Munadil Faaeq

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Network signatures are used in network intrusion detection systems that try to detect an Internet worm by monitoring network packets. There are many ways to make polymorphic worms. One technique depends on encrypting the body, which erases both signatures and statistical characteristics of the worm byte string. Currently, intrusion detection system reads(More)
  • 1