Computer Science ›› 2006, Vol. 33 ›› Issue (8): 134-137.

Previous Articles     Next Articles

  

  • Online:2018-11-17 Published:2018-11-17

Abstract: The frequent explosion of massive worm propagation becomes a huge threaten to Internet security and caused countless losses, but endless novel worm species come one after another. Currently, worm monitoring and response are hysteretic and mainly operated

Key words: Worm spreading, Worm source tracing algorithm, 2-page hash algorithm

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!