|
Volumn , Issue , 2003, Pages 42-50
|
Worm anatomy and model
|
Author keywords
Network Modeling; Network Security; Turing Machine; Worm
|
Indexed keywords
ALGORITHMS;
BANDWIDTH;
COMPUTER NETWORKS;
COMPUTER SIMULATION;
COMPUTER SYSTEM FIREWALLS;
COMPUTER VIRUSES;
INTERNET;
LIFE CYCLE;
MATHEMATICAL MODELS;
SECURITY OF DATA;
TURING MACHINES;
INTRUSION DETECTION SYSTEMS (IDS);
NETWORK MODELING;
WORM CONFLICTS;
WORM COVERAGE TRANSITIVE CLOSURE (WCTC);
COMPUTER WORMS;
|
EID: 18844371168
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/948187.948196 Document Type: Conference Paper |
Times cited : (42)
|
References (15)
|