共 50 条
- [31] Research on Intrusion and Defense of P2P-Based Worm 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL II, 2009, : 540 - 543
- [33] Design of a worm isolation and unknown worm monitoring system based on Honeypot PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 656 - 659
- [34] A Proposal of Patrol Function by White-Hat Worm in Botnet Defense System 2021 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS-ASIA (ICCE-ASIA), 2021,
- [35] A secure and efficient certificateless content extraction signature with privacy protection PLOS ONE, 2021, 16 (11):
- [36] A Simple and Efficient Signature-Based Consensus Protocol in the Asynchronous Distributed System INFORMATION TECHNOLOGY AND CONTROL, 2012, 41 (02): : 183 - 198
- [37] Vaccine Distribution Path Optimization in Agent-Oriented Worm Defense System INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (04): : 166 - 171
- [38] Models and analysis of active worm defense COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 38 - 53
- [39] Evaluation of an adaptive genetic-based signature extraction system for network intrusion detection Pattern Analysis and Applications, 2013, 16 : 549 - 566