نتایج جستجو برای: mopane worm
تعداد نتایج: 9551 فیلتر نتایج به سال:
Today’s computer world the Active worm’s are the major security issues in the Internet. This is because of the ability of active worms to execute in an automated fashion as they continuously attack the computers on the Internet. Here we find a new class of active worms, called as Camouflaging Worm (C-Worm). The C-Worm is different from regular worms because of its ability to change its scan tra...
This work presents our GLOWS (Gateway Level Oregon Worm Simulator) simulator, designed to produce realistic worm traffic over a broad range of scenarios. GLOWS simulates the spread of a worm across the Internet and its propagation into a single domain with the goal of capturing the worm traffic that crosses the gateway point separating the monitored domain from the Internet.
Abstract This study was conducted to test the effect of bioremediation the polychaete worm Nereis diversicolor in order to removal of wastewater nutrition derived different densities Huso huso. The aim of this study was determination of different densities for creating the equivalence for rearing of N. diversicolor and H. huso rate in the integrated culture system. Three different densities of ...
Internal egg hatching in Caenorhabditis elegans, "worm bagging," is induced by exposure to bacteria. This study demonstrates that the determination of worm bagging frequency allows for advanced insight into the degree of bacterial pathogenicity and is highly predictive of the survival of worm populations. Therefore, worm bagging frequency can be regarded as a reliable population-wide stress rep...
Active worms are one of the major security threats to the Internet. This is because of their ability to propagate in an automated fashion as they continuously compromise computers on the Internet. Camouflaging Worm (C-Worm in short) is one of the active worms. The C-Worm is different from traditional worms because they can camouflage (hide) itself from the detection schemes by manipulating thei...
As data to be stored in storage subsystems tremendously increases, data protection techniques have become more important than ever, to provide data availability and reliability. In this paper, we present the file system-based data protection (WOWSnap) that has been implemented using WORM (Write-Once-Read-Many) scheme. In the WOWSnap, once WORM files have been created, only the privileged read r...
As data to be stored in storage subsystems tremendously increases, data protection techniques have become more important than ever, to provide data availability and reliability. In this paper, we present the file system-based data protection (WOWSnap) that has been implemented using WORM (Write-Once-Read-Many) scheme. In the WOWSnap, once WORM files have been created, only the privileged read r...
Many worm detectors have been proposed and are being deployed, but the literature does not clearly indicate which one is the best. New worms such as IKEE.B (also known as the iPhone worm) continue to present new challenges to worm detection, further raising the question of how effective our worm defenses are. In this paper, we identify six behavior-based worm detection algorithms as being poten...
Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation and thus pose great challenges to defend against them. In this paper, we investigate a new class of active worms, referred to as Camouflaging Worm (C-Worm ...
Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation, and thus, pose great challenges to defend against them. A new class of active worms, referred to as Camouflaging Worm (C-Worm in short). The C-Worm is dif...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید