![Internet / Computer worms / Code Red / Malware / Witty / Subnetwork / Morris worm / Classless Inter-Domain Routing / Intrusion detection system / Network architecture / Routing / Computing Internet / Computer worms / Code Red / Malware / Witty / Subnetwork / Morris worm / Classless Inter-Domain Routing / Intrusion detection system / Network architecture / Routing / Computing](https://www.pdfsearch.io/img/e7684589eb8f17329027f665252fa778.jpg)
| Document Date: 2008-08-14 14:22:43 Open Document File Size: 564,23 KBShare Result on Facebook
Company Intrusion Detection Systems / / Currency pence / / / Facility Distributed Worm Monitoring Moheeb Abu Rajab Fabian Monrose Andreas Terzis Computer Science Department Johns Hopkins University / / IndustryTerm detection systems / target selection algorithm / power-law distribution / distributed monitoring systems / realistic distributed monitoring infrastructure / power law / automated distributed infrastructure / computing / biased target selection algorithm / networks using network management tools / operational networks / distributed monitoring infrastructure / power law distribution / automatic containment solutions / Internet worms / target selection algorithms / / Organization Johns Hopkins University / MB MC / / Person Abu Rajab Fabian Monrose Andreas Terzis / / / ProvinceOrState Manitoba / / Technology target selection algorithms / IPv4 / Simulation / Nimda-like target selection algorithm / biased target selection algorithm / PDF / /
SocialTag |