Searched for: "network worms"
- Security (421)
- Networking (84)
- Collaboration (51)
- Microsoft (47)
- Mobility (41)
- Software (38)
- Data Centers (18)
- Open Source (14)
- Data Management (11)
- Banking (9)
- Cxo (9)
- Enterprise Software (9)
- Tech & Work (9)
- Developer (8)
- After Hours (6)
- Social Enterprise (6)
- Hardware (5)
- Printers (5)
- Storage (5)
- Cloud (4)
- Virtualization (3)
- Android (2)
- Big Data (2)
- Project Management (2)
- Innovation (1)
About 812 results for "network worms"
Intrusion detection and prevention system represents an essential line of defense against variety of web attacks that can compromise with the security and proper functioning of the...
As mobile devices have become more ubiquitous, mobile users increasingly expect to utilize proximity-based connectivity, e.g., Wi-Fi and Bluetooth, to opportunistically share multi...
Mobile ad-hoc network is widely used in today's world as MANET is having characteristics such as wireless connectivity, dynamically changing topology. In MANET mobile nodes also ac...
Security of Information is one of the cornerstones of Information Society. As number of Network attacks have increased over the past few years, Intrusion Detection System (IDS) is ...
A Secure Hashed Variable Bit Rate Source Routing Protocol and Mitigation of Wormhole Attack for MANETs
In mobile ad hoc networks, security is one among the many challenges to be taken care of Passive attacks and active attacks are the common types of attacks in Mobile Ad-hoc NETwork...
Malware stands for malicious software. Terms such as virus, Trojan, worm, and bot all have specific meanings. Malware is used to generically describe any malicious software, regard...
The electro-magnetic pollution is considered one of the most dangerous pollution which attracts attention in these days. Electro-magnetic pollution is considered a result from elec...
A Novel Method for Detection of Internet Worm Malcodes using Principal Component Analysis and Multiclass Support Vector Machine
Internet worms are malware programs that imitate themselves and spread around the network. Internet worm, a wide spreading malcode exploits vulnerability in the operating system, h...
Computer worm detection has been a challenging and often elusive task. This is partly because of the difficulty of accurately modeling either the normal behavior of computer networ...
Peer-To-Peer (P2P) networks are self-configuring networks with minimal or no central control. P2P networks are more vulnerable to dissemination of malicious or spurious content, ma...