Topology-aware vulnerability mitigation worms

In very dynamic Information and Communication Technology (ICT) infrastructures, with rapidly growing applications, malicious intrusions have become very sophisticated, effective, and fast. Industries have suffered billions of US dollars losses due only to malicious worm outbreaks. Several calls have...

Full description

Bibliographic Details
Main Author: Al-Salloum, Ziyad
Published: Royal Holloway, University of London 2011
Subjects:
500
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.549580