نتایج جستجو برای: mopane worm
تعداد نتایج: 9551 فیلتر نتایج به سال:
We give an estimate of type sup× inf on Riemannian manifold of dimension 5 for Yamabe type equation. Mathematics Subject Classification: 53C21, 35J60 35B45 35B50
One of the largest threats to network security in Internet-connected corporate networks is attack via worms. Worms infiltrate the network and compromise security, consuming processor cycles and network bandwidth that would otherwise be available for corporate use. This research analyses a particular strain of network worm called the “Ethical worm”, which is targeted towards beneficial means rat...
To improve the efficiency of resistance of anti-worms to malicious worms and enhance their diffusibility, diffusion strategies of anti-worms based on B+ address tree are proposed in order to speed up anti-worm diffusion rate in the network and reduce anti-worm influence on network system when diffused. The diffusion strategies are simulated by scilab. Results show that anti-worms using B+ addre...
This work presents a closed-form expression for characterizing the spread of a class of worm-scanning strategies through a mean-field approximation. This expression can both accurately capture the worm propagation speed before the number of infections becomes large and explicitly demonstrate the effects of important parameters such as the vulnerable-host distribution and the worm-scanning strat...
a total of 68385 live pin-worm eggs from adhesive scotch tape were exposed to different detergent powders in under to compare method of detergent washing clothes with the boiling method for the control of family enterobiasis. results show that: a) 80.4-100 percent of eggs are destroyed after hatching within 6-8 hours of exposure to 0.25 gr% detergent at 10-250c. exposure for less than 6 hours h...
Worm is the major hurdle, which restricts the comfortable communication in any networks. Worm is a malicious software program that destroys the normal communication in the networking systems. Every system must not be vulnerable to avoid infection by worm in the computing networks. Defending against such worm still plays vital role to the network programmers. Various countermeasures have been ta...
Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. They created complex worm interactions as well as detrimental impact on infrastructure. Worm propagation analysis, including exploring mechanisms of predator-prey worms’ propagation and formulating effects of network/worm parameters, has great importance for worm containment and host protection. In this p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید