نتایج جستجو برای: mopane worm

تعداد نتایج: 9551  

Farhood Yeganehpoor Farideh Samadiyan Mahmud Khoramivafa Vahid Beyginiya,

The experiment was carried out in a factorial arrangement with the base of randomized complete block design in three repetitions. The first factor consisted of 11 bed for eating worm and the second factor is the different seasons (spring and autumn) respectively. Traits was including number of capsules (Coconut), the number of adult worms, the number of immature worms, live worms masses (mg), m...

2003
M. SPONHEIMER JACQUI CODRON D. de Ruiter Julia Lee-Thorp D. Codron

Impala are known to exhibit dietary flexibility, relying primarily on browse in some areas and graze in others. In this study we use stable isotope analysis of faeces and hair to examine the diets of impala in Kruger National Park. As expected, the data show that impala are mixed-feeders and highly distinct from grazing buffalo and browsing kudu. Moreover, impala, buffalo, and kudu faeces conta...

2007
Bo CHEN Xiao-Chun YUN

After many Internet-scale worm incidents in recent years, it is clear that a simple self-propagation worm can quickly spread across the Internet. And every worm incidents can cause severe damage to our society. So it is necessary to build a system that can detect the presence of worm as quickly as possible. This paper first analyzes the worm’s framework and its propagation model. Then, we descr...

Journal: :Simulation 2006
Cliff Changchun Zou Donald F. Towsley Weibo Gong Songlin Cai

Most well-known worms, such as Code Red, Slammer, Blaster, and Sasser, infected vulnerable computers by scanning the entire IPv4 address space. In this article, the authors present an advanced worm called the “routing worm,” which implements two new attacking techniques. First, a routing worm uses Border Gateway Protocol (BGP) routing tables to only scan the Internet-routable address space, whi...

2005
Jangwon Choi Jaewook Lee Jahwan Koo Byungyeon Park Wonhyuk Lee Seongjin Ahn

The effort required for detecting worm viruses, that threaten the reliability and stability of network resources, is in the process of advancing, demanding increasingly sophisticated resources. Pattern-based worm virus detection systems use detection methods, which focus on pattern analysis for specific worm viruses. In the event of a different attack method, or a new attack occurs, current sys...

2006
Sapon Tanachaiwiwat Ahmed Helmy

“War of the worms” is a war between opposing computer worms, creating complex worm interactions. For example, in September 2003 the Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. In this paper, we try to answer the following questions: How can we explain the dynamic of such phenomena with a simple mathematical model? How can one worm win this war? How...

Journal: :Computers 2015
Jun-Won Ho

In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the attacker will not likely select this random multi-hop propagation approach in a mobile sensor network. This is because multi-hop worm route paths to random vulnerable targets can be often breached due to node mobility, leading to failure of fast worm spread under this strategy. Therefore, an appropr...

Journal: :IEICE Transactions 2009
Yong Tang Jiaqing Luo Bin Xiao Guiyi Wei

Worms are a common phenomenon in today’s Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types– Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The In...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید