Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,059,003 papers from all fields of science
Search
Sign In
Create Free Account
Anti-worm
Known as:
Anti-worms
, Antiworm
, Helpful worm
Anti-worm (sometimes helpful worm), has multiple meanings in the field of computer security. It can be a piece of software designed to protect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Booting
Code Red (computer worm)
Computer security
Denial-of-service attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Modeling and Detection of Camouflaging Worm
Wei Yu
,
Xun Wang
,
P. Calyam
,
D. Xuan
,
Wei Zhao
IEEE Transactions on Dependable and Secure…
2011
Corpus ID: 385977
Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated…
Expand
Review
2009
Review
2009
An Approach against a Computer Worm Attack
O. Toutonji
,
S. Yoo
Int. J. Commun. Networks Inf. Secur.
2009
Corpus ID: 10878204
Building a realistic model for a network defense system against a worm attack is vital to better understand the effects of a worm…
Expand
2005
2005
QBTP worm: an anti-worm with balanced tree based spreading strategy
Yi-xuan Liu
,
Xiao-chun Yun
,
Bailing Wang
,
Haibin Sun
International Conference on Machine Learning and…
2005
Corpus ID: 34991084
The traditional prevention methods of anti-virus cannot provide a safe network against malicious worms. In this paper, we…
Expand
2005
2005
Modeling and analyzing of the interaction between worms and antiworms during network worm propagation
Feng Yang
,
Haixin Duan
,
Xing Li
Science in China Series F: Information Sciences
2005
Corpus ID: 27068064
Interaction of antiworms with a worm population of e.g. hosts of worm infected and hosts of antiworm infected must be considered…
Expand
2004
2004
Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM 2004, Washington, DC, USA, October 29, 2004
V. Paxson
Worm
2004
Corpus ID: 21633755
It is my pleasure to welcome you to the 2nd ACM Workshop on Rapid Malcode. The problem of combating malicious self-propagating…
Expand
2003
2003
A behavior-based anti-worm system
J. C. Hung
,
Kuan-Cheng Lin
,
A. Y. Chang
,
Nigel H. Lin
,
Louis H. Lin
17th International Conference on Advanced…
2003
Corpus ID: 19357533
We propose a behavior-based intrusion detection and response system for Internet worms called Lambent Anti-Worm System (LAWS…
Expand
Review
1999
Review
1999
Remarks on Global Irregularity in the @{Neumann Problem
M. Christ
1999
Corpus ID: 13482967
The Bergman projection on a general bounded, smooth pseudoconvex domain in two complex variables need not be globally regular…
Expand
1986
1986
Intracellular activity of morphologically identified neurons of the grass frog's optic tectum in response to moving configurational visual stimuli
N. Matsumoto
,
W. Schwippert
,
J. Ewert
Journal of Comparative Physiology
1986
Corpus ID: 38443966
SummaryIn the grass frogRana temporaria, various classes of tectal neurons were identified by means of intracellular recording…
Expand
1986
1986
A pane e acqua : peccati e penitenze nel Medioevo : Il "Penitenziale" di Burcardo di Worms
Giorgio M. Picasso
,
Giannino Piana
,
G. Motta
1986
Corpus ID: 177031299
1978
1978
Question of prey feature detectors in the toad'sBufo bufo (L.) visual system: A correlation analysis
J. Ewert
,
H. Borchers
,
A. Wietersheim
Journal of Comparative Physiology
1978
Corpus ID: 30990696
Summary1.ToadsBufo bufo (L.) prefer as prey “worm-like” objects with long axis orientation parallel to the movement direction…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE