Welchia

Known as: Nachi worm, W32.welchia, Welchia worm 
The Welchia worm, also known as the "Nachia worm", is a computer worm that exploits a vulnerability in the Microsoft Remote procedure call (RPC… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2004-2013
012320042013

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
This paper presents an algorithm based on entropy and Mahalanobis distance to characterize the behavior of worms attack. For this… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 5
Is this relevant?
2010
2010
  • Yang Yong
  • 2010 International Conference on Artificial…
  • 2010
The mechanism of active counter-attack on worms has been developed and studied for several years. The worm vaccination, a kind of… (More)
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2008
2008
Large scale internet data analysis often concentrates on statistical measures for volume properties or is focused on the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2008
2008
Anomaly detection systems play a significant role in protection mechanism against attacks launched on a network. The greatest… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 6
Is this relevant?
2007
2007
’War of the worms’ is a war between opposing computer worms, creating complex worm interactions as well as… (More)
Is this relevant?
2006
2006
“War of the worms” is a war between opposing computer worms, creating complex worm interactions. For example, in September 2003… (More)
  • figure 2
  • figure 3
  • figure 4
  • figure 6
  • figure 9
Is this relevant?
2005
2005
An Internet cyber threat monitoring system detects cyber threats using network sensors deployed at particular points on the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
An effective Internet cyber threat monitoring system detects cyber threats using network sensors deployed at particular points on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2005
2005
  • 2005
In this paper, we present a method to detect the existence of sophisticated attack tools in the Internet that combine, in a… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2004
2004
Malicious traffic from self-propagating worms and denial-of-service attacks constantly threatens the everyday operation of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?