共 50 条
- [2] Worm detection and signature extraction based on communication characteristics Tongxin Xuebao, 2007, 12 (1-7):
- [3] Honeypot Based Signature Generation for Defense Against Polymorphic Worm Attacks in Networks PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 159 - 163
- [4] Mining Network Traffic for Worm Signature Extraction FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2008, : 327 - 331
- [5] Efficient information extraction based on signature index Int. J. Database Theory Appl., 2 (33-42):
- [6] Design of Worm Defense System for the Enterprise Network ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 826 - 831
- [7] Online Oral Defense System Based on Threshold Proxy Signature COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 : 110 - +
- [8] Research on Worm Detection and Active Defense System MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 490 - 493
- [9] Online Oral Defense System Based on Threshold Proxy Signature 2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 427 - 431
- [10] Combined Behavior- and Signature-Based Internet Worm Detection System INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (10): : 4213 - 4222