Conferences in DBLP
(worm) 2005 (conf/worm/2005)
Brian Hernacki Emerging threats. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:1- [Conf ] Mohammad Mannan , Paul C. van Oorschot On instant messaging worms, analysis and countermeasures. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:2-11 [Conf ] Justin Ma , Geoffrey M. Voelker , Stefan Savage Self-stopping worms. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:12-21 [Conf ] Zesheng Chen , Chuanyi Ji A self-learning worm using importance scanning. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:22-29 [Conf ] Spyros Antonatos , P. Akritidis , Evangelos P. Markatos , Kostas G. Anagnostakis Defending against hitlist worms using network address space randomization. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:30-40 [Conf ] Milan Vojnovic , Ayalvadi Ganesh On the effectiveness of automatic patching. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:41-50 [Conf ] Vern Paxson An analysis of the witty outbreak: exploiting underlying structure for detailed reconstruction of an internet-scale event. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:51- [Conf ] Moheeb Abu Rajab , Fabian Monrose , Andreas Terzis Worm evolution tracking via timing analysis. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:52-59 [Conf ] David W. Richardson , Steven D. Gribble , Edward D. Lazowska The limits of global scanning worm detectors in the presence of background noise. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:60-70 [Conf ] Stefan Savage Scalable internet threat monitoring. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:71- [Conf ] David J. Malan , Michael D. Smith Host-based detection of worms through peer-to-peer cooperation. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:72-80 [Conf ] Kurt Rohloff , Tamer Basar The detection of RCS worm epidemics. [Citation Graph (0, 0)][DBLP ] WORM, 2005, pp:81-86 [Conf ]