Warhol worm

Known as: Flash worm, Warhol worms 
A Warhol worm is an extremely rapidly propagating computer worm that spreads as fast as physically possible, infecting all vulnerable machines on the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2000-2016
01220002016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Internet worms continue to plague the Internet infrastructure with wider and deeper impact since the Morris Worm in early 1988… (More)
  • figure I
  • figure 2
  • table I
  • figure 4
  • figure 5
Is this relevant?
2012
2012
Active worms are one of the major security threats to the Internet. This is because of their ability to propagate in an automated… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2011
2011
The speed of the spread of Internet worms increased dramatically in recent years. Moreover it is certain that it will continue to… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
Cloud computing technology not only provides us powerful computing, on-demand service, rapid elasticity, but also possible great… (More)
Is this relevant?
2007
2007
Inspired by the Flash worm paper [1], we formulate and investigate the problem of finding a fast and resilient propagation… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
2006
2006
Some people have argued that software is artistic. If so, what about malware? Only occasional, small-scale attempts have been… (More)
  • figure 1
  • figure 2
Is this relevant?
2006
2006
While traditional Internet worms take hours or days to infect a high percentage of vulnerable hosts, a flash worm takes seconds… (More)
Is this relevant?
2005
2005
Can a network be protected from single-packet Warhol worms [14]? This paper generates and simulates random network environments… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Flash worms follow a precomputed spread tree using prior knowledge of all systems vulnerable to the worm's exploit. In previous… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
The ability of attackers to rapidly gain control of vast numbers of Internet hosts poses an immense risk to the overall security… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?