نتایج جستجو برای: e fetida worm and worm biomass
تعداد نتایج: 17343716 فیلتر نتایج به سال:
a rare case of ascaris coming out through the anterior abdominal wall is reported here. a 40‑year‑old female had undergone dilatation and curettage by a quack. on the second day she presented with presented with features of peritonitis. she was explored. resection anastomosis of the ileum was done for multiple perforations of the ileum. patient developed a fistula in the anterior abdominal wall...
“War of the worms” is a war between opposing computer worms, creating complex worm interactions. For example, in September 2003 the Welchia worms were launched to terminate the Blaster worms and patch the vulnerable hosts. In this paper, we try to answer the following questions: How can we explain the dynamic of such phenomena with a simple mathematical model? How can one worm win this war? How...
Worms are a common phenomenon in today’s Internet and cause tens of billions of dollars in damages to businesses around the world each year. This article first presents various concepts related to worms, and then classifies the existing worms into four types– Internet worms, P2P worms, email worms and IM (Instant Messaging) worms, based on the space in which a worm finds a victim target. The In...
0140-3664/$ see front matter 2009 Elsevier B.V. A doi:10.1016/j.comcom.2009.11.012 * Corresponding authors. Tel.: +1 814 863 0641. E-mail addresses: [email protected] (Y.-H. Choi), pl snu.ac.kr (S.-W. Seo). Importance scanning worm exploits a non-uniform distribution of vulnerable hosts on the Internet. To realize an importance scanning worm, the attacker needs to obtain or estimate the distrib...
Today’s computer world the Active worm’s are the major security issues in the Internet. This is because of the ability of active worms to execute in an automated fashion as they continuously attack the computers on the Internet. Here we find a new class of active worms, called as Camouflaging Worm (C-Worm). The C-Worm is different from regular worms because of its ability to change its scan tra...
In the internet, a worm is usually propagated in a random multi-hop contact manner. However, the attacker will not likely select this random multi-hop propagation approach in a mobile sensor network. This is because multi-hop worm route paths to random vulnerable targets can be often breached due to node mobility, leading to failure of fast worm spread under this strategy. Therefore, an appropr...
This work presents our GLOWS (Gateway Level Oregon Worm Simulator) simulator, designed to produce realistic worm traffic over a broad range of scenarios. GLOWS simulates the spread of a worm across the Internet and its propagation into a single domain with the goal of capturing the worm traffic that crosses the gateway point separating the monitored domain from the Internet.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید