Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 210,148,141 papers from all fields of science
Search
Sign In
Create Free Account
Bagle (computer worm)
Known as:
Bagle
, Bagle botnet
, Bagle worm
Bagle (also known as Beagle) is a mass-mailing computer worm affecting all versions of Microsoft Windows. The first strain, Bagle.A, did not…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Alureon
Backdoor (computing)
Botnet
Criticism of Windows XP
Expand
Broader (1)
Spamming
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2016
Review
2016
Nutritional Status and Body Fat of 1236 Month Old Young Children from Mumbai , India
N. N. Bagle
,
S. Udipi
2016
Corpus ID: 53365908
Background Little data is available on body fat of young children and there is dearth of information on association between…
Expand
2012
2012
Obfuscated malware detection using API call dependency
Chinmaya Kumar Patanaik
,
F. Barbhuiya
,
Sukumar Nandi
International Conference on Security of Internet…
2012
Corpus ID: 7570899
Malwares pose a grave threat to security of a network and host systems. Many events such as Distributed Denial-of-Service attacks…
Expand
2011
2011
A strategic analysis of spam botnets operations
O. Thonnard
,
M. Dacier
International Conference on Email and Anti-Spam
2011
Corpus ID: 14615869
We present in this paper a strategic analysis of spam botnets operations, i.e., we study the inter-relationships among bot-nets…
Expand
2011
2011
Setting a Worm Attack Warning by using Machine Learning to Classify NetFlow Data
A. A. Shubair
,
Ramadass Sureswara
,
Altaher Altyeb
,
Alaa' Amer
2011
Corpus ID: 33147685
e present a worm warning system that leverages the reliability of IP-Flow and the effectiveness of machine learning techniques…
Expand
2011
2011
Authentication and Virus Detection Enhancement for Client and Server Applications
M. W. Al-Saadoon
2011
Corpus ID: 16266853
Security issues are a core part of distributed computing systems, and are part of everyday life since they are used in web…
Expand
Highly Cited
2009
Highly Cited
2009
Evolvable malware
S. Noreen
,
Shafaq Murtaza
,
M. Shafiq
,
M. Farooq
Annual Conference on Genetic and Evolutionary…
2009
Corpus ID: 7404049
The concept of artificial evolution has been applied to numerous real world applications in different domains. In this paper, we…
Expand
2008
2008
Computer Worm Ecology in Encounter-based Networks (Invited Paper)
Sapon Tanachaiwiwat
,
Ming-Hsuan Hsieh
,
A. Helmy
2008
Corpus ID: 755389
Encounter-based network is a frequently- disconnected wireless ad-hoc network requiring immediate neighbors to store and forward…
Expand
2006
2006
Onset of sexual maturity in captive-reared endangered Indian seahorse, Hippocampus kuda
M. Thangaraj
,
Aaron Premnath Lipton
,
A. Victor
2006
Corpus ID: 83702712
The endangered Indian seahorse, Hippocampus kuda successfully reared in captive conditions for more than two years, repeatedly…
Expand
Highly Cited
2005
Highly Cited
2005
The Internet Motion Sensor - A Distributed Blackhole Monitoring System
M. Bailey
,
E. Cooke
,
F. Jahanian
,
Jose Nazario
Network and Distributed System Security Symposium
2005
Corpus ID: 5503484
As national infrastructure becomes intertwined with emerging global data networks, the stability and integrity of the two have…
Expand
2004
2004
The Internet Motion Sensor: A distributed global scoped Internet threat monitoring system
E. Cooke
,
M. Bailey
,
D. Watson
,
F. Jahanian
,
Jose Nazario
2004
Corpus ID: 14679009
Networks are increasingly subjected to a broad spectrum of threats that impact the reliability and availability of critical…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE