Overcoming Limitations in Computer Worm Models
In less than two decades, destruction and abuse caused by computer viruses and worms have grown from an anomaly to an everyday occurrence. In recent years, the Computer Emergency Response Team (CERT) has recorded a steady increase in software defects and vulnerabilities, similar to those exploited...
Main Author: | Posluszny III, Frank S |
---|---|
Other Authors: | Michael A. Gennert, Department Head |
Format: | Others |
Published: |
Digital WPI
2005
|
Subjects: | |
Online Access: | https://digitalcommons.wpi.edu/etd-theses/151 https://digitalcommons.wpi.edu/cgi/viewcontent.cgi?article=1150&context=etd-theses |
Similar Items
-
Automated Defense Against Worm Propagation.
by: Patwardhan, Sudeep
Published: (2005) -
Topology-aware vulnerability mitigation worms
by: Al-Salloum, Ziyad
Published: (2011) -
Using Plant Epidemiological Methods to Track Computer Network Worms
by: Pande, Rishikesh A.
Published: (2011) -
Designing a Monitoring Tool for Mosul University Network to Detect Worm Infected Computers
by: Asmaa Hamoo, et al.
Published: (2013-07-01) -
Selenium incorporated in vegetable material for the obtaining of worm flour and compost
by: Ulbio Alcivar Cedeño, et al.
Published: (2015-02-01)