Computer Science ›› 2006, Vol. 33 ›› Issue (8): 134-137.
Previous Articles Next Articles
Online:
Published:
Abstract: The frequent explosion of massive worm propagation becomes a huge threaten to Internet security and caused countless losses, but endless novel worm species come one after another. Currently, worm monitoring and response are hysteretic and mainly operated
Key words: Worm spreading, Worm source tracing algorithm, 2-page hash algorithm
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I8/134
Cited