Author of the publication

Worm virulence estimation for the containment of local worm outbreak.

, , , and . Comput. Secur., 29 (1): 104-123 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Design and Implementation of a Self-Healing Database System., , , , , and . J. Intell. Inf. Syst., 23 (3): 247-269 (2004)Worm virulence estimation for the containment of local worm outbreak., , , and . Comput. Secur., 29 (1): 104-123 (2010)Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies., , and . Int. J. Inf. Comput. Secur., 1 (3): 315-340 (2007)Visual toolkit for network security experiment specification and data analysis., , and . VizSEC, page 7-14. ACM, (2006)PWC: a proactive worm containment solution for enterprise networks., , , , , and . Secur. Commun. Networks, 3 (4): 334-354 (2010)Real-time data attack isolation for commercial database applications., , and . J. Netw. Comput. Appl., 29 (4): 294-320 (2006)Emulation of Single-packet UDP Scanning Worms in Large Enterprises, , , and . page 1727-1736. (2005)Threshold Smart Walk for the Containment of Local Worm Outbreak., , and . GLOBECOM, page 2124-2128. IEEE, (2008)PWC: A proactive worm containment solution for enterprise networks., , , , , and . SecureComm, page 433-442. IEEE, (2007)Design and Convergence Analysis of an Improved Droop Controller With Adaptive Virtual Impedance., , , and . IEEE Access, (2021)