling the gaps in the World Register of Marine species (WoRMS) Cucullanidae Final Report

      Add to Reading List

      Source URL: www.marinespecies.org

      Language: English - Date: 2016-06-20 05:28:33
      8Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu  Pongsin Poosankam

      Design Space and Analysis of Worm Defense Strategies David Brumley Li-Hao Liu Pongsin Poosankam

      Add to Reading List

      Source URL: users.ece.cmu.edu

      Language: English - Date: 2014-05-29 15:38:01
      9COMPUTING PRACTICES The

      COMPUTING PRACTICES The "Worm" Programs Early Experience with a Distributed Computation

      Add to Reading List

      Source URL: www.eecs.harvard.edu

      Language: English
      10PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks Yinzhi Cao§ , Vinod Yegneswaran† , Phillip Porras† , and Yan Chen§ , {vinod, porras}@csl

      PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks Yinzhi Cao§ , Vinod Yegneswaran† , Phillip Porras† , and Yan Chen§ , {vinod, porras}@csl

      Add to Reading List

      Source URL: www.cs.northwestern.edu

      Language: English - Date: 2011-11-29 13:06:25