نتایج جستجو برای: worm

تعداد نتایج: 9462  

2004
Wei Yu Corey Boyer Dong Xuan

Recent active worm propagation events show that active worms can spread in an automated fashion and flood the Internet in a very short period of time. Due to the recent surge of Peer-to-Peer (P2P) systems with large numbers of users, P2P systems can be a potential vehicle for the active worm attacker to achieve fast worm propagation in the Internet. In this paper, we address the issue by studyi...

2015

IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation Written by Administrator Wednesday, 16 March 2011 09:20 Last Updated Monday, 21 March 2011 07:11 In recent era, Internet worms are one of seriousthreats which have been a major cause of intrusion attempts.Traditional Intrusion Detection Systems (IDS) store allknown worm signatures and monitors real time traffic ...

Journal: :CoRR 2007
Sapon Tanachaiwiwat Ahmed Helmy

An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. Using traditional approaches such as gateways or firewalls for deterring worm propagation in encounter-based networks is inappropriate. We propose models for the worm interaction approach that relies upon automated bene...

2015

IARMSG: Incremental Association Rule Mining for Automatic Worm Signature Generation Written by Administrator Wednesday, 16 March 2011 09:20 Last Updated Monday, 21 March 2011 07:11 In recent era, Internet worms are one of seriousthreats which have been a major cause of intrusion attempts.Traditional Intrusion Detection Systems (IDS) store allknown worm signatures and monitors real time traffic ...

Journal: :Medical image computing and computer-assisted intervention : MICCAI ... International Conference on Medical Image Computing and Computer-Assisted Intervention 2010
Tammy Riklin-Raviv Vebjorn Ljosa Annie L. Conery Frederick M. Ausubel Anne E. Carpenter Polina Golland Carolina Wählby

We present a novel approach for extracting cluttered objects based on their morphological properties. Specifically, we address the problem of untangling Caenorhabditis elegans clusters in high-throughput screening experiments. We represent the skeleton of each worm cluster by a sparse directed graph whose vertices and edges correspond to worm segments and their adjacencies, respectively. We the...

2016
Xiangyu Bu Xinghua Zhang Martin Kröger

The worm-like chain is one of the best theoretical models of the semiflexible polymer. The structure factor, which can be obtained by scattering experiment, characterizes the density correlation in different length scales. In the present review, the numerical method to compute the static structure factor of the worm-like chain model and its general properties are demonstrated. Especially, the c...

2015
Joseph R. Mwanga Godfrey M. Kaatano Julius E. Siza Su Young Chang Yunsuk Ko Cyril M. Kullaya Jackson Nsabo Keeseon S. Eom Tai-Soon Yong Jong-Yil Chai Duk-Young Min Han-Jong Rim John M. Changalucha

Schistosomiasis and intestinal worm infections are widespread diseases of public health importance in Tanzania. A study on perceptions and practices related to schistosomiasis and intestinal worm infections was undertaken among a community population of Kome Island in Sengerema District, north-western Tanzania, where intestinal schistosomiasis and intestinal worm infections are endemic. Schisto...

Journal: :The Journal of Experimental Medicine 2004
G. H. Whipple

1. The hook worm of man-both the Old and New World types-contains a weak hemolytic agent active in vitro. It is soluble in salt solution, is easily destroyed by heat and acts slowly. 2. The hemolysin is present in all parts of the worm and probably is associated with the intestinal tract. 3. The hook worm of the dog contains a similar hemolysin. 4. These hemolysins are not specific, but will ac...

2003
David Moore Colleen Shannon Geoffrey M. Voelker Stefan Savage

It has been clear since 1988 that self-propagating code can quickly spread across a network by exploiting homogeneous security vulnerabilities. However, the last few years have seen a dramatic increase in the frequency and virulence of such “worm” outbreaks. For example, the Code-Red worm epidemics of 2001 infected hundreds of thousands of Internet hosts in a very short period – incurring enorm...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید